List of important publications in cryptography information
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
This list has no precise inclusion criteria as described in the Manual of Style for standalone lists. Please improve this article by adding inclusion criteria, or discuss this issue on the talk page.(November 2019)
This article's lead section may be too short to adequately summarize the key points. Please consider expanding the lead to provide an accessible overview of all important aspects of the article.(November 2019)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "List of important publications in cryptography" – news · newspapers · books · scholar · JSTOR(November 2019) (Learn how and when to remove this message)
This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: this list lacks support of sources establishing the importance of these publications, and thus the inclusion of most items in this list is WP:OR. Please help improve this article if you can.(November 2019) (Learn how and when to remove this message)
(Learn how and when to remove this message)
This is a list of important publications in cryptography, organized by field.
Some reasons why a particular publication might be regarded as important:
Topic creator – A publication that created a new topic
Breakthrough – A publication that changed scientific knowledge significantly
Influence – A publication which has significantly influenced the world or has had a massive impact on the teaching of cryptography.
and 25 Related for: List of important publications in cryptography information
publications in cryptographyListofimportantpublicationsin mathematics Listofimportantpublicationsin statistics Listofimportantpublicationsin data science...
This is a listofimportantpublicationsin mathematics, organized by field. Some reasons a particular publication might be regarded as important: Topic...
a listofimportantpublicationsin computer science, organized by field. Some reasons why a particular publication might be regarded as important: Topic...
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might...
Encryption (FSE) Public Key Cryptography (PKC) Cryptographic Hardware and Embedded Systems (CHES) Theory ofCryptography (TCC) Real World Crypto Symposium...
mailing list, informal groups aimed to achieve privacy and security through proactive use ofcryptography. Cypherpunks have been engaged in an active...
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...
Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
(Original text)) This section contains a listofpublications on microbiology. Microbiology is the study of microorganisms, which are defined as any microscopic...
computer scientist whose work has spanned the fields of algorithms and combinatorics, cryptography, machine learning, and election integrity. He is an...
Incryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext...
von Neumann's published works can be found on zbMATH and Google Scholar. A listof his known works as of 1995 can be found in The Neumann Compendium....
of most cryptographic protocol suites, and are commonly used for software distribution, financial transactions, contract management software, and in other...
Incryptography, a certificate revocation list (CRL) is "a listof digital certificates that have been revoked by the issuing certificate authority (CA)...
access to cryptography strong enough to thwart decryption by national intelligence agencies, especially the National Security Agency (NSA). In the early...
The timeline of historic inventions is a chronological listof particularly important or significant technological inventions and their inventors, where...
Incryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known...
Incryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or...
Incryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific...