The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
Encyclopedia of Cryptographie
edit- Cryptography
- History of cryptography
- Basics
- Block cipher
- Cryptanalysis
- Cryptographic hash function
- Cryptographically secure pseudorandom number generator
- Digital signature
- Digital watermarking
- Encryption
- Message authentication code
- Public-key cryptography
- Steganography
- Stream cipher
- Strong secrecy
- Symmetric-key algorithm
- Watermark detection
- Protocols
- 3-D Secure
- AKA (security)
- Alice and Bob
- Anonymous veto network
- Anshel–Anshel–Goldfeld key exchange
- ANSI ASC X9.95 Standard
- AS1 (networking)
- AS2
- AuthIP
- Autoroll
- BitTorrent protocol encryption
- CCMP
- Certificate Management over CMS
- Certificate Management Protocol
- Certificate signing request
- Certification path validation algorithm
- Chaffing and winnowing
- Challenge-handshake authentication protocol
- Challenge-response authentication
- Cipher suite
- Code Access Security
- Common reference string model
- CRAM-MD5
- Cryptographic Message Syntax
- Cryptographic protocol
- Cryptographically Generated Address
- CrypTool
- Data Validation and Certification Server
- Datagram Transport Layer Security
- Dead Peer Detection
- Delegated Path Discovery
- Delegated Path Validation
- Deniable authentication
- DH/DSS
- Diffie–Hellman key exchange
- Diffie–Hellman problem
- Digest access authentication
- DigiCipher 2
- Digital credential
- Dining cryptographers protocol
- Distance-bounding protocol
- Distributed System Security Architecture
- Dolev-Yao model
- DomainKeys
- DomainKeys Identified Mail
- EAP-AKA
- EAP-SIM
- Ecash
- Electronic money
- Encrypted key exchange
- Extensible Authentication Protocol
- Fiat-Shamir heuristic
- Generic Bootstrapping Architecture
- Generic Security Service Algorithm for Secret Key Transaction
- Grid Security Infrastructure
- Group Domain of Interpretation
- H.235
- Hashcash
- High Assurance Internet Protocol Encryptor
- Homomorphic secret sharing
- Host Identity Protocol
- HTTP Secure
- HTTPsec
- IEEE 802.11i-2004
- Interlock protocol
- Internet Key Exchange
- Internet Security Association and Key Management Protocol
- IPsec
- Kerberized Internet Negotiation of Keys
- Kerberos (protocol)
- Key exchange
- Key-agreement protocol
- KMIP
- Microsoft Point-to-Point Encryption
- MIKEY
- MS-CHAP
- Multi party fair exchange protocol
- Multiplexed Transport Layer Security
- NAT-T
- Needham-Schroeder protocol
- Neuman-Stubblebine protocol
- Non-interactive zero-knowledge proof
- NTLM
- Oak Orion
- Oakley protocol
- Oblivious transfer
- OCSP Stapling
- Off-the-Record Messaging
- Offline private key protocol
- Online Certificate Status Protocol
- Openswan
- Otway-Rees protocol
- Password Authenticated Key Exchange by Juggling
- Password-authenticated key agreement
- Privacy-enhanced Electronic Mail
- Private Communications Technology
- Private information retrieval
- Proactive secret sharing
- Proof of knowledge
- Protected Extensible Authentication Protocol
- Protocol for Carrying Authentication for Network Access
- Publius Publishing System
- Rekeying
- Renewable security
- SCVP
- Secret sharing
- Secure channel
- Secure Communications Interoperability Protocol
- Secure copy
- Secure file transfer program
- Secure Hypertext Transfer Protocol
- Secure multi-party computation
- Secure Neighbor Discovery Protocol
- Secure Real-time Transport Protocol
- Secure Remote Password protocol
- Secure Shell
- Secure two-party computation
- Security association
- Security protocol notation
- Security Protocols Open Repository
- Simple Authentication and Security Layer
- Simple Certificate Enrollment Protocol
- Socialist millionaire
- SPEKE (cryptography)
- SPNEGO
- SSH File Transfer Protocol
- Station-to-Station protocol
- StrongSwan
- TACLANE
- Tcpcrypt
- Temporal Key Integrity Protocol
- Threshold shadow scheme
- TLS-PSK
- Transport Layer Security
- Universal composability
- User:Taeshadow/Page for drafts/Homomorphic electronic voting
- Vouch by Reference
- Web-based SSH
- Wi-Fi Protected Access
- Wi-Fi Protected Setup
- Wide Mouth Frog protocol
- Wired Equivalent Privacy
- Wireless Transport Layer Security
- Witness-indistinguishable proof
- WLAN Authentication and Privacy Infrastructure
- X.1035
- X.509
- XKMS
- Yahalom (protocol)
- YAK (cryptography)
- Yao's Millionaires' Problem
- Zero-knowledge password proof
- Zero-knowledge proof
- Zimmermann-Sassaman key-signing protocol
- ZRTP
- Attacks
- Acoustic cryptanalysis
- Adaptive chosen-ciphertext attack
- Adversary (cryptography)
- Attack model
- Banburismus
- Birthday attack
- Bit-flipping attack
- Black bag operation
- Black-bag cryptanalysis
- Boomerang attack
- Brute-force attack
- Chosen-ciphertext attack
- Chosen-plaintext attack
- Ciphertext-only attack
- Clock drift
- Cold boot attack
- Collision (computer science)
- Collision attack
- Computer forensics
- Computer fraud
- Contact analysis (cryptanalysis)
- Correlation attack
- Cryptanalytic computer
- Cube attack
- Custom hardware attack
- Davies' attack
- Decimalization table attack
- Dictionary attack
- Differential cryptanalysis
- Differential equations of addition
- Differential fault analysis
- Differential-linear attack
- Distinguishing attack
- Distributed.net
- Doubling-oriented Doche–Icart–Kohel curve
- Edwards curve
- Fluhrer, Mantin and Shamir attack
- Frequency analysis
- Gardening (cryptanalysis)
- Hardware keylogger
- Hessian form of an elliptic curve
- Higher-order differential cryptanalysis
- Impossible differential cryptanalysis
- Index of coincidence
- Integral cryptanalysis
- Interpolation attack
- Jacobian curve
- John Herivel
- Kasiski examination
- KeeLoq
- Keygen
- Keystroke logging
- Known-plaintext attack
- LAN Manager
- Linear cryptanalysis
- LM hash
- Man-in-the-middle attack
- MD5CRK
- Meet-in-the-middle attack
- Message forgery
- Metasploit Project
- Military Cryptanalytics
- Mod n cryptanalysis
- Montgomery curve
- Padding oracle attack
- Partitioning cryptanalysis
- Passive attack
- Password cracking
- Piling-up lemma
- Power analysis
- Preimage attack
- Pwdump
- Rainbow table
- Random number generator attack
- Ransomware (malware)
- Related-key attack
- Replay attack
- Rootkit
- Rotational cryptanalysis
- Rubber-hose cryptanalysis
- Self-service password reset
- Side channel attack
- Sinkov statistic
- Slide attack
- Small subgroup confinement attack
- Steganalysis
- Stream cipher attack
- Supply chain attack
- Table of costs of operations in elliptic curves
- TEMPEST
- Timing attack
- Traffic analysis
- Tripling-oriented Doche–Icart–Kohel curve
- Truncated differential cryptanalysis
- Turingery
- TWINKLE
- Twisted Edwards curve
- Twisted Hessian curves
- Twists of curves
- User:TedColes/Sandbox
- Watermarking attack
- Weak key
- XSL attack
- Zendian Problem
- Zygalski sheets
- Algorithms
- Bach's algorithm
- Barrett reduction
- BB84
- Beaufort cipher
- Block cipher modes of operation
- CDMF
- Ciphertext stealing
- Common Scrambling Algorithm
- CryptGenRandom
- Crypto++
- Cycles per byte
- Feedback with Carry Shift Registers
- Feige-Fiat-Shamir Identification Scheme
- Generating primes
- GGH encryption scheme
- Hash chain
- Industrial-grade prime
- ISMACryp
- JOSEKI (cipher)
- Key schedule
- Key Wrap
- Kochanski multiplication
- Linear feedback shift register
- Mental poker
- Modular exponentiation
- Montgomery reduction
- MOSQUITO
- Pairing-based cryptography
- Random password generator
- Randomness extractor
- RC algorithm
- Residual block termination
- Rip van Winkle cipher
- Schoof's algorithm
- Secret sharing using the Chinese remainder theorem
- SecureLog
- Shamir's Secret Sharing
- Snuffle
- Substitution–permutation network
- Summation generator
- Type 1 product
- Type 2 product
- Type 3 product
- Type 4 product
- Public-key Cryptography
- CA/Browser Forum
- Certificate authority
- Certificate server
- Certificate-based encryption
- Decisional composite residuosity assumption
- Detached signature
- Digital Signature Algorithm
- Domain Name System Security Extensions
- ElGamal encryption
- Hyperelliptic curve cryptography
- Jumbleme (digital encryption service)
- KCDSA
- Keystore
- McEliece cryptosystem
- Merkle–Hellman knapsack cryptosystem
- MQV
- Niederreiter cryptosystem
- Non-repudiation
- Paillier cryptosystem
- PKCS
- Pretty Good Privacy
- Public key certificate
- Public key infrastructure
- Rabin cryptosystem
- Rabin signature algorithm
- Resource Public Key Infrastructure
- Revocation list
- Root certificate
- RSA
- RSA problem
- RSA/Intuative
- SAFE-BioPharma Association
- Self-signed certificate
- Signcryption
- Strong RSA assumption
- Subject Alternative Name
- Trusted third party
- Web of trust
- Wireless Public Key Infrastructure