Category:Cryptography stubs
Appearance
This category is maintained by WikiProject Stub sorting. Please propose new stub templates and categories here before creation. |
This category is for stub articles relating to cryptography. You can help by expanding them. To add an article to this category, use {{crypto-stub}} instead of {{stub}} . |
See also
[edit]Pages in category "Cryptography stubs"
The following 200 pages are in this category, out of approximately 342 total. This list may not reflect recent changes.
(previous page) (next page)A
B
C
- CAPICOM
- Capstone (cryptography)
- Card Verifiable Certificate
- CAST-256
- Ccrypt
- CDMF
- Certification on demand
- Chaos communications
- Chaos machine
- CIKS-1
- Cipher device
- Ciphertext expansion
- Ciphr
- CJCSG
- CLEFIA
- Client certificate
- Client-side encryption
- Code word (communication)
- Codress message
- Commercial National Security Algorithm Suite
- Common reference string model
- Communication Theory of Secrecy Systems
- Communications Machine
- Completeness (cryptography)
- Concrete security
- Conjugate coding
- Controlled Cryptographic Item
- Correlation immunity
- Coset leader
- COSIC
- Cover (telecommunications)
- Cover-coding
- Crab (cipher)
- Cryptanalytic computer
- CryptMT
- Crypto API (Linux)
- Crypto-1
- Crypto (book)
- CryptoBuddy
- Cryptographic log on
- Cryptographic Message Syntax
- Cryptographic module
- Cryptographic Module Validation Program
- Cryptographic Quarterly
- Cryptographie indéchiffrable
- Cryptography newsgroups
- Cryptography Research
- Cryptologia
- Cryptology ePrint Archive
- Cryptoloop
- Cryptomenysis Patefacta
- CRYPTON
- Cryptoperiod
- Cryptosystem
- CS-Cipher
- Matt Curtin
- CWC mode
D
- Data Authentication Algorithm
- Davies attack
- DEAL
- DECIM
- Decorrelation theory
- Delegated Path Discovery
- Deniable authentication
- Designated verifier signature
- Detached signature
- DICING
- Differential fault analysis
- Digital signature forgery
- Digital Signature Standard
- Distribution ensemble
- Dragon (cipher)
- Dusting attack
- Dynamic secrets
E
F
G
H
I
J
K
- KCDSA
- KCipher-2
- Key clustering
- Key generator
- Key signature (cryptography)
- Key signing party
- Key Transparency
- Key-recovery attack
- Keyring (cryptography)
- Keysigning
- Kiss (cryptanalysis)
- KL-43
- KL-51
- Kmc-Subset137
- Knapsack cryptosystems
- Known-key distinguishing attack
- KOV-14
- KOV-21
- Kryptographik
- KSD-64
- KSV-21
- KY-58
- KY-68