Skip to content

technology/cryptography

Surf Wiki
Post-quantum cryptography

Cryptography secured against quantum computers

technology/cryptography
ESTREAM

Project to identify new stream ciphers for widespread adoption

technology/cryptography
High-bandwidth Digital Content Protection

Digital copy protection

technology/cryptography
Temporal Key Integrity Protocol

Security protocol in wireless networking

technology/cryptography
IEEE 802.11i-2004

IEEE standard version

technology/cryptography
Key (cryptography)

Used for encoding or decoding ciphertext

technology/cryptography
Secret sharing

Method for dividing a secret among multiple parties

technology/cryptography
Communications security

Discipline of telecommunications

technology/cryptography
Military Intelligence Service (United States)
technology/cryptography
Signcryption

Asymmetric cryptographic primitive

technology/cryptography
RadioGatún

Cryptographic hash primitive

technology/cryptography
X.509

Standard defining the format of public key certificates

technology/cryptography
Ritchie Boys

WWII US special military intelligence unit

technology/cryptography
3-Way

Block cipher

technology/cryptography
56-bit encryption

Key size for symmetric encryption

technology/cryptography
Alternating step generator

Form of pseudorandom number generator

technology/cryptography
A5/2

Stream cipher

technology/cryptography
Akelarre (cipher)

Block cipher

technology/cryptography
A5/1

Stream cipher

technology/cryptography
Algorithmic Number Theory Symposium

Biennial conference series on computational number theory

technology/cryptography
Advantage (cryptography)
technology/cryptography
40-bit encryption

Key size for symmetric encryption

technology/cryptography
Array controller based encryption
technology/cryptography
Authentication and Key Agreement
technology/cryptography
Anonymous veto network

Multi-party secure computation protocol

technology/cryptography
Anubis (cipher)

Block cipher

technology/cryptography
Anshel–Anshel–Goldfeld key exchange

Nonabelian cryptographic protocol

technology/cryptography
Ashtavakra Gita

Advaita Vedanta scripture

technology/cryptography
AS1 (networking)

Network protocol for business-to-business data

technology/cryptography
ARIA (cipher)

Block cipher

technology/cryptography
AS2

Network protocol for business-to-business data

technology/cryptography
Anonymous matching

Matchmaking method

technology/cryptography
Arxan Technologies

US technology security company

technology/cryptography
BaseKing

Block cipher

technology/cryptography
Autograph

Personal signature

technology/cryptography
Autoroll
technology/cryptography
Avalanche effect

Concept in cryptography

technology/cryptography
Avadhuta Gita

Sanskrit text of Hinduism

technology/cryptography
Autograph book

Album for collecting autographs

technology/cryptography
B-Dienst

Department of the German Naval Intelligence Service

technology/cryptography
Authentication

Act of proving an assertion

technology/cryptography
Autograph collecting

Practice of collecting autographs of famous persons

technology/cryptography
Bibliography of cryptography

none

technology/cryptography
BB84

Quantum key distribution protocol

technology/cryptography
Block cipher mode of operation

Cryptography algorithm

technology/cryptography
Blind signature

Form of digital signature

technology/cryptography
BATON

Block cipher

technology/cryptography
Bingo voting
technology/cryptography
Beaufort cipher

Polyalphabetic encryption system

technology/cryptography
Key-agreement protocol

Protocol for agreeing on a cryptographic key

technology/cryptography