|
- Start from scratch: edit
- Theory: Computational boundedness, Pairing-based cryptography, Lattice-based cryptography, Secure computation, Universal composability
- Hash functions: MDC-4, SMASH (hash)
- Historical cryptography: TELWA, Hut 3, Hut 4
- Cipher machines: Alvis (cipher machine), SIGTOT, B-211 or B-21 (cryptography), OMI (machine), Siemens SFM T43, SA-1 (cryptography), BC-543, BC-38, Slidex, Syko, CORAL, PENELOPE, RED (cipher machine)
- Stream ciphers: SOBER, LILI-128, Correlation attack, Fast correlation attack, HBB (cipher)
- Block ciphers: Hierocrypt-3, Hierocrypt-L1, SXAL8 / MBAL, Vino (cipher), E2 (cipher), SPECTR-H64, CIKS-1, FEA-M, Xenon (cipher), Zodiac (cipher), CIPHERUNICORN-A, CIPHERUNICORN-E, COCONUT98
- Block cipher misc topics: RMAC, IAPM, XECB
- Block cipher cryptanalysis: Truncated differential attack
- Boolean functions and S-boxes: bent function, T-function
- Cryptographers: Joan Clarke, Hugh Foss, Oliver Strachey, Francis Fasson, Francis Birch, Nikita Borisov, Lawrie Brown
- Misc: Elementary cryptography
- Expansion / stubs: (see also: Category:Cryptography stubs)
- Cryptographic primitive, Key schedule, ElGamal signature scheme, Cyclometer, Algebraic normal form, Key clustering, cryptographic nonce
- Theory: Completeness, Correlation immunity, IND-CCA, Pohlig-Hellman, Ring signature, Secure two-party computation
- Hash functions: MASH-1, MDC-2
- Cryptographers: Alfred Menezes, Charles Rackoff, Leonard Hooper, Eric Malcolm Jones, Gordon Welchman, Victor S. Miller, Dan Boneh, Mihir Bellare, Phillip Rogaway
- Protocol: Wireless Transport Layer Security, Oakley protocol
- Stream ciphers: LEVIATHAN, Self-shrinking generator, Stream cipher
- Block ciphers: BaseKing, Crab, CRYPTON, DFC, Grand Cru, MESH, Nimbus, NUSH, Q, SC2000
- Block cipher cryptanalysis: Differential-linear attack, Slide attack, Integral cryptanalysis
- Block cipher misc topics: CWC mode
- Misc: Watermarking attack
- Public-key cryptography: McEliece cryptosystem, Public key fingerprint
- Verification:
- Images:
|