User:Securiger/Crypto Stubs
From Wikipedia, the free encyclopedia
The following list was generated by Securiger on 3 May 2004 as a (very rough) guide for which cryptography articles require work. All articles listed in list of cryptography topics were scanned by a simple, read-only bot, (with a long sleep loop between reads to play nice) and the number of bytes counted. Accuracy not guaranteed, and I do not plan to update this list frequently.
- 28 Tunny (cryptography) (a redirect)
- 30 ISAAC (cryptography) (a redirect)
- 33 Claude Shannon (a redirect)
- 100 FreeLIP
- 118 Baby-step giant-step
- 132 Scott Vanstone
- 211 Key schedule
- 245 Frank A. Stevenson
- 262 Direct anonymous attestation
- 279 Privacy-enhanced Electronic Mail
- 291 Henryk Zygalski
- 295 David Chaum
- 298 COMSEC equipment
- 299 Journal of Cryptology
- 301 Financial cryptography
- 308 Joseph Mauborgne
- 321 CAcert
- 323 Solomon Kullback
- 329 Confidentiality
- 331 Cryptology ePrint Archive
- 334 Ralph Merkle
- 337 Cryptomathic
- 373 Timing attack
- 396 WHIRLPOOL
- 397 SEAL (cipher)
- 405 Communications Security Establishment
- 427 Dorabella Cipher
- 427 Joan Daemen
- 436 Cryptologia
- 441 MD5CRK
- 462 GOST
- 464 David Wheeler
- 471 International Association for Cryptologic Research
- 476 CryptoBuddy
- 476 List of famous ciphertexts
- 485 CryptoStick
- 487 PMAC
- 491 Zimmerman-Sassaman key-signing protocol
- 503 Blaise de Vigenère
- 522 Null cipher
- 528 Cover (telecommunications)
- 533 Attacker
- 541 Torus based cryptography
- 554 Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
- 567 Key signing party
- 568 Iraqi block cipher
- 574 Enigmail
- 575 Tiger (hash)
- 584 RSA Security
- 585 A5/2
- 596 Pike (cipher)
- 597 MD4
- 604 OMAC
- 606 Taher ElGamal
- 614 Crypto AG
- 624 A5/1
- 624 Niels Ferguson
- 629 Daniel J. Bernstein
- 629 Eli Biham
- 633 CRYPTO
- 634 WAKE
- 637 Passive attack
- 640 Cryptographie indéchiffrable
- 645 Chaffing and winnowing
- 650 OpenSSL
- 654 Atbash cipher
- 659 Random oracle
- 660 OpenPGP
- 669 Cryptochannel
- 670 Communication Theory of Secrecy Systems
- 673 Crib
- 707 Elliptic Curve DSA
- 713 Gardening (cryptanalysis)
- 721 Mitsuru Matsui
- 723 David Kahn
- 724 Covert channel
- 729 Jerzy Rozycki
- 730 Defence Signals Directorate
- 730 Great Cypher
- 732 Decrypt
- 740 Known-plaintext attack
- 745 Internet key exchange
- 745 S-1
- 745 Visual cryptography
- 763 Confusion and diffusion
- 767 Don Coppersmith
- 783 Central Security Service
- 786 Horst Feistel
- 804 Book cipher
- 814 Cryptographic Message Syntax
- 815 Oblivious transfer
- 825 The Codebreakers
- 828 Ciphertext-only attack
- 863 Martin Hellman
- 864 Bit-flipping attack
- 869 Codebook
- 871 S/MIME
- 872 Type 2 product
- 874 Secret decoder ring
- 879 GDES
- 879 Garble
- 897 John Tiltman
- 897 Product cipher
- 910 Cipherspace
- 920 Étienne Bazeries
- 932 Security protocol notation
- 934 Template:Classical cryptography
- 936 Chosen ciphertext attack
- 936 Friedrich Kasiski
- 942 Wide Mouth Frog
- 943 Dining cryptographers protocol
- 951 Arthur Scherbius
- 962 Paillier cryptosystem
- 962 Snuffle
- 965 Boris Hagelin
- 966 Arne Beurling
- 987 MARS
- 991 Blind credential
- 991 GMR
- 1002 Rabin cryptosystem
- 1003 Arlington Hall
- 1008 KY-57
- 1009 Distributed.net
- 1011 SYSKEY
- 1015 Undeniable signature
- 1017 Snefru
- 1021 Microdot
- 1029 Key management
- 1041 Substitution-permutation network
- 1047 Rubber-hose cryptanalysis
- 1065 Certificateless Cryptography
- 1066 Red Pike
- 1067 Crypto-society
- 1081 Keyed-hash message authentication code
- 1085 VIC cipher
- 1089 Peter Gutmann
- 1089 Shrinking generator
- 1095 Root certificate
- 1107 Yarrow algorithm
- 1123 TICOM
- 1130 Self-certifying key
- 1134 Max Newman
- 1136 Vincent Rijmen
- 1139 Ross Anderson
- 1144 Cryptogram
- 1146 Encode
- 1146 Message Authentication Code
- 1159 Cryptome
- 1165 Secure Key Issuing Cryptography
- 1176 Square (cipher)
- 1177 Key server
- 1180 Key derivation function
- 1183 Schnorr signature
- 1222 Diplomatic bag
- 1224 Otway-Rees
- 1232 Encryption
- 1240 Russian copulation
- 1243 Trapdoor function
- 1245 Cryptographically strong
- 1248 FISH (cryptography)
- 1280 Biuro Szyfrow
- 1281 Babington plot
- 1319 Hyperelliptic curve cryptography
- 1321 Gilbert Vernam
- 1330 Bernstein v. United States
- 1354 David Wagner
- 1354 Serpent (cipher)
- 1364 Electronic signature
- 1368 HTTPS
- 1369 PKCS
- 1372 NTRUEncrypt
- 1380 Rijndael
- 1411 MAGENTA
- 1414 Hushmail
- 1417 Edward Hebern
- 1421 Template:Block ciphers
- 1422 Cleartext
- 1422 Key-agreement protocol
- 1423 Electronic money
- 1443 KHAZAD
- 1453 Affine cipher
- 1458 Certificate-based encryption
- 1459 Physical security
- 1464 W. T. Tutte
- 1466 CAST-256
- 1469 James H. Ellis
- 1470 SHARK
- 1471 Cryptographic protocol
- 1475 Decipherment
- 1488 KASUMI
- 1490 MISTY1
- 1493 RC6
- 1517 Wired Equivalent Privacy
- 1518 DigiCipher 2
- 1526 Glossary of telecommunications encryption terms
- 1540 Cipher Block Chaining
- 1544 Cyphertext
- 1547 Poem code
- 1550 Camellia (cipher)
- 1550 LOKI97
- 1558 Type 1 product
- 1563 Adi Shamir
- 1570 RIPEMD-160
- 1575 Session key
- 1577 Clifford Cocks
- 1582 Tabula recta
- 1582 Twofish
- 1583 Message digest
- 1597 Blinding (cryptography)
- 1602 Ron Rivest
- 1603 Cypherpunk
- 1623 Communications security
- 1626 Herbert Yardley
- 1666 Symmetric key algorithm
- 1671 DES-X
- 1714 Linear cryptanalysis
- 1720 Chosen plaintext attack
- 1723 PC Bruno
- 1739 Common Scrambling Algorithm
- 1754 Cipher
- 1775 Key escrow
- 1785 3-Way
- 1797 OpenSSH
- 1803 Hans Thilo-Schmidt
- 1814 LibTom Project
- 1825 Blowfish (cipher)
- 1867 Commitment scheme
- 1875 Dictionary attack
- 1876 Initialization vector
- 1890 Needham-Schroeder
- 1891 Tamper resistance
- 1911 Adaptive chosen ciphertext attack
- 1937 40-bit encryption
- 1943 Digital timestamping
- 1944 Cryptonomicon
- 1955 The Gold Bug
- 1971 Crypto system
- 1975 Kerberos
- 1993 ElGamal discrete log cryptosystem
- 1994 Key distribution center
- 2001 Bruce Schneier
- 2010 Dmitry Sklyarov
- 2040 Whitfield Diffie
- 2064 Permutation cipher
- 2086 Stream cipher
- 2110 Kerckhoffs' law
- 2133 Blum Blum Shub
- 2157 Knapsack problem
- 2161 Block size (cryptography)
- 2175 Linear feedback shift register
- 2187 Man in the middle attack
- 2199 Phil Zimmermann
- 2205 Triple DES
- 2223 Cryptographically secure pseudo-random number generator
- 2234 SIGINT
- 2246 Public key certificate
- 2250 Discrete logarithm
- 2251 Scrambler
- 2252 Skipjack (cipher)
- 2304 ID-based cryptography
- 2317 Secure shell
- 2348 One way function
- 2349 Unicity distance
- 2349 X.509
- 2350 Merkle-Hellman
- 2365 TEMPEST
- 2381 Brute force attack
- 2389 Lorenz cypher
- 2392 Stegotext
- 2432 Content-scrambling system
- 2454 JN-25
- 2454 Wi-Fi Protected Access
- 2472 Auguste Kerckhoffs
- 2494 Zeroise
- 2509 Advanced Encryption Standard process
- 2542 Security engineering
- 2543 Illegal prime
- 2560 Leonard Adleman
- 2563 Lucifer (cipher)
- 2576 Digital Signature Algorithm
- 2582 Cryptographic hash function
- 2605 XTEA
- 2626 Key authentication
- 2661 Characters in cryptography
- 2695 Polybius square
- 2701 Padding (cryptography)
- 2753 Web of trust
- 2758 Frank Rowlett
- 2759 Kryptos
- 2761 Pseudonymity
- 2786 Beale ciphers
- 2790 CAST-128
- 2794 Secure cryptoprocessor
- 2867 Index of coincidence
- 2870 ADFGVX cipher
- 2871 MD5
- 2903 Trusted Third Party
- 2906 The Magic Words are Squeamish Ossifrage
- 2913 Louis W. Tordella
- 2928 RC5
- 2930 Certificate authority
- 2938 Joseph Rochefort
- 2956 Pass phrase
- 3024 Laurence Safford
- 3036 Geheimfernschreiber
- 3132 Leone Battista Alberti
- 3161 Snake oil
- 3173 Agnes Meyer Driscoll
- 3275 Diffie-Hellman key exchange
- 3296 Caesar cipher
- 3313 International Data Encryption Algorithm
- 3417 Government Communications Headquarters
- 3459 Scytale
- 3476 IPSec
- 3493 Regulation of Investigatory Powers Act 2000
- 3531 Certificate Revocation List
- 3531 Secure channel
- 3536 Feistel cipher
- 3536 Tiny Encryption Algorithm
- 3552 NESSIE
- 3753 Blind signature
- 3816 Autokey cipher
- 3862 GNU Privacy Guard
- 3863 VENONA project
- 3870 Leo Marks
- 4016 Block cipher modes of operation
- 4040 Key exchange
- 4077 Invisible ink
- 4080 Polyalphabetic cipher
- 4082 Marian Rejewski
- 4185 Crypto-anarchism
- 4205 Information security
- 4221 Typex
- 4250 Bombe
- 4266 Transport Layer Security
- 4276 FEAL
- 4337 Meet-in-the-middle attack
- 4411 Authentication
- 4420 Computer surveillance
- 4484 Code talkers
- 4539 Clipper chip
- 4573 Steganalysis
- 4592 Magic (cryptography)
- 4624 RC4 (cipher)
- 4667 Block cipher
- 4737 SHA-1
- 4812 Differential cryptanalysis
- 4924 Zimmermann Telegram
- 4928 Playfair cipher
- 5031 ROT13
- 5055 Cryptanalysis
- 5082 Plaintext
- 5126 Traffic analysis
- 5381 SAFER
- 5450 Security through obscurity
- 5708 Asymmetric key algorithm
- 5894 Straddling checkerboard
- 5993 Elliptic curve cryptography
- 6059 Pseudorandom number generator
- 6116 Wikipedia:WikiProject Cryptography
- 6126 Advanced Encryption Standard
- 6143 Zero-knowledge proof
- 6287 Hebern Rotor Machine
- 6294 Substitution box
- 6481 Colossus computer
- 6496 National Security Agency
- 6708 Public-key cryptography
- 6813 Abraham Sinkov
- 6918 Key (cryptography)
- 7019 Wikipedia talk:WikiProject Cryptography
- 7069 Bletchley Park
- 7209 Frequency analysis
- 7297 Vigenère
- 7330 DeCSS
- 7365 Password cracking
- 7492 Key size
- 7540 ECHELON
- 7664 Transposition cipher
- 7775 Cryptographic engineering
- 7860 Ultra
- 7982 Running key cipher
- 8080 Public key infrastructure
- 8175 Key signature
- 8239 Burrows-Abadi-Needham logic
- 8611 SIGABA
- 8719 Purple code
- 9417 CRYPTREC
- 9435 Secret sharing
- 9456 Code
- 9526 Fritz-chip
- 9801 One-time pad
- 9892 Steganography
- 10378 Digital signature
- 10542 Data Encryption Standard
- 10662 Password
- 10712 Electronic voting
- 10773 Alan Turing
- 11171 RSA
- 11297 List of cryptographers
- 11589 William F. Friedman
- 11654 Elizebeth Friedman
- 12181 Anonymous remailer
- 12951 Quantum cryptography
- 13816 Computer insecurity
- 14164 Rotor machine
- 14451 Books on cryptography
- 16200 Topics in cryptography
- 16791 Cryptography
- 17349 Substitution cipher
- 17726 Hardware random number generator
- 17899 History of cryptography
- 18704 Pretty Good Privacy
- 19994 Digital rights management
- 32657 Voynich Manuscript
- 38272 Enigma machine