|
|
-
- Theory: Computational boundedness, Lattice-based cryptography, Universal composability
- Hash functions: MDC-4, SMASH (hash)
- Historical cryptography: TELWA, Hut 3, Hut 4
- Cipher machines: Alvis (cipher machine), SIGTOT, B-211 or B-21 (cryptography), OMI (machine), Siemens SFM T43, SA-1 (cryptography), BC-543, BC-38, Syko, CORAL, PENELOPE, RED (cipher machine)
- Stream ciphers: Correlation attack, Fast correlation attack, HBB (cipher)
- Block ciphers: Vino (cipher), MultiSwap, BKSQ
- Block cipher misc topics: Decorrelation theory, RMAC, IAPM, XECB
- Block cipher cryptanalysis: Partitioning cryptanalysis, Yoyo game
- Boolean functions and S-boxes: bent function
- Cryptographers: Joan Clarke, Hugh Foss, Oliver Strachey, Francis Fasson, Francis Birch, Vladimir Furman, Joos Vandewalle, Orr Dunkelman, Toshio Tokita, Henri Gilbert, Helena Handschuh, Antoon Bosselaers, Christophe De Cannière, Joseph Lano, Håvard Raddum, Michael Wiener
- Misc: Elementary cryptography
|
|
-
- Cryptographic primitive, Key schedule, ElGamal signature scheme, Cyclometer, Algebraic normal form, Key clustering, cryptographic nonce, Slidex
- Theory: Completeness, Correlation immunity, Ring signature, Secure computation, Secure two-party computation
- Hash functions: HAS-V, MASH-1, MDC-2
- Cryptographers: Charles Rackoff, Leonard Hooper, Eric Malcolm Jones, Gordon Welchman, Victor S. Miller, Mihir Bellare, Phillip Rogaway, Lawrie Brown, Josef Pieprzyk, Jennifer Seberry, Jacques Stern, Alex Biryukov, Carlisle Adams, Matt Robshaw, Sean Murphy, Burt Kaliski, Nikita Borisov, Thomas Jakobsen, Kaisa Nyberg, David Naccache, James Massey, Stafford Tavares, Michael Luby, Jean-Jacques Quisquater, Paul van Oorschot, Howard Heys, Tom Berson, Hideki Imai, Xuejia Lai
- Protocol: Wireless Transport Layer Security, Oakley protocol
- Stream ciphers: LILI-128, LEVIATHAN, Self-shrinking generator, SOBER, Stream cipher
- Block ciphers: ABC, ARIA, BaseKing, BassOmatic, CIKS-1, CIPHERUNICORN-A, CIPHERUNICORN-E, Cobra, COCONUT98, Crab, CRYPTON, DFC, E2, FEA-M, Grand Cru, Hierocrypt, KN-Cipher, Ladder-DES, M6, M8, MESH, New Data Seal, Nimbus, NUSH, Q, SC2000, Spectr-H64, SXAL/MBAL, Treyfer, UES, Xenon, xmx, Zodiac
- Block cipher cryptanalysis: Davies' attack, Differential-linear attack, Higher order differential cryptanalysis, Impossible differential cryptanalysis, Integral cryptanalysis, Slide attack, Truncated differential cryptanalysis
- Block cipher misc topics: CWC mode
- Misc: Watermarking attack, Rambutan (cryptography), Cryptovirology
- Public-key cryptography: McEliece cryptosystem, Public key fingerprint, IND-CCA, Pairing-based cryptography, Pohlig-Hellman algorithm
|
|