|
|
-
- Theory: Computational boundedness, Lattice-based cryptography, Universal composability
- Hash functions: MDC-4, SMASH (hash)
- Historical cryptography: TELWA, Hut 3, Hut 4
- Cipher machines: Alvis (cipher machine), SIGTOT, B-211 or B-21 (cryptography), OMI (machine), Siemens SFM T43, SA-1 (cryptography), BC-543, BC-38, Syko, CORAL, PENELOPE, RED (cipher machine)
- Stream ciphers: Correlation attack, Fast correlation attack, HBB (cipher)
- Block ciphers: Vino (cipher), BKSQ, Manta (cipher)
- Block cipher misc topics: RMAC, IAPM, XECB
- Block cipher cryptanalysis: Yoyo game
- Boolean functions and S-boxes: bent function
- Cryptographers: Joan Clarke, Francis Fasson, Vladimir Furman, Joos Vandewalle, Toshio Tokita, Henri Gilbert, Helena Handschuh, Antoon Bosselaers, Christophe De Cannière, Joseph Lano, Håvard Raddum, Michael Wiener
- Misc: Elementary cryptography
|
|
-
- Cryptographic primitive, Key schedule, ElGamal signature scheme, Cyclometer, Algebraic normal form, Key clustering, cryptographic nonce, Slidex
- Theory: Completeness, Correlation immunity, Ring signature, Secure computation, Secure two-party computation
- Hash functions: HAS-V, MASH-1, MDC-2
- Cryptographers: Charles Rackoff, Leonard Hooper, Eric Malcolm Jones, Gordon Welchman, Victor S. Miller, Mihir Bellare, Orr Dunkelman, Phillip Rogaway, Lawrie Brown, Josef Pieprzyk, Jennifer Seberry, Jacques Stern, Alex Biryukov, Carlisle Adams, Matt Robshaw, Sean Murphy, Burt Kaliski, Nikita Borisov, Thomas Jakobsen, Kaisa Nyberg, David Naccache, James Massey, Stafford Tavares, Michael Luby, Jean-Jacques Quisquater, Paul van Oorschot, Howard Heys, Tom Berson, Hideki Imai, Xuejia Lai, Hugh Foss, Oliver Strachey, Francis Birch
- Protocol: Wireless Transport Layer Security, Oakley protocol
- Stream ciphers: LILI-128, LEVIATHAN, Self-shrinking generator, SOBER, Stream cipher
- Block ciphers: ABC, ARIA, BaseKing, BassOmatic, CIKS-1, CIPHERUNICORN-A, CIPHERUNICORN-E, Cobra, COCONUT98, Crab, CRYPTON, DFC, E2, FEA-M, Grand Cru, Hierocrypt, KN-Cipher, Ladder-DES, M6, M8, MESH, MultiSwap, New Data Seal, Nimbus, NUSH, Q, SC2000, Spectr-H64, SXAL/MBAL, Treyfer, UES, Xenon, xmx, Zodiac
- Block cipher cryptanalysis: Davies' attack, Differential-linear attack, Higher order differential cryptanalysis, Impossible differential cryptanalysis, Integral cryptanalysis, Interpolation attack, Partitioning cryptanalysis, Slide attack, Truncated differential cryptanalysis
- Block cipher misc topics: CWC mode, Decorrelation theory
- Misc: Watermarking attack, Rambutan (cryptography), Cryptovirology
- Public-key cryptography: McEliece cryptosystem, Public key fingerprint, IND-CCA, Pairing-based cryptography, Pohlig-Hellman algorithm
|
|