Rank
|
Article
|
Hits
|
Size (bytes)
|
Redirects
|
Images
|
1 |
Enigma machine
|
6535 |
32450 |
Naval Engima
--
Enigma code machine
--
Enigma (machine)
--
ENIGMA
--
Enigma cryptography machine
--
Enigma code
--
Enigma cipher machine
--
Enigma cypher machine
--
Enigma cipher
--
Enigma cypher
--
Naval Enigma
--
Enigma Machine
|
|
2 |
Cryptanalysis of the Enigma
|
1993 |
22520 |
|
|
3 |
Cryptanalysis
|
1993 |
18187 |
CryptanalysiS
--
Cryptanalytic
--
Cryptoanalysis
--
Codebreaking
--
Codebreaker
--
Cryptanalyst
--
Code-breaking
--
Cryptanalysts
|
|
4 |
Alan Turing
|
1579 |
15031 |
Turing, A.M.
--
Alan Mathison Turing
|
|
5 |
History of cryptography
|
1450 |
20091 |
|
|
6 |
ECHELON
|
1322 |
13300 |
EcheloN
--
Eschelon
|
|
7 |
Cryptography
|
1290 |
17810 |
CryptologY
--
CryptographY
--
Cryptology
--
CryptographY/Hashfunctions
--
Cryptographic
--
Codes and ciphers
--
Decrypting
--
Crypto
--
Data encryption
--
Cyptography
|
|
8 |
Digital rights management
|
1255 |
24954 |
Digital Rights Management
--
Digital-rights management
--
Digital restrictions management
--
Digital Restrictions Management
|
|
9 |
MD5
|
1059 |
7679 |
Md5
--
MD5 - A Message Digest Algorithm
--
Md5sum
|
|
10 |
RSA
|
986 |
13207 |
RSA Cryptosystem
|
|
11 |
Bombe
|
786 |
6929 |
|
|
12 |
Steganography
|
766 |
11798 |
Secret writing
--
Stegonagraphy
--
Stegotext
|
|
13 |
Encryption
|
668 |
4549 |
CipheR
--
Cipher
--
Cyphertext
--
Ciphertext
--
Cipher text
--
Decryption
--
Encryption key
--
Encryption algorithm
--
Codetext
--
Encrypt
--
Encrypted
--
Encipher
|
|
14 |
Ultra
|
580 |
26381 |
UltrA
--
Ultra secret
--
ULTRA
|
|
15 |
Bletchley Park
|
525 |
9696 |
Bletchley Park Museum
--
Station X
|
|
16 |
Blowfish (cipher)
|
487 |
6891 |
Blowfish encryption algorithm
|
|
17 |
Colossus computer
|
480 |
9965 |
Colossus (computer)
|
|
18 |
National Security Agency
|
432 |
11249 |
NSA
--
Armed Forces Security Agency
--
AFSA
--
No such agency
--
The Puzzle Palace
|
|
19 |
Advanced Encryption Standard
|
431 |
10743 |
AES
--
Rijndael
--
Rijndael encryption algorithm
|
|
20 |
Data Encryption Standard
|
421 |
29907 |
DataEncryptionStandard
--
Data Encryption Algorithm
--
DES
|
|
21 |
Quantum cryptography
|
414 |
16077 |
Quantum Cryptography
|
|
22 |
Topics in cryptography
|
409 |
18271 |
Topics in Cryptography
|
|
23 |
Cryptographic hash function
|
403 |
9408 |
Message digest
--
Cryptographic hash
--
Cryptographic message digest
--
One-way hash
--
Modification Detection Code
|
|
24 |
Cryptonomicon
|
384 |
3079 |
Neal Stephenson/Cryptonomicon
|
|
25 |
Wi-Fi Protected Access
|
376 |
3319 |
|
|
26 |
Digital signature
|
357 |
11899 |
Digital signatures
--
Digitally Signed
--
Cryptographic signature
|
|
27 |
One-time pad
|
342 |
18815 |
OneTimePads
--
One time pads
--
One time pad
--
Vernam cipher
|
|
28 |
Block cipher
|
328 |
4828 |
Codebook algorithm
|
|
29 |
Zimmermann Telegram
|
325 |
9474 |
Zimmermann telegram
--
Zimmerman telegram
--
Zimmerman Note
--
The Zimmermann Telegram
|
|
30 |
Integer factorization
|
324 |
7283 |
Prime factorization
--
Prime factorisation
--
Prime decomposition
--
Integer factorization problem
--
Integer factorisation
|
|
31 |
HTTPS
|
324 |
2053 |
Https
|
|
32 |
Rotor machine
|
323 |
12564 |
Rotor cypher machine
|
|
33 |
X.509
|
320 |
4415 |
|
|
34 |
Brute force attack
|
319 |
3623 |
Combinatorial explosion
|
|
35 |
Triple DES
|
315 |
2454 |
3DES
--
Triple-DES
|
|
36 |
DeCSS
|
313 |
8286 |
DeCSS source code
--
Decss
|
|
37 |
Birthday attack
|
312 |
3250 |
|
|
38 |
Public-key cryptography
|
298 |
7275 |
Private key
--
Public key
--
Public key cryptography
--
Asymmetric key cryptography
--
Public key encyption
--
Public key crytography
--
Public key encryption
--
Public-key encryption
--
Public-key
--
PKC
--
Non-secret encryption
|
|
39 |
Frequency analysis
|
286 |
7354 |
|
|
40 |
Substitution cipher
|
274 |
18038 |
Substitution ciphers
--
Substitution alphabet
--
Letter-substitution cipher
--
Simple substitution cipher
--
Monoalphabetic substitution cipher
|
|
41 |
Asymmetric key algorithm
|
267 |
7622 |
Asymmetric Algorithms
--
Asymmetric algorithm
--
Public key algorithm
--
Asymmetric key
--
Asymmetric key encryption algorithm
--
Asymmetric key encryption
--
Asymmetric cryptography
|
|
42 |
Authentication
|
264 |
4953 |
Authenticate
|
|
43 |
ROT13
|
262 |
14597 |
Rot13
--
ROT-13
--
ROT-47
--
Rot47
--
Rot-13
--
Rot-47
--
ROT47
--
ROT 13
--
ROT26
--
Double ROT13
--
Ebg13
--
Memfrob
--
Furrfu
|
|
44 |
Kerberos (protocol)
|
247 |
4528 |
|
|
45 |
Elliptic curve cryptography
|
241 |
6894 |
Elliptical Curve Cryptography
|
|
46 |
Pseudorandom number generator
|
238 |
6097 |
Pseudorandom number generators
--
Pseudo-random number generator
--
Pseudorandom sequence
--
PRNG
--
Pseudo Random
--
Pseudo-random
--
Pseudo-randomness
|
|
47 |
Stream cipher
|
231 |
2999 |
Key stream
--
Combiner-type algorithm
|
|
48 |
RC4
|
230 |
9179 |
RC4 Cipher
--
ARCFOUR
--
RC4 cipher
--
RC4 (cipher)
|
|
49 |
Kryptos
|
219 |
3030 |
|
|
50 |
Symmetric key algorithm
|
216 |
1699 |
Symmetric Algorithms
--
Symmetric algorithm
--
Symmetric key
--
Symmetric encryption
--
Symmetric key cryptography
--
Symmetric cypher
--
Shared key
--
Symmetric cipher
|
|
51 |
Claude E. Shannon
|
216 |
5503 |
Claude Shannon
--
Claude Elwood Shannon
|
|
52 |
Transport Layer Security
|
207 |
5380 |
Secure Sockets Layer
--
Transport Layer Security Protocol
--
Transport layer security
--
Secure Socket Layer
|
|
53 |
Bomba (cryptography)
|
202 |
3402 |
|
|
54 |
Electronic voting
|
198 |
16364 |
E-voting
--
EVoting
--
E voting
--
Computer voting
--
Electronic Voting
--
Online voting
--
Paper trail
|
|
55 |
List of cryptography topics
|
196 |
33375 |
List of cryptology topics
|
|
56 |
International Data Encryption Algorithm
|
194 |
4461 |
IDEA encryption algorithm
--
IDEA (cipher)
--
Idea encryption
|
|
57 |
Differential cryptanalysis
|
192 |
4864 |
Differential attack
|
|
58 |
Caesar cipher
|
188 |
7402 |
Shift cipher
--
Caesar shift cipher
--
Caesar cypher
|
|
59 |
Typex
|
186 |
4242 |
Type X
--
TypeX
|
|
60 |
Marian Rejewski
|
185 |
4990 |
|
|
61 |
Hardware random number generator
|
180 |
21945 |
True random number generator
--
Random device
--
Entropy pool
--
TRNG
--
True Random Number Generator
|
|
62 |
Perforated sheets
|
179 |
1010 |
Zygalski sheets
--
Perforated sheet
|
|
63 |
TEMPEST
|
178 |
4065 |
Van Eck Phreaking
--
Emission security
--
Van Eck radiation
--
Emissions security
--
EMSEC
|
|
64 |
Numbers station
|
171 |
3510 |
Numbers stations
--
Number station
|
|
65 |
Crypto-anarchism
|
168 |
4574 |
Crypto-anarchy
|
|
66 |
Man in the middle attack
|
167 |
2950 |
Man-in-the-middle attack
--
Man in the middle
--
MITM
|
|
67 |
Block cipher modes of operation
|
165 |
5509 |
Electronic codebook
--
Cipher-block chaining
--
Cipher feedback
--
Output feedback
--
Counter mode
--
Modes of operation
--
Block cipher mode of operation
|
|
68 |
Password cracking
|
164 |
10256 |
|
|
69 |
Password
|
164 |
15629 |
Passcode
|
|
70 |
VENONA project
|
160 |
9320 |
VENONA
--
Venona
--
VENONA Project
--
Venona project
--
Venona Project
|
|
71 |
Twofish
|
156 |
1747 |
Twofish encryption algorithm
|
|
72 |
Information security
|
156 |
4644 |
Information systems security
--
Information assurance
--
INFOSEC
--
It security
|
|
73 |
Atbash
|
156 |
911 |
Atbash cipher
--
Atbash cypher
|
|
74 |
Digital Signature Algorithm
|
155 |
2167 |
DSA
|
|
75 |
Code talkers
|
152 |
5603 |
Codetalker
--
Navajo code
--
Codetalkers
|
|
76 |
Public key infrastructure
|
151 |
9476 |
PKI
--
Public Key Infrastructure
--
Pki
|
|
77 |
Codebook
|
145 |
950 |
Code book
|
|
78 |
Cryptographically secure pseudo-random number generator
|
144 |
5972 |
CSPRNG
|
|
79 |
Certificate authority
|
144 |
3173 |
Certificate Authority
|
|
80 |
Cypherpunk
|
143 |
1621 |
Cypherpunks
|
|
81 |
Polyalphabetic cipher
|
142 |
4159 |
Polyalphabetic substitution
|
|
82 |
Knapsack problem
|
139 |
2223 |
0/1 knapsack problem
|
|
83 |
Adi Shamir
|
135 |
2830 |
|
|
84 |
Skipjack (cipher)
|
134 |
3692 |
Skipjack encryption algorithm
|
|
85 |
Secure shell
|
134 |
3626 |
SSH
--
Secure Shell
--
Ssh
|
|
86 |
Transposition cipher
|
133 |
7779 |
Transposition (cryptography)
--
Columnar disposition
--
Transposition (cipher)
|
|
87 |
Pretty Good Privacy
|
133 |
28570 |
PrettyGoodPrivacy
--
PGP
--
Pgp
|
|
88 |
Meet-in-the-middle attack
|
129 |
2170 |
|
|
89 |
Key (cryptography)
|
128 |
7368 |
CryptographY/Keys
--
Cryptography/Key
--
Secret key
--
Cryptographic keys
--
Cryptographic key
|
|
90 |
RIPEMD
|
126 |
2604 |
RIPEMD-160
|
|
91 |
Illegal prime
|
126 |
3745 |
Illegal prime number
|
|
92 |
Blum Blum Shub
|
126 |
2513 |
Blum Blum Shub generator
|
|
93 |
Fritz-chip
|
124 |
11332 |
|
|
94 |
Scytale
|
123 |
4652 |
Skytale
|
|
95 |
Invisible ink
|
123 |
3893 |
|
|
96 |
Advanced Encryption Standard process
|
121 |
2512 |
AES process
--
AES competition
--
AES contest
--
Advanced Encryption Standard competition
--
AES candidate
|
|
97 |
Deniable encryption
|
119 |
2060 |
Deniable Encryption
|
|
98 |
Voynich manuscript
|
117 |
38042 |
Voynich Manuscript
--
Voynich
--
Voynich MS
|
|
99 |
Rabin cryptosystem
|
117 |
10488 |
|
|
100 |
Plaintext
|
115 |
5249 |
|
|
101 |
National Cryptologic Museum
|
114 |
545 |
National cryptologic museum
|
|
102 |
Confidentiality
|
114 |
2056 |
Data confidentiality
|
|
103 |
Weak key
|
113 |
3961 |
|
|
104 |
Diffie-Hellman key exchange
|
113 |
9947 |
Diffie-Hellman
--
Diffie Hellman
--
Diffie-Hellman-Merkle key exchange
--
Diffie-Hellman-Merkle
--
Diffie-Hellman key agreement
|
|
105 |
Content-scrambling system
|
112 |
2426 |
Content Scrambling System
--
Content scrambling system
|
|
106 |
RC2
|
110 |
3383 |
|
|
107 |
Geheimfernschreiber
|
110 |
3255 |
STURGEON (cryptography)
|
|
108 |
Security engineering
|
107 |
2579 |
|
|
109 |
SIGABA
|
106 |
9000 |
Sigaba
--
ECM Mark II
|
|
110 |
Public key certificate
|
105 |
4773 |
Digital certificate
--
Digital Certificate
--
Identity certificate
--
Digital identity certificate
|
|
111 |
XSL attack
|
103 |
9990 |
|
|
112 |
Security through obscurity
|
103 |
8332 |
Security by obscurity
|
|
113 |
Autokey cipher
|
103 |
3820 |
|
|
114 |
Magic (cryptography)
|
101 |
12477 |
Magic cryptography
|
|
115 |
ElGamal discrete log cryptosystem
|
101 |
2938 |
Elgamal discrete logarithm cryptosystem
--
El Gamal discrete log cryptosystem
--
ElGamal
--
El Gamal
--
Elgamal
--
Elgamal discrete log cryptosystem
|
|
116 |
Dmitry Sklyarov
|
99 |
2832 |
Dmitri Sklyarov
--
Dimitri Sklyarov
--
Dimitri Skylarov
--
Sklyarov
--
Dimitry Sklyarov
--
Dimitry Sklyarov
--
Dimitry Sklyarov
|
|
117 |
SHA family
|
96 |
10977 |
SHA
--
SHA1
--
SHA-256
--
SHA-384
--
SHA-512
--
SHA-1
--
Secure Hash Algorithm family
--
Secure Hash Algorithm
--
SHA-0
--
SHA512
|
|
118 |
EFF DES cracker
|
96 |
3960 |
Deep Crack
--
Deep crack
--
DES cracker
|
|
119 |
SIGINT
|
95 |
2944 |
Signals intelligence
--
Sigint
--
Signals Intelligence
--
Signal intelligence
|
|
120 |
RSA number
|
93 |
13287 |
RSA numbers
|
|
121 |
Key size
|
93 |
8328 |
Cryptography/key length
--
Cryptographic key length
--
Key length
|
|
122 |
RC5
|
92 |
2767 |
RC5 cipher
--
RC5 encryption algorithm
|
|
123 |
Collision attack
|
92 |
348 |
|
|
124 |
Alice and Bob
|
92 |
4303 |
Characters in cryptography
|
|
125 |
OpenSSL
|
91 |
970 |
Openssl
|
|
126 |
Web of trust
|
90 |
6797 |
Web of Trust
|
|
127 |
The Gold Bug
|
90 |
2121 |
|
|
128 |
Digital Fortress
|
90 |
1184 |
|
|
129 |
Crib
|
90 |
1334 |
Cribbing
|
|
130 |
SEED
|
89 |
419 |
SEED (cipher)
|
|
131 |
Beale ciphers
|
89 |
6121 |
Beale Ciphers
|
|
132 |
Linear cryptanalysis
|
88 |
1758 |
|
|
133 |
S/MIME
|
87 |
902 |
Smime
--
SMIME
|
|
134 |
Pseudonymity
|
87 |
2790 |
|
|
135 |
SSH file transfer protocol
|
86 |
1672 |
Secure file transfer program
|
|
136 |
OpenSSH
|
85 |
3512 |
Openssh
|
|
137 |
802.11i
|
85 |
1135 |
IEEE 802.11i
--
WEP2
--
WPA2
|
|
138 |
MD4
|
84 |
1360 |
|
|
139 |
Electronic money
|
84 |
1651 |
Digital cash
--
EFT
--
Electronic cash
|
|
140 |
Cryptographic protocol
|
84 |
1514 |
Cyptographic protocol
--
Security protocol
|
|
141 |
Code (cryptography)
|
84 |
7701 |
Codetext
|
|
142 |
Adversary
|
84 |
1877 |
|
|
143 |
XTEA
|
83 |
4138 |
|
|
144 |
Discrete logarithm
|
83 |
2293 |
Discrete log problem
--
Discrete logarithm problem
--
Discrete logarithms
--
Discrete log
|
|
145 |
Anonymous remailer
|
83 |
14590 |
Anonymous Remailer
--
Remailer
|
|
146 |
OpenPGP
|
82 |
688 |
RFC 2440
|
|
147 |
MD5CRK
|
82 |
2781 |
|
|
148 |
Traffic analysis
|
81 |
7292 |
|
|
149 |
Computer surveillance
|
80 |
7294 |
|
|
150 |
Communications Security Establishment
|
80 |
2100 |
|
|
151 |
Preimage attack
|
79 |
382 |
|
|
152 |
MI8
|
78 |
1266 |
|
|
153 |
Bruce Schneier
|
78 |
2342 |
Schneier
|
|
154 |
Decipherment
|
77 |
1480 |
Decipher
--
Decypher
|
|
155 |
Ron Rivest
|
76 |
2132 |
Rivest
--
Ronald Rivest
--
Ronald L. Rivest
|
|
156 |
Linear feedback shift register
|
76 |
2242 |
LFSR
|
|
157 |
Secret sharing
|
75 |
10531 |
Key splitting
|
|
158 |
GNU Privacy Guard
|
75 |
6251 |
Gnu Privacy Guard
--
GPG
--
GnuPG
--
Gnupg
--
GNUPG
|
|
159 |
Confusion and diffusion
|
75 |
1716 |
Diffusion (cryptography)
--
Confusion (cryptography)
--
Diffusion and confusion
|
|
160 |
Avalanche effect
|
75 |
1879 |
Avalanche (cryptography)
|
|
161 |
The Magic Words are Squeamish Ossifrage
|
73 |
2685 |
Squeamish ossifrage
|
|
162 |
TKIP
|
71 |
1195 |
|
|
163 |
Defence Signals Directorate
|
71 |
943 |
|
|
164 |
Wikipedia:WikiProject Cryptography [[Talk:Wikipedia:WikiProject Cryptography| ]] |
70 |
12011 |
User:Matt Crypto/prop[[Talk:User:Matt Crypto/prop| ]]--
Wikipedia:WikiProject Cryptology[[Talk:Wikipedia:WikiProject Cryptology| ]] |
|
165 |
TICOM
|
70 |
1185 |
|
|
166 |
RC6
|
70 |
1421 |
RC6 cipher
--
RC6 encryption algorithm
|
|
167 |
List of famous ciphertexts
|
70 |
548 |
Famous ciphertexts
|
|
168 |
Cryptogram
|
70 |
1215 |
|
|
169 |
KL-7
|
69 |
3814 |
|
|
170 |
IPsec
|
69 |
8845 |
RFC 2401
--
IPSEC
--
Authentication Header
--
Encapsulating Security Payload
--
IPSec
--
IPsec implementations
|
|
171 |
William F. Friedman
|
68 |
11954 |
William Friedman
--
William Frederick Friedman
--
Wolfe Frederick Friedman
|
|
172 |
Khufu and Khafre
|
68 |
4898 |
Khafre (cipher)
--
Khufu (cipher)
|
|
173 |
Replay attack
|
67 |
1595 |
|
|
174 |
Initialization vector
|
67 |
1874 |
Initialisation vector
|
|
175 |
FISH (cryptography)
|
67 |
1311 |
|
|
176 |
Dictionary attack
|
67 |
2734 |
|
|
177 |
Computer insecurity
|
67 |
13931 |
|
|
178 |
Polybius square
|
66 |
3213 |
|
|
179 |
Lucifer (cipher)
|
65 |
3954 |
Lucifer cipher
|
|
180 |
Export of cryptography
|
65 |
11772 |
|
|
181 |
Feistel cipher
|
64 |
3491 |
Feistel network
--
Feistel scheme
--
Feistel
|
|
182 |
Classical cipher
|
64 |
800 |
Classical cryptography
|
|
183 |
Block size (cryptography)
|
64 |
2183 |
|
|
184 |
A5/1
|
64 |
7257 |
A5 (cryptography)
|
|
185 |
Substitution-permutation network
|
63 |
1087 |
SP-network
--
SPN
--
Substitution-Permutation network
|
|
186 |
Hebern rotor machine
|
63 |
6767 |
Hebern Rotor Machine
|
|
187 |
Quadratic sieve
|
62 |
11164 |
Multiple Polynomial Quadratic Sieve
|
|
188 |
Johannes Trithemius
|
62 |
4041 |
|
|
189 |
Leone Battista Alberti
|
61 |
5229 |
Leone Battista Alrerti
--
Leon Battista Alberti
--
Alberti, Leone Battista
--
Leone Alberti
|
|
190 |
Chosen plaintext attack
|
61 |
2016 |
Chosen plaintext
--
Chosen-text attack
--
Chosen-plaintext attack
--
Chosen-plaintext
--
Adaptive chosen-plaintext attack
--
Adaptive chosen plaintext attack
|
|
191 |
Zero-knowledge proof
|
60 |
6332 |
Zero knowledge proof
--
Zero-knowledge
|
|
192 |
Chaffing and winnowing
|
60 |
716 |
|
|
193 |
Dorabella Cipher
|
59 |
490 |
|
|
194 |
Tiger (hash)
|
58 |
731 |
Tiger hash function
--
Tiger (cryptography)
|
|
195 |
Government Communications Headquarters
|
58 |
4047 |
GCHQ
--
GC&CS
--
Government Code and Cypher School
--
Government Code and Cipher School
--
Communications-Electronics Security Group
--
CESG
|
|
196 |
CAST-128
|
58 |
2790 |
CAST5
--
CAST
--
CAST-5
|
|
197 |
Books on cryptography
|
58 |
16355 |
|
|
198 |
Rubber-hose cryptanalysis
|
57 |
2543 |
Rubber hose cryptanalysis
|
|
199 |
Ross Anderson
|
57 |
1709 |
Ross J. Anderson
|
|
200 |
Distributed.net
|
57 |
1137 |
|
|
201 |
Wired Equivalent Privacy
|
56 |
3326 |
WEP
|
|
202 |
Null cipher
|
56 |
1124 |
Null cypher
|
|
203 |
Max Newman
|
56 |
1516 |
Maxwell Newman
|
|
204 |
Hashcash
|
55 |
3076 |
|
|
205 |
Fortezza
|
55 |
1280 |
KOV-8
|
|
206 |
Gardening (cryptanalysis)
|
54 |
1048 |
|
|
207 |
Clifford Cocks
|
54 |
1942 |
|
|
208 |
Clipper chip
|
53 |
4545 |
Clipper Chip
|
|
209 |
Playfair cipher
|
52 |
5154 |
Playfair
--
Playfair square
|
|
210 |
Message Authentication Code
|
52 |
1309 |
Message authentication code
|
|
211 |
Substitution box
|
50 |
6284 |
S-box
--
Cryptography/s-box
--
Substitution boxes
|
|
212 |
Snake oil (cryptography)
|
50 |
9433 |
Snake oil cryptography
|
|
213 |
Physical security
|
50 |
1596 |
Physical Security
|
|
214 |
Lorenz cypher
|
50 |
2646 |
Tunny (cryptography)
--
Lorenz cipher
--
Fish cyphers
--
TUNNY
--
Fish ciphers
--
Lorentz Cipher
--
Lorentz Cypher
--
Lorenz Machine
--
Lorentz Machine
|
|
215 |
JN-25
|
50 |
2478 |
|
|
216 |
Secure cryptoprocessor
|
49 |
2889 |
|
|
217 |
Kasiski examination
|
48 |
2760 |
Kasiski test
|
|
218 |
Steganalysis
|
47 |
4527 |
|
|
219 |
STU-III
|
47 |
4236 |
|
|
220 |
Leonard Adleman
|
47 |
2595 |
Len Adleman
--
Adleman
--
Leonard M. Adleman
--
Adleman, Leonard
|
|
221 |
KASUMI
|
47 |
1494 |
Kasumi (cipher)
|
|
222 |
Daniel J. Bernstein
|
47 |
919 |
Dan Bernstein
--
D. J. Bernstein
--
Daniel Bernstein
--
Djb
|
|
223 |
Secret decoder ring
|
45 |
897 |
|
|
224 |
RSA Factoring Challenge
|
44 |
1530 |
|
|
225 |
NSA encryption systems
|
44 |
15126 |
|
|
226 |
Chosen ciphertext attack
|
44 |
1013 |
|
|
227 |
Affine cipher
|
44 |
1486 |
|
|
228 |
Serpent (cipher)
|
43 |
1364 |
Serpent encryption algorithm
|
|
229 |
Permutation cipher
|
43 |
2076 |
|
|
230 |
MARS
|
43 |
996 |
Mars (cipher)
|
|
231 |
List of cryptographers
|
43 |
11426 |
Cryptographer
--
Cryptographers
--
Cryptologist
--
List of cryptologists
|
|
232 |
Enigmail
|
43 |
914 |
|
|
233 |
S-1
|
42 |
882 |
S-1 block cipher
|
|
234 |
Merkle-Hellman
|
42 |
2370 |
|
|
235 |
Key schedule
|
42 |
1316 |
Key scheduling
--
Subkey
|
|
236 |
HAVAL
|
42 |
2183 |
|
|
237 |
New Zealand Government Communications Security Bureau
|
41 |
1262 |
Government Communications Security Bureau
|
|
238 |
Index of coincidence
|
41 |
2858 |
Coincidence counting
|
|
239 |
Cipherspace
|
41 |
923 |
|
|
240 |
Adaptive chosen ciphertext attack
|
41 |
2203 |
Adaptive chosen-ciphertext attack
|
|
241 |
GOST
|
40 |
3123 |
|
|
242 |
FEAL
|
40 |
4829 |
|
|
243 |
Diplomatic bag
|
40 |
1456 |
Diplomatic pouch
|
|
244 |
Challenge–response authentication
|
40 |
2274 |
|
|
245 |
Book cipher
|
40 |
831 |
|
|
246 |
Arthur Scherbius
|
40 |
1865 |
|
|
247 |
Square (cipher)
|
39 |
1181 |
|
|
248 |
MD2
|
39 |
1149 |
Message Digest Algorithm 2
|
|
249 |
Covert channel
|
39 |
1439 |
|
|
250 |
The Codebreakers
|
38 |
1110 |
|
|
251 |
SAFER
|
38 |
5605 |
SAFER-K
--
SAFER (cipher)
--
SAFER SK
--
SAFER plus
--
SAFER plus plus
|
|
252 |
RSA Security
|
38 |
777 |
RSA Data Security
--
RSA Laboratories
|
|
253 |
MacGuffin (cipher)
|
38 |
3265 |
|
|
254 |
KW-26
|
38 |
4250 |
|
|
255 |
Cipher Block Chaining
|
38 |
1548 |
|
|
256 |
Cardan grille
|
38 |
494 |
|
|
257 |
CRYPTREC
|
38 |
9428 |
|
|
258 |
Tabula recta
|
37 |
1685 |
|
|
259 |
Red Pike
|
37 |
1489 |
Red pike
|
|
260 |
NESSIE
|
37 |
3611 |
|
|
261 |
Key exchange
|
37 |
4058 |
|
|
262 |
ADFGVX cipher
|
37 |
3542 |
ADFGVX
|
|
263 |
Shugborough House inscription
|
36 |
1557 |
|
|
264 |
Room 40
|
36 |
2720 |
|
|
265 |
PC Bruno
|
36 |
1809 |
|
|
266 |
One way function
|
36 |
2565 |
One-way
--
One way
|
|
267 |
Microdot
|
36 |
1685 |
|
|
268 |
Security protocol notation
|
35 |
973 |
|
|
269 |
Secure channel
|
35 |
3599 |
|
|
270 |
Secure FTP
|
35 |
1315 |
|
|
271 |
SIGSALY
|
35 |
6480 |
|
|
272 |
Product cipher
|
35 |
921 |
|
|
273 |
Padding (cryptography)
|
35 |
2881 |
|
|
274 |
Key management
|
35 |
1579 |
Key management protocol
|
|
275 |
Iraqi block cipher
|
35 |
580 |
Iraqi Block Cipher
|
|
276 |
EKMS
|
35 |
5662 |
Electronic Key Management System
|
|
277 |
Decrypt
|
35 |
731 |
|
|
278 |
Cryptography standards
|
35 |
4621 |
|
|
279 |
A5/2
|
35 |
601 |
|
|
280 |
Whitfield Diffie
|
34 |
2304 |
Diffie
|
|
281 |
Unicity distance
|
34 |
2667 |
Spurious key
|
|
282 |
Tiny Encryption Algorithm
|
34 |
4516 |
TEA
|
|
283 |
Russian copulation
|
34 |
1445 |
|
|
284 |
PKCS
|
34 |
3734 |
|
|
285 |
KY-57
|
34 |
999 |
VINSON device
|
|
286 |
CAST-256
|
34 |
1469 |
|
|
287 |
Arne Beurling
|
34 |
1412 |
|
|
288 |
40-bit encryption
|
34 |
2334 |
40 bit encryption
|
|
289 |
Side channel attack
|
33 |
6001 |
|
|
290 |
Running key cipher
|
33 |
7964 |
|
|
291 |
NewDES
|
33 |
3291 |
|
|
292 |
NTLM
|
33 |
1975 |
|
|
293 |
Mod n cryptanalysis
|
33 |
2531 |
Mod-n cryptanalysis
|
|
294 |
Key authentication
|
33 |
2643 |
|
|
295 |
GnuTLS
|
33 |
743 |
|
|
296 |
Cleartext
|
33 |
1477 |
Clear message
--
In clear
--
In the clear
|
|
297 |
Auguste Kerckhoffs
|
33 |
2927 |
|
|
298 |
Yarrow algorithm
|
32 |
1117 |
|
|
299 |
Salt (cryptography)
|
32 |
759 |
|
|
300 |
Key escrow
|
32 |
1779 |
|
|
301 |
GMR
|
32 |
1135 |
|
|
302 |
Camellia (cipher)
|
32 |
1704 |
|
|
303 |
Bernstein v. United States
|
32 |
1489 |
Bernstein v. U.S. Dept. of State
|
|
304 |
Trusted third party
|
31 |
3564 |
Trusted Third Party
|
|
305 |
Taher ElGamal
|
31 |
1824 |
Taher El-Gamal
--
Taher Elgamal
|
|
306 |
Snuffle
|
31 |
1107 |
|
|
307 |
Cryptographic engineering
|
31 |
7785 |
|
|
308 |
Ciphertext-only attack
|
31 |
1019 |
Ciphertext only attack
--
Ciphertext-only
|
|
309 |
Kerckhoffs' law
|
30 |
4087 |
Kerckhoff's principle
--
Kerckhoffs' principle
--
Shannon's maxim
--
Kerkhoffs' law
--
Kerkhoffs law
--
Kerckhoffs law
--
Kirckhoffs law
--
Kerkchoffs law
--
Kerchoffs law
--
Kerchoff's law
--
Kerchoff's Law
--
Shannon's Maxim
--
Kerchoffs' Law
--
Kerckhoffs' Law
--
Kerchkoffs' Law
--
Kerkhoffs' Law
|
|
310 |
3-Way
|
30 |
1777 |
3-WAY
|
|
311 |
Tommy Flowers
|
29 |
1962 |
Tommy flowers
--
Thomas Flowers
--
Thomas Harold Flowers
|
|
312 |
Straddling checkerboard
|
29 |
5879 |
|
|
313 |
RSA-2048
|
29 |
2509 |
|
|
314 |
Needham-Schroeder
|
29 |
1892 |
|
|
315 |
Wide Mouth Frog
|
28 |
1002 |
|
|
316 |
Ralph Merkle
|
28 |
1792 |
|
|
317 |
Piling-up lemma
|
28 |
4106 |
Piling up lemma
|
|
318 |
Phil Zimmermann
|
28 |
2321 |
PhilZimmermann
--
Philip Zimmermann
|
|
319 |
PURPLE
|
28 |
4151 |
Purple code
--
Purple (cryptography)
|
|
320 |
Hushmail
|
28 |
1489 |
|
|
321 |
Friedrich Kasiski
|
28 |
2803 |
Kasiski
--
Friedrich Wilhelm Kasiski
|
|
322 |
David Kahn
|
28 |
1931 |
|
|
323 |
Type 1 encryption
|
27 |
980 |
Type 1 algorithm
--
Type 1 product
--
High-grade encryption
--
Type I encryption
|
|
324 |
RSA-100
|
27 |
522 |
|
|
325 |
Malleability
|
27 |
633 |
Malleable
--
Maellability
|
|
326 |
Hans Thilo-Schmidt
|
27 |
1850 |
Asch
--
Hans Thilo Schmidt
|
|
327 |
Financial cryptography
|
27 |
347 |
|
|
328 |
Communication Theory of Secrecy Systems
|
27 |
662 |
|
|
329 |
Secure Terminal Equipment
|
26 |
1721 |
STE
|
|
330 |
Passphrase
|
26 |
5716 |
Pass-phrase
--
Pass phrase
|
|
331 |
OMAC
|
26 |
637 |
|
|
332 |
Josef Pieprzyk
|
26 |
176 |
|
|
333 |
Horst Feistel
|
26 |
2462 |
|
|
334 |
FNBDT
|
26 |
5772 |
|
|
335 |
SEAL (cipher)
|
25 |
436 |
SEAL (cryptography)
|
|
336 |
MISTY1
|
25 |
1644 |
MISTY-1
--
MISTY
|
|
337 |
Known-plaintext attack
|
25 |
767 |
Known plaintext attack
--
Known plaintext
|
|
338 |
Elliptic Curve DSA
|
25 |
759 |
ECDSA
|
|
339 |
DigiCipher 2
|
25 |
1545 |
|
|
340 |
David Chaum
|
25 |
339 |
|
|
341 |
The Alphabet Cipher
|
24 |
3442 |
|
|
342 |
Tamper resistance
|
24 |
1959 |
Tamper-resistant
--
Tamper resistant
--
Tamper-resistance
|
|
343 |
Secure multiparty computation
|
24 |
3172 |
Millionaire problem
|
|
344 |
RSA-640
|
24 |
735 |
|
|
345 |
RSA-129
|
24 |
1222 |
|
|
346 |
Madryga
|
24 |
4492 |
|
|
347 |
Keyed-hash message authentication code
|
24 |
1171 |
HMAC
--
Keyed-Hashing Message Authentication
--
Hmac
|
|
348 |
Key generation
|
24 |
1562 |
|
|
349 |
DES-X
|
24 |
1683 |
DESX
|
|
350 |
RSA-140
|
23 |
1230 |
|
|
351 |
RSA-1024
|
23 |
872 |
|
|
352 |
Martin Hellman
|
23 |
1329 |
|
|
353 |
ISAAC (cipher)
|
23 |
1698 |
ISAAC
--
ISAAC (cryptography)
|
|
354 |
Helix (cipher)
|
23 |
1765 |
|
|
355 |
Elizebeth Friedman
|
23 |
11786 |
Elizabeth Friedman
|
|
356 |
David Wagner
|
23 |
1933 |
|
|
357 |
Cryptome
|
23 |
1173 |
Cryptome.org
|
|
358 |
Cryptologia
|
23 |
451 |
|
|
359 |
Common Scrambling Algorithm
|
23 |
1971 |
|
|
360 |
Blind signature
|
23 |
3755 |
|
|
361 |
Al Bhed
|
23 |
2510 |
|
|
362 |
VIC cipher
|
22 |
1121 |
|
|
363 |
Session key
|
22 |
1592 |
|
|
364 |
SHARK
|
22 |
1468 |
Shark (cipher)
--
SHARK (cipher)
|
|
365 |
Poem code
|
22 |
1570 |
|
|
366 |
Leo Marks
|
22 |
7538 |
Leopold Samuel Marks
|
|
367 |
KHAZAD
|
22 |
1480 |
Khazad (cipher)
--
KHAZAD (cipher)
|
|
368 |
Henryk Zygalski
|
22 |
627 |
|
|
369 |
Central Security Service
|
22 |
947 |
|
|
370 |
TWIRL
|
21 |
1770 |
|
|
371 |
SHACAL
|
21 |
2710 |
SHACAL-1
--
Shacal-2
|
|
372 |
RSA-576
|
21 |
1119 |
|
|
373 |
KW-37
|
21 |
3688 |
KWR-37
--
KWT-37
|
|
374 |
John Tiltman
|
21 |
3149 |
|
|
375 |
Jerzy Rozycki
|
21 |
1088 |
Jerzy Różycki[[Talk:Jerzy R%F3%C5%BCycki| ]] |
|
376 |
EFS
|
21 |
1523 |
|
|
377 |
David Wheeler
|
21 |
814 |
|
|
378 |
DES supplementary material
|
21 |
7677 |
|
|
379 |
Agnes Meyer Driscoll
|
21 |
3301 |
|
|
380 |
TrueCrypt
|
20 |
1478 |
Truecrypt
|
|
381 |
Shrinking generator
|
20 |
1152 |
|
|
382 |
Electronic signature
|
20 |
1367 |
|
|
383 |
DEAL
|
20 |
1447 |
|
|
384 |
CAcert
|
20 |
392 |
|
|
385 |
Baby-step giant-step
|
20 |
1142 |
BSGS
|
|
386 |
Arlington Hall
|
20 |
1590 |
|
|
387 |
Visual cryptography
|
19 |
986 |
|
|
388 |
Snefru
|
19 |
1116 |
Snefru (cryptography)
|
|
389 |
RSA-130
|
19 |
1351 |
|
|
390 |
Lars Knudsen
|
19 |
1668 |
Lars R. Knudsen
|
|
391 |
Great Cypher
|
19 |
829 |
Great Cipher
|
|
392 |
CRYPTO
|
19 |
756 |
|
|
393 |
CCMP
|
19 |
286 |
|
|
394 |
Semantic security
|
18 |
1643 |
|
|
395 |
Scrambler
|
18 |
2458 |
Descrambler
|
|
396 |
Pike (cipher)
|
18 |
637 |
Pike (cryptography)
|
|
397 |
Oblivious transfer
|
18 |
899 |
|
|
398 |
M-209
|
18 |
16425 |
|
|
399 |
Internet Security Association and Key Management Protocol
|
18 |
486 |
ISAKMP
|
|
400 |
Frank Rowlett
|
18 |
2867 |
|
|
401 |
Don Coppersmith
|
18 |
829 |
Donald Coppersmith
|
|
402 |
Burrows-Abadi-Needham logic
|
18 |
9097 |
BAN logic
--
BAN Logic
|
|
403 |
Bifid cipher
|
18 |
1536 |
|
|
404 |
WAKE
|
17 |
650 |
|
|
405 |
Vincent Rijmen
|
17 |
1325 |
|
|
406 |
Secure copy
|
17 |
1690 |
SCP
--
Scp
--
Secure Copy Protocol
--
Secure Copy
|
|
407 |
Online Certificate Status Protocol
|
17 |
495 |
Ocsp
--
OCSP
|
|
408 |
M-94
|
17 |
3032 |
M-94 (cypher)
|
|
409 |
Internet key exchange
|
17 |
807 |
IKE
--
Internet Key Exchange
|
|
410 |
Herbert Yardley
|
17 |
6638 |
Herbert O. Yardley
|
|
411 |
Digital timestamping
|
17 |
2011 |
|
|
412 |
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
|
17 |
525 |
|
|
413 |
Certificate revocation list
|
17 |
3553 |
CRL
--
Certificate Revocation List
--
Compromised key list
|
|
414 |
W. T. Tutte
|
16 |
1698 |
Bill Tutte
|
|
415 |
Trapdoor function
|
16 |
1463 |
Trapdoor one way function
--
Trapdoor permutation
|
|
416 |
Secure Communication based on Quantum Cryptography
|
16 |
978 |
SECOQC
|
|
417 |
RED/BLACK concept
|
16 |
806 |
RED signal
|
|
418 |
Merkle's Puzzles
|
16 |
1684 |
Merkle's puzzles
--
Ralph Merkle puzzle cryptographic system
|
|
419 |
MAGENTA
|
16 |
1736 |
MAGENTA (cipher)
|
|
420 |
LOKI
|
16 |
2934 |
LOKI91
--
LOKI89
|
|
421 |
Key signing party
|
16 |
1514 |
Keysigning party
|
|
422 |
Key distribution center
|
16 |
2297 |
KDC
|
|
423 |
Eli Biham
|
16 |
725 |
|
|
424 |
AxCrypt
|
16 |
299 |
|
|
425 |
Zeroise
|
15 |
2504 |
Zeroization
|
|
426 |
Type 4 encryption
|
15 |
627 |
Type 4 algorithm
|
|
427 |
Timing attack
|
15 |
1795 |
|
|
428 |
TWINKLE
|
15 |
2690 |
|
|
429 |
Stunnel
|
15 |
564 |
|
|
430 |
SYSKEY
|
15 |
1055 |
|
|
431 |
Root certificate
|
15 |
1548 |
|
|
432 |
RSA-768
|
15 |
767 |
|
|
433 |
RSA-160
|
15 |
1212 |
|
|
434 |
PMAC
|
15 |
706 |
|
|
435 |
Louis W. Tordella
|
15 |
3060 |
|
|
436 |
LOKI97
|
15 |
1553 |
|
|
437 |
Key-agreement protocol
|
15 |
1529 |
|
|
438 |
Babington Plot
|
15 |
1437 |
Babington plot
--
Anthony Babington's plot
|
|
439 |
Type 2 encryption
|
14 |
1060 |
Type 2 product
|
|
440 |
Simple public key infrastructure
|
14 |
462 |
Simple Public Key Infrastructure
--
SPKI
|
|
441 |
RSA-1536
|
14 |
1046 |
|
|
442 |
RSA-150
|
14 |
880 |
|
|
443 |
RSA-120
|
14 |
561 |
|
|
444 |
Privacy-enhanced Electronic Mail
|
14 |
308 |
Privacy-enhanced electronic mail
--
Privacy Enhanced Mail
|
|
445 |
NTRUEncrypt
|
14 |
1404 |
NTRU
|
|
446 |
Key server
|
14 |
1197 |
|
|
447 |
Joan Daemen
|
14 |
512 |
|
|
448 |
James H. Ellis
|
14 |
2321 |
|
|
449 |
ID-based cryptography
|
14 |
2316 |
ID Based Cryptography
|
|
450 |
Hugo Hadwiger
|
14 |
859 |
|
|
451 |
Ciphony
|
14 |
811 |
|
|
452 |
The Code Book
|
13 |
2658 |
|
|
453 |
RSA-170
|
13 |
491 |
|
|
454 |
Niels Ferguson
|
13 |
659 |
|
|
455 |
Mitsuru Matsui
|
13 |
758 |
|
|
456 |
McEliece
|
13 |
1155 |
|
|
457 |
Communications security
|
13 |
2069 |
COMSEC
|
|
458 |
BATON
|
13 |
1708 |
|
|
459 |
Yuliang Zheng
|
12 |
373 |
|
|
460 |
World War II cryptography
|
12 |
1944 |
|
|
461 |
RSA-110
|
12 |
542 |
|
|
462 |
Paillier cryptosystem
|
12 |
1005 |
Paillier
|
|
463 |
N-Hash
|
12 |
1076 |
N-hash
|
|
464 |
MMB
|
12 |
1170 |
|
|
465 |
Joseph Mauborgne
|
12 |
352 |
|
|
466 |
Gilbert Vernam
|
12 |
1441 |
|
|
467 |
Dining cryptographers protocol
|
12 |
973 |
Dining cryptographers
--
Dining cryptographer
--
Dining Cryptographers Protocol
--
Dining cryptographer protocol
--
Dining cryptographer's protocol
|
|
468 |
Cryptographic Message Syntax
|
12 |
843 |
|
|
469 |
Crypto system
|
12 |
1975 |
Cryptosystem
|
|
470 |
Boris Hagelin
|
12 |
1360 |
|
|
471 |
Blind credential
|
12 |
992 |
|
|
472 |
Attacker
|
12 |
285 |
|
|
473 |
Strict avalanche criterion
|
11 |
681 |
Strict Avalanche Criterion
|
|
474 |
Shafi Goldwasser
|
11 |
1774 |
Shafrira Goldwasser
|
|
475 |
Secrets and Lies
|
11 |
198 |
|
|
476 |
SAVILLE
|
11 |
1267 |
Saville (cipher)
|
|
477 |
RSA-896
|
11 |
805 |
|
|
478 |
RSA-704
|
11 |
735 |
|
|
479 |
RSA-480
|
11 |
849 |
|
|
480 |
RSA-310
|
11 |
655 |
|
|
481 |
KOV-14
|
11 |
668 |
Fortezza Plus
|
|
482 |
KCDSA
|
11 |
858 |
EC-KCDSA
|
|
483 |
Edward Hebern
|
11 |
1838 |
Edward Hugh Hebern
|
|
484 |
Challenge–response test
|
11 |
825 |
Challenge–response system
|
|
485 |
Certification path validation algorithm
|
11 |
306 |
|
|
486 |
Certicom
|
11 |
717 |
|
|
487 |
COMSEC equipment
|
11 |
340 |
|
|
488 |
AN/CYZ-10
|
11 |
1214 |
AN/CYZ-10 DTD
|
|
489 |
Superencryption
|
10 |
202 |
|
|
490 |
Schnorr signature
|
10 |
1205 |
|
|
491 |
Random oracle
|
10 |
1139 |
Random oracle model
|
|
492 |
RSA-410
|
10 |
767 |
|
|
493 |
RSA-250
|
10 |
571 |
|
|
494 |
RSA-155
|
10 |
1406 |
|
|
495 |
Probabilistic encryption
|
10 |
1442 |
Probabilistic Encryption
|
|
496 |
Message forgery
|
10 |
240 |
|
|
497 |
Information-theoretically secure
|
10 |
946 |
|
|
498 |
FreeLIP
|
10 |
134 |
|
|
499 |
Direct anonymous attestation
|
10 |
285 |
|
|
500 |
Dilly Knox
|
10 |
720 |
Dilwyn Knox
|
|
501 |
Cellular Message Encryption Algorithm
|
10 |
1222 |
CMEA (cipher)
|
|
502 |
VINSON
|
9 |
626 |
|
|
503 |
SecurID
|
9 |
1457 |
|
|
504 |
RSA-617
|
9 |
1022 |
|
|
505 |
RSA-500
|
9 |
869 |
|
|
506 |
RSA-440
|
9 |
797 |
|
|
507 |
RSA-330
|
9 |
675 |
|
|
508 |
RSA-230
|
9 |
563 |
|
|
509 |
RSA-200
|
9 |
521 |
|
|
510 |
Power analysis
|
9 |
3461 |
|
|
511 |
Otway-Rees
|
9 |
1274 |
|
|
512 |
NSA encryption algorithms
|
9 |
4758 |
|
|
513 |
I. J. Good
|
9 |
1665 |
I.J. Good
--
Irving Good
|
|
514 |
Crypto-society
|
9 |
1048 |
Crypto-societies
|
|
515 |
Blinding (cryptography)
|
9 |
1631 |
Blinding
|
|
516 |
Bazeries cylinder
|
9 |
12555 |
Bazeries Cylinder
|
|
517 |
Abraham Sinkov
|
9 |
6920 |
|
|
518 |
Type 3 encryption
|
8 |
500 |
Type 3 algorithm
|
|
519 |
Trench code
|
8 |
4412 |
|
|
520 |
Torus based cryptography
|
8 |
677 |
|
|
521 |
Solomon Kullback
|
8 |
368 |
|
|
522 |
RSA-450
|
8 |
807 |
|
|
523 |
RSA-370
|
8 |
715 |
|
|
524 |
RSA-350
|
8 |
695 |
|
|
525 |
RSA-300
|
8 |
633 |
|
|
526 |
RSA-270
|
8 |
603 |
|
|
527 |
RSA-210
|
8 |
531 |
|
|
528 |
Peter Gutmann
|
8 |
1128 |
|
|
529 |
Paul Kocher
|
8 |
1185 |
|
|
530 |
Passive attack
|
8 |
667 |
|
|
531 |
CrossCrypt
|
8 |
1560 |
|
|
532 |
S/KEY
|
7 |
514 |
S/Key
|
|
533 |
RSA-470
|
7 |
839 |
|
|
534 |
RSA-460
|
7 |
829 |
|
|
535 |
RSA-400
|
7 |
757 |
|
|
536 |
RSA-360
|
7 |
705 |
|
|
537 |
RSA-280
|
7 |
613 |
|
|
538 |
RSA-260
|
7 |
593 |
|
|
539 |
RSA-240
|
7 |
573 |
|
|
540 |
RSA-232
|
7 |
565 |
|
|
541 |
RSA-190
|
7 |
511 |
|
|
542 |
Jefferson disk
|
7 |
1440 |
|
|
543 |
George Scovell
|
7 |
842 |
|
|
544 |
Cryptology ePrint Archive
|
7 |
425 |
EPrint
|
|
545 |
Crypto AG
|
7 |
921 |
|
|
546 |
CipherSaber
|
7 |
804 |
|
|
547 |
Certificate-based encryption
|
7 |
1471 |
|
|
548 |
Cayley-Purser algorithm
|
7 |
997 |
|
|
549 |
Bit-flipping attack
|
7 |
1225 |
|
|
550 |
Self-signed certificate
|
6 |
2570 |
Self signed certificate
|
|
551 |
RSA-490
|
6 |
859 |
|
|
552 |
RSA-420
|
6 |
777 |
|
|
553 |
RSA-390
|
6 |
747 |
|
|
554 |
RSA-340
|
6 |
685 |
|
|
555 |
RSA-320
|
6 |
665 |
|
|
556 |
RSA-309
|
6 |
654 |
|
|
557 |
RSA-220
|
6 |
541 |
|
|
558 |
RSA-180
|
6 |
501 |
|
|
559 |
List of cryptographic key types
|
6 |
5044 |
Transmission security key
|
|
560 |
Link encryption
|
6 |
928 |
End-to-end encryption
--
Bulk encryption
|
|
561 |
Key derivation function
|
6 |
2370 |
|
|
562 |
Journal of Cryptology
|
6 |
320 |
Journal of cryptology
|
|
563 |
Joseph Rochefort
|
6 |
5292 |
John Joseph Rochefort
|
|
564 |
Hyperelliptic curve cryptography
|
6 |
1355 |
|
|
565 |
HAS-160
|
6 |
395 |
|
|
566 |
Garble
|
6 |
929 |
|
|
567 |
Cryptomathic
|
6 |
367 |
|
|
568 |
CryptoStick
|
6 |
505 |
|
|
569 |
Cryptanalytic computer
|
6 |
341 |
|
|
570 |
Anonymous publication
|
6 |
1617 |
|
|
571 |
WHIRLPOOL
|
5 |
610 |
Whirlpool (hash)
--
Whirlpool (algorithm)
|
|
572 |
Undeniable signature
|
5 |
1055 |
|
|
573 |
RSA-380
|
5 |
725 |
|
|
574 |
RSA-290
|
5 |
623 |
|
|
575 |
OTFE
|
5 |
188 |
|
|
576 |
Frank A. Stevenson
|
5 |
268 |
|
|
577 |
CryptoBuddy
|
5 |
516 |
|
|
578 |
Commitment scheme
|
5 |
1875 |
Bit commitment
|
|
579 |
Codress message
|
5 |
206 |
|
|
580 |
Self-certifying key
|
4 |
1148 |
Self-Certifying Keys
|
|
581 |
RSA-430
|
4 |
786 |
|
|
582 |
LibTom Project
|
4 |
1860 |
LibTomNet
--
LibTomCrypt
--
LibTomPoly
--
LibTomMath
|
|
583 |
Laurence Safford
|
4 |
3148 |
|
|
584 |
Harold Keen
|
4 |
1533 |
|
|
585 |
H.235
|
4 |
648 |
|
|
586 |
FIREFLY
|
4 |
340 |
|
|
587 |
DRYAD
|
4 |
2595 |
DRYAD (Cryptography)
|
|
588 |
Cryptographically strong
|
4 |
1263 |
|
|
589 |
Cover (telecommunications)
|
4 |
545 |
|
|
590 |
Adaptive chosen plaintext and chosen ciphertext attack
|
4 |
809 |
|
|
591 |
Scott Vanstone
|
3 |
213 |
|
|
592 |
International Association for Cryptologic Research
|
3 |
512 |
IACR
|
|
593 |
Harvest (computer)
|
3 |
2270 |
Harvest computer
|
|
594 |
Cryptography newsgroups
|
3 |
1966 |
Sci.crypt
|
|
595 |
Certificateless cryptography
|
3 |
1144 |
Certificateless Cryptography
|
|
596 |
ABA digital signature guidelines
|
3 |
909 |
|
|
597 |
Template:Block ciphers [[Talk:Template:Block ciphers| ]] |
2 |
2018 |
MediaWiki:Block ciphers[[Talk:MediaWiki:Block ciphers| ]] |
|
598 |
Cryptochannel
|
2 |
693 |
|
|
599 |
Secure key issuing cryptography
|
1 |
1183 |
Secure Key Issuing Cryptography
|
|
600 |
Derek Taunt
|
1 |
862 |
|
|
601 |
Zimmermann-Sassaman key-signing protocol
|
0 |
479 |
Zimmmermann-Sassaman key signing protocol
--
Zimmerman-Sassaman protocol
--
Zimmerman-Sassaman key-signing protocol
|
|
602 |
Vigenère cipher [[Talk:Vigen%E8re cipher| ]] |
0 |
8533 |
Vigenère Cipher[[Talk:Vigen%E8re Cipher| ]]--
Vigenère cypher[[Talk:Vigen%E8re cypher| ]]--
Vigenere cipher
|
|
603 |
Transmission security
|
0 |
922 |
TRANSEC
|
|
604 |
Template:Classical cryptography [[Talk:Template:Classical cryptography| ]] |
0 |
1116 |
MediaWiki:Classical cryptography[[Talk:MediaWiki:Classical cryptography| ]] |
|
605 |
Ståle Schumacher Ytteborg [[Talk:St%E5le Schumacher Ytteborg| ]] |
0 |
877 |
Ståle Schumacher[[Talk:St%E5le Schumacher| ]]--
Stale Schumacher
|
|
606 |
Simple XOR cipher
|
0 |
1683 |
Simple XOR Cipher
|
|
607 |
SOBER-128
|
0 |
950 |
|
|
608 |
Robert Tappan Morris, Sr.
|
0 |
568 |
|
|
609 |
NEMA (machine)
|
0 |
1682 |
|
|
610 |
Malcolm J. Williamson
|
0 |
551 |
Malcolm Williamson (cryptographer)
|
|
611 |
List of telecommunications encryption terms
|
0 |
1607 |
Glossary of telecommunications encryption terms
|
|
612 |
Le chiffre indéchiffrable [[Talk:Le chiffre ind%E9chiffrable| ]] |
0 |
2606 |
The unbreakable cypher
--
Le chifffre indechiffrable
|
|
613 |
Hill cipher
|
0 |
7707 |
|
|
614 |
Cryptographie indéchiffrable [[Talk:Cryptographie ind%E9chiffrable| ]] |
0 |
663 |
|
|
615 |
Blaise de Vigenère [[Talk:Blaise de Vigen%E8re| ]] |
0 |
1386 |
|
|
616 |
Biuro Szyfrów [[Talk:Biuro Szyfr%F3w| ]] |
0 |
2266 |
Biuro Szyfrow
|
|
617 |
Akelarre
|
0 |
1241 |
|
|
618 |
Étienne Bazeries [[Talk:%C9tienne Bazeries| ]] |
0 |
2633 |
Bazeries
--
Etienne Bazeries
|
|