Jump to content

User:He!ko/Books/Cryptography

From Wikipedia, the free encyclopedia


Encyclopedia of Cryptographie

[edit]
Cryptography
History of cryptography
Basics
Block cipher
Cryptanalysis
Cryptographic hash function
Cryptographically secure pseudorandom number generator
Digital signature
Digital watermarking
Encryption
Message authentication code
Public-key cryptography
Steganography
Stream cipher
Strong secrecy
Symmetric-key algorithm
Watermark detection
Protocols
3-D Secure
AKA (security)
Alice and Bob
Anonymous veto network
Anshel–Anshel–Goldfeld key exchange
ANSI ASC X9.95 Standard
AS1 (networking)
AS2
AuthIP
Autoroll
BitTorrent protocol encryption
CCMP
Certificate Management over CMS
Certificate Management Protocol
Certificate signing request
Certification path validation algorithm
Chaffing and winnowing
Challenge-handshake authentication protocol
Challenge-response authentication
Cipher suite
Code Access Security
Common reference string model
CRAM-MD5
Cryptographic Message Syntax
Cryptographic protocol
Cryptographically Generated Address
CrypTool
Data Validation and Certification Server
Datagram Transport Layer Security
Dead Peer Detection
Delegated Path Discovery
Delegated Path Validation
Deniable authentication
DH/DSS
Diffie–Hellman key exchange
Diffie–Hellman problem
Digest access authentication
DigiCipher 2
Digital credential
Dining cryptographers protocol
Distance-bounding protocol
Distributed System Security Architecture
Dolev-Yao model
DomainKeys
DomainKeys Identified Mail
EAP-AKA
EAP-SIM
Ecash
Electronic money
Encrypted key exchange
Extensible Authentication Protocol
Fiat-Shamir heuristic
Generic Bootstrapping Architecture
Generic Security Service Algorithm for Secret Key Transaction
Grid Security Infrastructure
Group Domain of Interpretation
H.235
Hashcash
High Assurance Internet Protocol Encryptor
Homomorphic secret sharing
Host Identity Protocol
HTTP Secure
HTTPsec
IEEE 802.11i-2004
Interlock protocol
Internet Key Exchange
Internet Security Association and Key Management Protocol
IPsec
Kerberized Internet Negotiation of Keys
Kerberos (protocol)
Key exchange
Key-agreement protocol
KMIP
Microsoft Point-to-Point Encryption
MIKEY
MS-CHAP
Multi party fair exchange protocol
Multiplexed Transport Layer Security
NAT-T
Needham-Schroeder protocol
Neuman-Stubblebine protocol
Non-interactive zero-knowledge proof
NTLM
Oak Orion
Oakley protocol
Oblivious transfer
OCSP Stapling
Off-the-Record Messaging
Offline private key protocol
Online Certificate Status Protocol
Openswan
Otway-Rees protocol
Password Authenticated Key Exchange by Juggling
Password-authenticated key agreement
Privacy-enhanced Electronic Mail
Private Communications Technology
Private information retrieval
Proactive secret sharing
Proof of knowledge
Protected Extensible Authentication Protocol
Protocol for Carrying Authentication for Network Access
Publius Publishing System
Rekeying
Renewable security
SCVP
Secret sharing
Secure channel
Secure Communications Interoperability Protocol
Secure copy
Secure file transfer program
Secure Hypertext Transfer Protocol
Secure multi-party computation
Secure Neighbor Discovery Protocol
Secure Real-time Transport Protocol
Secure Remote Password protocol
Secure Shell
Secure two-party computation
Security association
Security protocol notation
Security Protocols Open Repository
Simple Authentication and Security Layer
Simple Certificate Enrollment Protocol
Socialist millionaire
SPEKE (cryptography)
SPNEGO
SSH File Transfer Protocol
Station-to-Station protocol
StrongSwan
TACLANE
Tcpcrypt
Temporal Key Integrity Protocol
Threshold shadow scheme
TLS-PSK
Transport Layer Security
Universal composability
User:Taeshadow/Page for drafts/Homomorphic electronic voting
Vouch by Reference
Web-based SSH
Wi-Fi Protected Access
Wi-Fi Protected Setup
Wide Mouth Frog protocol
Wired Equivalent Privacy
Wireless Transport Layer Security
Witness-indistinguishable proof
WLAN Authentication and Privacy Infrastructure
X.1035
X.509
XKMS
Yahalom (protocol)
YAK (cryptography)
Yao's Millionaires' Problem
Zero-knowledge password proof
Zero-knowledge proof
Zimmermann-Sassaman key-signing protocol
ZRTP
Attacks
Acoustic cryptanalysis
Adaptive chosen-ciphertext attack
Adversary (cryptography)
Attack model
Banburismus
Birthday attack
Bit-flipping attack
Black bag operation
Black-bag cryptanalysis
Boomerang attack
Brute-force attack
Chosen-ciphertext attack
Chosen-plaintext attack
Ciphertext-only attack
Clock drift
Cold boot attack
Collision (computer science)
Collision attack
Computer forensics
Computer fraud
Contact analysis (cryptanalysis)
Correlation attack
Cryptanalytic computer
Cube attack
Custom hardware attack
Davies' attack
Decimalization table attack
Dictionary attack
Differential cryptanalysis
Differential equations of addition
Differential fault analysis
Differential-linear attack
Distinguishing attack
Distributed.net
Doubling-oriented Doche–Icart–Kohel curve
Edwards curve
Fluhrer, Mantin and Shamir attack
Frequency analysis
Gardening (cryptanalysis)
Hardware keylogger
Hessian form of an elliptic curve
Higher-order differential cryptanalysis
Impossible differential cryptanalysis
Index of coincidence
Integral cryptanalysis
Interpolation attack
Jacobian curve
John Herivel
Kasiski examination
KeeLoq
Keygen
Keystroke logging
Known-plaintext attack
LAN Manager
Linear cryptanalysis
LM hash
Man-in-the-middle attack
MD5CRK
Meet-in-the-middle attack
Message forgery
Metasploit Project
Military Cryptanalytics
Mod n cryptanalysis
Montgomery curve
Padding oracle attack
Partitioning cryptanalysis
Passive attack
Password cracking
Piling-up lemma
Power analysis
Preimage attack
Pwdump
Rainbow table
Random number generator attack
Ransomware (malware)
Related-key attack
Replay attack
Rootkit
Rotational cryptanalysis
Rubber-hose cryptanalysis
Self-service password reset
Side channel attack
Sinkov statistic
Slide attack
Small subgroup confinement attack
Steganalysis
Stream cipher attack
Supply chain attack
Table of costs of operations in elliptic curves
TEMPEST
Timing attack
Traffic analysis
Tripling-oriented Doche–Icart–Kohel curve
Truncated differential cryptanalysis
Turingery
TWINKLE
Twisted Edwards curve
Twisted Hessian curves
Twists of curves
User:TedColes/Sandbox
Watermarking attack
Weak key
XSL attack
Zendian Problem
Zygalski sheets
Algorithms
Bach's algorithm
Barrett reduction
BB84
Beaufort cipher
Block cipher modes of operation
CDMF
Ciphertext stealing
Common Scrambling Algorithm
CryptGenRandom
Crypto++
Cycles per byte
Feedback with Carry Shift Registers
Feige-Fiat-Shamir Identification Scheme
Generating primes
GGH encryption scheme
Hash chain
Industrial-grade prime
ISMACryp
JOSEKI (cipher)
Key schedule
Key Wrap
Kochanski multiplication
Linear feedback shift register
Mental poker
Modular exponentiation
Montgomery reduction
MOSQUITO
Pairing-based cryptography
Random password generator
Randomness extractor
RC algorithm
Residual block termination
Rip van Winkle cipher
Schoof's algorithm
Secret sharing using the Chinese remainder theorem
SecureLog
Shamir's Secret Sharing
Snuffle
Substitution–permutation network
Summation generator
Type 1 product
Type 2 product
Type 3 product
Type 4 product
Public-key Cryptography
CA/Browser Forum
Certificate authority
Certificate server
Certificate-based encryption
Decisional composite residuosity assumption
Detached signature
Digital Signature Algorithm
Domain Name System Security Extensions
ElGamal encryption
Hyperelliptic curve cryptography
Jumbleme (digital encryption service)
KCDSA
Keystore
McEliece cryptosystem
Merkle–Hellman knapsack cryptosystem
MQV
Niederreiter cryptosystem
Non-repudiation
Paillier cryptosystem
PKCS
Pretty Good Privacy
Public key certificate
Public key infrastructure
Rabin cryptosystem
Rabin signature algorithm
Resource Public Key Infrastructure
Revocation list
Root certificate
RSA
RSA problem
RSA/Intuative
SAFE-BioPharma Association
Self-signed certificate
Signcryption
Strong RSA assumption
Subject Alternative Name
Trusted third party
Web of trust
Wireless Public Key Infrastructure