|
- Start from scratch: edit
- Theory: Computational boundedness, Pairing-based cryptography, Lattice-based cryptography, Secure computation, Universal composability
- Hash functions: MDC-4, MASH (hash), SMASH (hash)
- Historical cryptography: TELWA, Hut 3, Hut 4
- Cipher machines: Alvis (cipher machine), SIGTOT, B-211 or B-21 (cryptography), OMI (machine), Siemens SFM T43, SA-1 (cryptography), BC-543, BC-38, Slidex, Syko, CORAL, PENELOPE, RED (cipher machine)
- Stream ciphers: SOBER, LILI-128, Correlation attack, Fast correlation attack, HBB (cipher)
- Block ciphers: Hierocrypt-L1, Grand Cru (cipher), SXAL8 / MBAL, BaseKing, Vino (cipher), E2 (cipher), SPECTR-H64, CIKS-1, FEA-M
- Block cipher misc topics: RMAC, IAPM, XECB
- Block cipher cryptanalysis: Truncated differential attack
- Boolean functions and S-boxes: bent function, T-function
- Public-key cryptography: Public key fingerprint
- Cryptographers: Joan Clarke, Hugh Foss, Oliver Strachey, Francis Fasson, Francis Birch, Leonard Hooper, Philip Rogaway, Nikita Borisov
- Expansion / stubs: (see also: Category:Cryptography stubs)
- Cryptographic primitive, Timing attack, Stream cipher, Key schedule, Skipjack (cipher), McEliece, IND-CCA, MDC-2, CBC-MAC, ElGamal signature scheme, Cyclometer, Differential-linear attack, Self-shrinking generator, Completeness (cryptography), Correlation immunity, Algebraic Normal Form, Key clustering, cryptographic nonce
- Theory: Pohlig-Hellman, Ring signature, Secure two-party computation
- Cryptographers: Alfred Menezes, Charles Rackoff, Eric Jones, Gordon Welchman, Victor S. Miller
- Protocol: WTLS (Wireless Transport Layer Security) Oakley protocol
- Stream ciphers: LEVIATHAN (cipher)
- Block ciphers: Crab, CRYPTON, DFC, MESH, Nimbus, NUSH, Q, SC2000
- Block cipher cryptanalysis: Slide attack, Integral cryptanalysis (=Square attack)
- Block cipher misc topics: CWC mode
- Misc: Watermarking attack
- People: Dan Boneh, Mihir Bellare
- Verification:
- Images:
|