Index of cryptography articles

Articles related to cryptography include:

A
A5/1  • A5/2  • ABA digital signature guidelines  • ABC (stream cipher)  • Abraham Sinkov  • Acoustic cryptanalysis  • Adaptive chosen-ciphertext attack  • Adaptive chosen plaintext and chosen ciphertext attack  • Advantage (cryptography)  • ADFGVX cipher  • Adi Shamir  • Advanced Access Content System  • Advanced Encryption Standard  • Advanced Encryption Standard process  • Adversary  • AEAD block cipher modes of operation  • Affine cipher  • Agnes Meyer Driscoll  • AKA (security)  • Akelarre (cipher)  • Alan Turing  • Alastair Denniston  • Al Bhed language  • Alex Biryukov  • Alfred Menezes  • Algebraic Eraser  • Algorithmically random sequence  • Alice and Bob  • All-or-nothing transform  • Alphabetum Kaldeorum  • Alternating step generator  • American Cryptogram Association  • AN/CYZ-10  • Anonymous publication  • Anonymous remailer  • Antoni Palluth  • Anubis (cipher)  • Argon2  • ARIA (cipher)  • Arlington Hall  • Arne Beurling  • Arnold Cipher  • Array controller based encryption  • Arthur Scherbius  • Arvid Gerhard Damm  • Asiacrypt  • Atbash  • Attribute-based encryption  • Attack model  • Auguste Kerckhoffs  • Authenticated encryption  • Authentication  • Authorization certificate  • Autokey cipher  • Avalanche effect

B
B-Dienst  • Babington Plot  • Baby-step giant-step  • Bacon's cipher  • Banburismus  • Bart Preneel  • BaseKing  • BassOmatic  • BATON  • BB84  • Beale ciphers  • BEAR and LION ciphers  • Beaufort cipher  • Beaumanor Hall  • Bent function  • Berlekamp–Massey algorithm  • Bernstein v. United States  • BestCrypt  • Biclique attack  • BID/60  • BID 770  • Bifid cipher  • Bill Weisband  • Binary Goppa code  • Biometric word list  • Birthday attack  • Bit-flipping attack  • BitTorrent protocol encryption  • Biuro Szyfrów  • Black Chamber  • Blaise de Vigenère  • Bletchley Park  • Blind credential  • Blinding (cryptography)  • Blind signature  • Block cipher  • Block cipher mode of operation  • Block size (cryptography)  • Blowfish (cipher)  • Blum Blum Shub  • Blum–Goldwasser cryptosystem  • Bomba (cryptography)  • Bombe  • Book cipher  • Books on cryptography  • Boomerang attack  • Boris Hagelin  • Bouncy Castle (cryptography)  • Broadcast encryption  • Bruce Schneier  • Brute-force attack  • Brute Force: Cracking the Data Encryption Standard  • Burrows–Abadi–Needham logic  • Burt Kaliski

C
C2Net  • C-36 (cipher machine)  • C-52 (cipher machine)  • Caesar cipher  • Camellia (cipher)  • CAPICOM  • Capstone (cryptography)  • Cardan grille  • Card catalog (cryptology)  • Carlisle Adams  • CAST-128  • CAST-256  • Cayley–Purser algorithm  • CBC-MAC  • CCM mode  • CCMP  • CD-57  • CDMF  • Cellular Message Encryption Algorithm  • Centiban  • Central Security Service  • Centre for Applied Cryptographic Research  • Central Bureau  • Certicom  • Certificate authority  • Certificate-based encryption  • Certificateless cryptography  • Certificate revocation list  • Certificate signing request  • Certification path validation algorithm  • Chaffing and winnowing  • Challenge-Handshake Authentication Protocol  • Challenge–response authentication  • Chosen-ciphertext attack  • Chosen-plaintext attack  • CIKS-1  • Cipher disk  • Cipher runes  • Cipher security summary  • CipherSaber  • Ciphertext expansion  • Ciphertext indistinguishability  • Ciphertext-only attack  • Ciphertext stealing  • CIPHERUNICORN-A  • CIPHERUNICORN-E  • Classical cipher  • Claude Shannon  • Claw-free permutation  • Cleartext  • CLEFIA  • Clifford Cocks  • Clipper chip  • Clock (cryptography)  • Clock drift  • CMVP  • COCONUT98  • Codebook  • Code (cryptography)  • Code talker  • Codress message  • Cold boot attack  • Collision attack  • Collision resistance  • Colossus computer  • Combined Cipher Machine  • Commitment scheme  • Common Scrambling Algorithm  • Communications security  • Communications Security Establishment  • Communication Theory of Secrecy Systems  • Comparison of disk encryption software  • Comparison of SSH clients  • Completeness (cryptography)  • Complexity trap  • Computational Diffie–Hellman assumption  • Computational hardness assumption  • Computer insecurity  • Computer and network surveillance  • COMSEC equipment  • Conch (SSH)  • Concrete security  • Conel Hugh O'Donel Alexander  • Confidentiality  • Confusion and diffusion  • Content-scrambling system  • Controlled Cryptographic Item  • Corkscrew (program)  • Correlation immunity  • COSIC  • Covert channel  • Cover (telecommunications)  • Crab (cipher)  • Cramer–Shoup cryptosystem  • CRAM-MD5  • CRHF  • Crib (cryptanalysis)  • CrossCrypt  • Crowds (anonymity network)  • Crypt (C)  • Cryptanalysis  • Cryptanalysis of the Enigma  • Cryptanalysis of the Lorenz cipher  • Cryptanalytic computer  • Cryptex  • Cryptico  • Crypto AG  • Crypto-anarchism  • Crypto API (Linux)  • Microsoft CryptoAPI  • CryptoBuddy  • Cryptochannel  • CRYPTO (conference)  • Cryptogram  • Cryptographically Generated Address  • Cryptographically secure pseudorandom number generator  • Cryptographically strong  • Cryptographic Application Programming Interface  • Cryptographic hash function  • Cryptographic key types  • Cryptographic Message Syntax  • Cryptographic primitive  • Cryptographic protocol  • Cryptographic Service Provider  • Cryptographie indéchiffrable  • Cryptography  • Cryptography in Japan  • Cryptography newsgroups  • Cryptography standards  • Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age  • Cryptologia  • Cryptology ePrint Archive  • Cryptology Research Society of India  • Cryptomathic  • Cryptome  • Cryptomeria cipher  • Cryptonomicon  • CrypTool  • Crypto phone  • Crypto-society  • Cryptosystem  • Cryptovirology  • CRYPTREC  • CS-Cipher  • Curve25519  • Curve448   • Custom hardware attack   • Cycles per byte  • Cyclometer  • Cypherpunk  • Cyrillic Projector

D
D'Agapeyeff cipher  • Daniel J. Bernstein  • Data Authentication Algorithm  • Data Encryption Standard  • Datagram Transport Layer Security  • David Chaum  • David Kahn  • David Naccache  • David Wagner  • David Wheeler (computer scientist)  • Davies attack  • Davies–Meyer hash  • DEAL  • Decipherment  • Decisional Diffie–Hellman assumption  • Decorrelation theory  • Decrypt  • DeCSS  • Defence Signals Directorate  • Degree of anonymity  • Delegated Path Discovery  • Delegated Path Validation  • Deniable encryption  • Derek Taunt  • Derived unique key per transaction  • DES Challenges  • DES supplementary material  • DES-X  • Deterministic encryption  • DFC (cipher)  • Dictionary attack  • Differential cryptanalysis  • Differential-linear attack  • Differential power analysis  • Diffie–Hellman key exchange  • Diffie–Hellman problem  • DigiCipher 2  • Digital Fortress  • Digital rights management  • Digital signature  • Digital Signature Algorithm  • Digital signature forgery  • Digital timestamping  • Digital watermarking  • Dilly Knox  • Dining cryptographers problem  • Diplomatic bag  • Direct Anonymous Attestation  • Discrete logarithm  • Disk encryption  • Disk encryption hardware  • Disk encryption software  • Distance-bounding protocol  • Distinguishing attack  • Distributed.net  • DMA attack  • dm-crypt  • Dmitry Sklyarov  • DomainKeys  • Don Coppersmith  • Dorabella Cipher  • Double Ratchet Algorithm  • Doug Stinson  • Dragon (cipher)  • DRYAD  • Dual_EC_DRBG  •

E
E0 (cipher)  • E2 (cipher)  • E4M  • EAP-AKA  • EAP-SIM  • EAX mode  • ECC patents  • ECHELON  • ECRYPT  • Edouard Fleissner von Wostrowitz  • Edward Hebern  • Edward Scheidt  • Edward Travis  • EFF DES cracker  • Efficient Probabilistic Public-Key Encryption Scheme  • EKMS  • Electronic Communications Act 2000  • Electronic money  • Electronic signature  • Electronic voting  • ElGamal encryption  • ElGamal signature scheme  • Eli Biham  • Elizebeth Friedman  • Elliptic-curve cryptography  • Elliptic-curve Diffie–Hellman  • Elliptic Curve DSA  • EdDSA   • Elliptic curve only hash   • Elonka Dunin  • Encrypted function  • Encrypted key exchange  • Encrypting File System  • Encryption  • Encryption software  • Enigmail  • Enigma machine  • Enigma rotor details  • Entrust  • Ernst Fetterlein  • eSTREAM  • Étienne Bazeries  • Eurocrypt  • EuroCrypt  • Export of cryptography  • Extensible Authentication Protocol

F
Fast Software Encryption  • Fast syndrome-based hash  • FEA-M  • FEAL  • Feige–Fiat–Shamir identification scheme  • Feistel cipher  • Félix Delastelle  • Fialka  • Filesystem-level encryption  • FileVault  • Fill device  • Financial cryptography  • FIPS 140  • FIPS 140-2  • Firefly (key exchange protocol)  • FISH (cipher)  • Fish (cryptography)  • Floradora  • Fluhrer, Mantin and Shamir attack  • Format-preserving encryption  • Fortezza  • Fort George G. Meade  • Fortuna (PRNG)  • Four-square cipher  • Franciszek Pokorny  • Frank A. Stevenson  • Frank Rowlett  • Freenet  • FreeOTFE  • FreeS/WAN  • Frequency analysis  • Friedrich Kasiski  • Fritz-chip  • FROG  • FROSTBURG  • FTP over SSH  • Full disk encryption  • Full Domain Hash  • F. W. Winterbotham

G
Galois/Counter Mode  • Gardening (cryptanalysis)  • GCHQ Bude  • GCHQ CSO Morwenstow  • GDES  • Generic Security Services Application Program Interface  • George Blakley  • George Scovell  • GGH encryption scheme  • GGH signature scheme  • Gilbert Vernam  • GMR (cryptography)  • GNU Privacy Guard  • GnuTLS  • Goldwasser–Micali cryptosystem  • Gordon Welchman  • GOST (block cipher)  • GOST (hash function)  • Government Communications Headquarters  • Government Communications Security Bureau  • Grain (cipher)  • Grand Cru (cipher)  • Great Cipher  • Grill (cryptology)  • Grille (cryptography)  • Group-based cryptography  • Group signature  • Grover's algorithm  • Gustave Bertrand  • Gwido Langer

H
H.235  • HAIFA construction  • HAIPE  • Hans Dobbertin  • Hans-Thilo Schmidt  • Hard-core predicate  • Hardware random number generator  • Hardware security module  • Harold Keen  • Harry Hinsley  • Harvest (computer)  • HAS-160  • Hash-based cryptography  • Hashcash  • Hash chain  • Hash function security summary  • Hash list  • Hasty Pudding cipher  • HAVAL  • HC-256  • HC-9  • Heath Robinson (codebreaking machine)  • Hebern rotor machine  • Henri Braquenié  • Henryk Zygalski  • Herbert Yardley  • Hidden Field Equations  • Hideki Imai  • Hierocrypt  • High-bandwidth Digital Content Protection  • Higher-order differential cryptanalysis  • Hill cipher  • History of cryptography  • HMAC  • HMAC-based One-time Password algorithm  (HOTP) • Horst Feistel  • Howard Heys  • Https  • Hugo Hadwiger  • Hugo Koch  • Hushmail  • Hut 6  • Hut 8  • HX-63  • Hybrid cryptosystem  • Hyperelliptic curve cryptography  • Hyper-encryption

I
Ian Goldberg  • IBM 4758  • ICE (cipher)  • ID-based cryptography  • IDEA NXT  • Identification friend or foe  • IEEE 802.11i  • IEEE P1363  • I. J. Good  • Illegal prime  • Impossible differential cryptanalysis  • Index of coincidence  • Indifferent chosen-ciphertext attack  • Indistinguishability obfuscation  • Indocrypt  • Information leakage  • Information Security Group  • Information-theoretic security  • Initialization vector  • Integer factorization  • Integral cryptanalysis  • Integrated Encryption Scheme  • Integrated Windows Authentication  • Interlock protocol  • Intermediate certificate authorities  • International Association for Cryptologic Research  • International Data Encryption Algorithm  • Internet Key Exchange  • Internet Security Association and Key Management Protocol  • Interpolation attack  • Invisible ink  • IPsec  • Iraqi block cipher  • ISAAC (cipher)  • ISO 19092-2  • ISO/IEC 9797  • Ivan Damgård

J
Jacques Stern  • JADE (cypher machine)  • James Gillogly  • James H. Ellis  • James Massey  • Jan Graliński  • Jan Kowalewski  • Japanese naval codes  • Java Cryptography Architecture  • Jefferson disk  • Jennifer Seberry  • Jerzy Różycki  • Joan Daemen  • Johannes Trithemius  • John Herivel  • John Kelsey (cryptanalyst)  • John R. F. Jeffreys  • John Tiltman  • Jon Lech Johansen  • Josef Pieprzyk  • Joseph Desch  • Joseph Finnegan (cryptographer)  • Joseph Mauborgne  • Joseph Rochefort  • Journal of Cryptology  • Junger v. Daley

K
Kaisa Nyberg  • Kalyna (cipher)  • Kasiski examination  • KASUMI  • KCDSA  • KeePass  • Kerberos (protocol)  • Kerckhoffs's principle  • Kevin McCurley (cryptographer)  • Key-agreement protocol  • Key authentication  • Key clustering  • Key (cryptography)  • Key derivation function  • Key distribution center  • Key escrow  • Key exchange  • Keyfile  • Key generation  • Key generator  • Key management  • Key-recovery attack  • Key schedule  • Key server (cryptographic)  • Key signature (cryptography)  • Keysigning  • Key signing party  • Key size  • Key space (cryptography)  • Keystream  • Key stretching  • Key whitening  • KG-84  • KHAZAD  • Khufu and Khafre  • Kiss (cryptanalysis)  • KL-43  • KL-51  • KL-7  • Kleptography  • KN-Cipher  • Knapsack problem  • Known-key distinguishing attack  • Known-plaintext attack  • KnownSafe  • KOI-18  • KOV-14  • Kryha  • Kryptos  • KSD-64  • Kupyna  • Kuznyechik  • KW-26  • KW-37  • KY-3  • KY-57  • KY-58  • KY-68  • KYK-13

L
Lacida  • Ladder-DES  • Lamport signature  • Lars Knudsen  • Lattice-based cryptography  • Laurance Safford  • Lawrie Brown  • LCS35  • Leo Marks  • Leonard Adleman  • Leon Battista Alberti  • Leo Rosen  • Leslie Yoxall  • LEVIATHAN (cipher)  • LEX (cipher)  • Libelle (cipher)  • Linear cryptanalysis  • Linear-feedback shift register  • Link encryption  • List of ciphertexts  • List of cryptographers  • List of cryptographic file systems  • List of cryptographic key types  • List of cryptology conferences  • List of telecommunications encryption terms  • List of people associated with Bletchley Park • List of SFTP clients  • List of SFTP server software  • LOKI  • LOKI97  • Lorenz cipher  • Louis W. Tordella  • Lsh  • Lucifer (cipher)  • Lyra2

M
M6 (cipher)  • M8 (cipher)  • M-209  • M-325  • M-94  • MacGuffin (cipher)  • Madryga  • MAGENTA  • Magic (cryptography)  • Maksymilian Ciężki  • Malcolm J. Williamson  • Malleability (cryptography)  • Man-in-the-middle attack  • Marian Rejewski  • MARS (cryptography)  • Martin Hellman  • MaruTukku  • Massey–Omura cryptosystem  • Matt Blaze  • Matt Robshaw  • Max Newman  • McEliece cryptosystem  • mcrypt  • MD2 (cryptography)  • MD4  • MD5  • MD5CRK  • MDC-2  • MDS matrix  • Mean shortest distance  • Meet-in-the-middle attack  • Mental poker  • Mercury (cipher machine)  • Mercy (cipher)  • Meredith Gardner  • Merkle signature scheme  • Merkle–Damgård construction  • Merkle–Hellman knapsack cryptosystem  • Merkle's Puzzles  • Merkle tree  • MESH (cipher)  • Message authentication  • Message authentication code  • Message forgery  • MI8  • Michael Luby  • MICKEY  • Microdot  • Military Cryptanalysis (book) (William F. Friedman)  • Military Cryptanalytics  • Mimic function  • Mirror writing  • MISTY1  • Mitsuru Matsui  • MMB (cipher)  • Mod n cryptanalysis  • MQV  • MS-CHAP  • MUGI  • MULTI-S01  • MultiSwap  • Multivariate cryptography

N
National Communications Centre  • National Cryptologic Museum  • National Security Agency  • National Cipher Challenge  • Navajo I  • Neal Koblitz  • Needham–Schroeder protocol  • Negligible function  • NEMA (machine)  • NESSIE  • Network Security Services  • Neural cryptography  • New Data Seal  • NewDES  • N-Hash  • Nicolas Courtois  • Niederreiter cryptosystem  • Niels Ferguson  • Nigel de Grey  • Nihilist cipher  • Nikita Borisov  • Nimbus (cipher)  • NIST hash function competition  • Nonlinear-feedback shift register  • NOEKEON  • Non-malleable codes  • Noreen  • Nothing up my sleeve number  • NSA cryptography  • NSA encryption systems  • NSA in fiction  • NSAKEY  • NSA Suite A Cryptography  • NSA Suite B Cryptography  • NT LAN Manager  • NTLMSSP  • NTRUEncrypt  • NTRUSign  • Null cipher  • Numbers station  • NUSH  • NTRU

O
Oblivious transfer  • OCB mode  • Oded Goldreich  • Off-the-Record Messaging  • Okamoto–Uchiyama cryptosystem  • OMI cryptograph  • OMNI (SCIP)  • One-key MAC  • One-time pad  • One-time password  • One-way compression function  • One-way function  • Onion routing  • Online Certificate Status Protocol  • OP-20-G  • OpenPGP card  • OpenSSH  • OpenSSL  • Openswan  • OpenVPN  • Operation Ruthless  • Optimal asymmetric encryption padding  • Over the Air Rekeying  (OTAR) • OTFE  • Otway–Rees protocol

P
Padding (cryptography)  • Padding oracle attack   • Paillier cryptosystem  • Pairing-based cryptography  • Panama (cryptography)  • Partitioning cryptanalysis  • Passive attack  • Passphrase  • Password  • Password-authenticated key agreement  • Password cracking  • Password Hashing Competition  • Paul Kocher  • Paulo Pancatuccio  • Paulo S. L. M. Barreto  • Paul van Oorschot  • PBKDF2  • PC Bruno  • Pepper (cryptography)  • Perfect forward secrecy  • Perforated sheets  • Permutation cipher  • Peter Gutmann (computer scientist)  • Peter Junger  • Peter Twinn  • PGP Corporation  • PGPDisk  • PGPfone  • Phelix  • Phil Zimmermann  • Photuris (protocol)  • Physical security  • Physical unclonable function  • Pig Latin  • Pigpen cipher  • Pike (cipher)  • Piling-up lemma  • Pinwheel (cryptography)  • Piotr Smoleński  • Pirate decryption  • PKC (conference)  • PKCS  • PKCS 11  • PKCS 12  • PKIX  • Plaintext  • Plaintext-aware encryption  • Playfair cipher  • Plugboard  • PMAC (cryptography)  • Poem code  • Pohlig–Hellman algorithm  • Point-to-Point Tunneling Protocol  • Pointcheval–Stern signature algorithm  • Poly1305  • Polyalphabetic cipher  • Polybius square  • Portex  • Post-quantum cryptography  • Post-Quantum Cryptography Standardization  • Power analysis  • Preimage attack  • Pre-shared key  • Pretty Good Privacy  • Printer steganography  • Privacy-enhanced Electronic Mail  • Private Communications Technology  • Private information retrieval  • Probabilistic encryption  • Product cipher  • Proof-of-work system  • Protected Extensible Authentication Protocol  • Provable security  • Provably secure cryptographic hash function  • Proxy re-encryption  • Pseudo-Hadamard transform  • Pseudonymity  • Pseudorandom function  • Pseudorandom number generator  • Pseudorandom permutation  • Public key certificate  • Public-key cryptography  • Public key fingerprint  • Public key infrastructure  • PURPLE  • PuTTY  • Py (cipher)

Q
Q (cipher)  • Qrpff  • QUAD (cipher)  • Quadratic sieve  • Quantum coin flipping  • Quantum cryptography  • Quantum digital signature  • Quantum fingerprinting  • Quantum key distribution

R
Rabbit (cipher)  • Rabin cryptosystem  • Rabin–Williams encryption  • RadioGatún  • Rail fence cipher  • Rainbow table  • Ralph Merkle  • Rambutan (cryptography)  • Random function  • Randomness tests  • Random number generator attack  • Random oracle  • RC2  • RC4  • RC5  • RC6  • Rebound attack  • Reciprocal cipher  • Red/black concept  • REDOC  • Red Pike (cipher)  • Reflector (cipher machine)  • Regulation of Investigatory Powers Act 2000  • Reihenschieber  • Rekeying (cryptography)  • Related-key attack  • Replay attack  • Reservehandverfahren  • Residual block termination  • Rijndael key schedule  • Rijndael S-box  • Ring signature  • RIPEMD  • Rip van Winkle cipher  • Robert Morris (cryptographer)  • Robot certificate authority  • Rockex  • Rolf Noskwith  • Ron Rivest  • Room 40  • Root certificate  • Ross J. Anderson  • Rossignols  • ROT13  • Rotor machine  • RSA RSA • RSA-100  • RSA-1024  • RSA-110  • RSA-120  • RSA-129  • RSA-130  • RSA-140  • RSA-150  • RSA-1536  • RSA-155  • RSA-160  • RSA-170  • RSA-180  • RSA-190  • RSA-200  • RSA-2048  • RSA-210  • RSA-220  • RSA-230  • RSA-232  • RSA-240  • RSA-250  • RSA-260  • RSA-270  • RSA-280  • RSA-290  • RSA-300  • RSA-309  • RSA-310  • RSA-320  • RSA-330  • RSA-340  • RSA-350  • RSA-360  • RSA-370  • RSA-380  • RSA-390  • RSA-400  • RSA-410  • RSA-420  • RSA-430  • RSA-440  • RSA-450  • RSA-460  • RSA-470  • RSA-480  • RSA-490  • RSA-500  • RSA-576  • RSA-617  • RSA-640  • RSA-704  • RSA-768  • RSA-896  • RSA-PSS  • RSA Factoring Challenge  • RSA problem  • RSA Secret-Key Challenge  • RSA Security  • Rubber-hose cryptanalysis  • Running key cipher  • Russian copulation

S
S-1 block cipher  • SAFER  • Salsa20  • Salt (cryptography)  • SAM card  • Security Support Provider Interface  • SAML  • SAVILLE  • SC2000  • Schnorr group  • Schnorr signature  • Schoof–Elkies–Atkin algorithm  • SCIP  • Scott Vanstone  • Scrambler  • Scramdisk  • Scream (cipher)  • Scrypt  • Scytale  • Seahorse (software)  • SEAL (cipher)  • Sean Murphy (cryptographer)  • SECG  • Secret broadcast  • Secret decoder ring  • Secrets and Lies (Schneier)  • Secret sharing  • Sectéra Secure Module  • Secure access module  • Secure channel  • Secure Communication based on Quantum Cryptography  • Secure copy  • Secure cryptoprocessor  • Secure Electronic Transaction  • Secure Hash Algorithms  • Secure Hypertext Transfer Protocol  • Secure key issuing cryptography  • Secure multi-party computation  • Secure Neighbor Discovery  • Secure Real-time Transport Protocol  • Secure remote password protocol  • Secure Shell  • Secure telephone  • Secure Terminal Equipment  • Secure voice  • SecurID  • Security association  • Security engineering  • Security level  • Security parameter  • Security protocol notation  • Security through obscurity  • Security token  • SEED  • Selected Areas in Cryptography  • Self-certifying File System  • Self-shrinking generator  • Self-signed certificate  • Semantic security  • Serge Vaudenay  • Serpent (cipher)  • Session key  • SHACAL  • Shafi Goldwasser  • SHA-1  • SHA-2  • SHA-3  • Shared secret  • SHARK  • Shaun Wylie  • Shor's algorithm  • Shrinking generator  • Shugborough inscription  • Side-channel attack  • Siemens and Halske T52  • SIGABA  • SIGCUM  • SIGINT  • Signal Protocol  • Signal Intelligence Service  • Signcryption  • SIGSALY  • SILC (protocol)  • Silvio Micali  • Simple Authentication and Security Layer  • Simple public-key infrastructure  • Simple XOR cipher  • S/KEY  • Skein (hash function)  • Skipjack (cipher)  • Slide attack  • Slidex  • Small subgroup confinement attack  • S/MIME  • SM4 algorithm  (formerly SMS4) • Snake oil (cryptography)  • Snefru  • SNOW  • Snuffle  • SOBER-128  • Solitaire (cipher)  • Solomon Kullback  • SOSEMANUK  • Special Collection Service  • Spectr-H64  • SPEKE (cryptography)  • Sponge function  • SPNEGO  • Square (cipher)  • Ssh-agent  • Ssh-keygen   • SSH File Transfer Protocol   • SSLeay  • Stafford Tavares  • Standard model (cryptography)  • Station CAST  • Station HYPO  • Station-to-Station protocol  • Statistical cryptanalysis  • Stefan Lucks  • Steganalysis  • Steganography  • Straddling checkerboard  • Stream cipher  • Stream cipher attacks  • Strong cryptography  • Strong RSA assumption  • Stuart Milner-Barry  • STU-II  • STU-III  • Stunnel  • Substitution box  • Substitution cipher  • Substitution–permutation network  • Superencryption  • Supersingular isogeny key exchange  • Swedish National Defence Radio Establishment  • SWIFFT  • SXAL/MBAL  • Symmetric-key algorithm  • SYSKEY

T
Tabula recta  • Taher Elgamal  • Tamper resistance  • Tcpcrypt  • Television encryption  • TEMPEST  • Template:Cryptographic software  • Temporal Key Integrity Protocol  • Testery  • Thawte  • The Alphabet Cipher  • The Code Book  • The Codebreakers  • The Gold-Bug  • The Magic Words are Squeamish Ossifrage  • Theory of Cryptography Conference  • The world wonders  • Thomas Jakobsen  • Three-pass protocol  • Threshold shadow scheme  • TICOM  • Tiger (cryptography)  • Timeline of cryptography  • Time/memory/data tradeoff attack  • Time-based One-time Password algorithm  (TOTP) • Timing attack  • Tiny Encryption Algorithm  • Tom Berson  • Tommy Flowers  • Topics in cryptography  • Tor (anonymity network)  • Torus-based cryptography  • Traffic analysis  • Traffic-flow security  • Traitor tracing  • Transmission security  • Transport Layer Security  • Transposition cipher  • Trapdoor function  • Trench code  • Treyfer  • Trifid cipher  • Triple DES  • Trivium (cipher)  • TrueCrypt  • Truncated differential cryptanalysis  • Trusted third party  • Turing (cipher)  • TWINKLE  • TWIRL  • Twofish  • Two-square cipher  • Type 1 encryption  • Type 2 encryption  • Type 3 encryption  • Type 4 encryption  • Typex

U
UES (cipher)  • Ultra (cryptography)  • UMAC  • Unbalanced Oil and Vinegar  • Undeniable signature  • Unicity distance  • Universal composability  • Universal one-way hash function  (UOWHF)

V
Venona project  • Verifiable secret sharing  • Verisign  • Very smooth hash  • VEST  • VIC cipher  • VideoCrypt  • Vigenère cipher  • Vincent Rijmen  • VINSON  • Virtual private network  • Visual cryptography  • Voynich manuscript

W
Wadsworth's cipher  • WAKE  • WLAN Authentication and Privacy Infrastructure  • Watermark (data file)  • Watermarking attack  • Weak key  • Web of trust  • Whirlpool (hash function)  • Whitfield Diffie  • Wide Mouth Frog protocol  • Wi-Fi Protected Access  • William F. Friedman  • William Montgomery (cryptographer)  • WinSCP  • Wired Equivalent Privacy  • Wireless Transport Layer Security  • Witness-indistinguishable proof  • Workshop on Cryptographic Hardware and Embedded Systems  • World War I cryptography  • World War II cryptography  • W. T. Tutte

X
X.509  • XDH assumption  • Xiaoyun Wang  • XML Encryption  • XML Signature  • xmx  • XSL attack  • XTEA  • XTR  • Xuejia Lai  • XXTEA 10-00-00-00-00

Y
Yarrow algorithm  • Y-stations  • Yuliang Zheng

Z
Zeroisation  • Zero-knowledge password proof  • Zero-knowledge proof  • Zfone  • Zodiac (cipher)  • ZRTP  • Zimmermann–Sassaman key-signing protocol  • Zimmermann Telegram