User:He!ko/Books/Cryptography

Encyclopedia of Cryptographie

 * Cryptography
 * History of cryptography


 * Basics
 * Block cipher
 * Cryptanalysis
 * Cryptographic hash function
 * Cryptographically secure pseudorandom number generator
 * Digital signature
 * Digital watermarking
 * Encryption
 * Message authentication code
 * Public-key cryptography
 * Steganography
 * Stream cipher
 * Strong secrecy
 * Symmetric-key algorithm
 * Watermark detection


 * Protocols
 * 3-D Secure
 * AKA (security)
 * Alice and Bob
 * Anonymous veto network
 * Anshel–Anshel–Goldfeld key exchange
 * ANSI ASC X9.95 Standard
 * AS1 (networking)
 * AS2
 * AuthIP
 * Autoroll
 * BitTorrent protocol encryption
 * CCMP
 * Certificate Management over CMS
 * Certificate Management Protocol
 * Certificate signing request
 * Certification path validation algorithm
 * Chaffing and winnowing
 * Challenge-handshake authentication protocol
 * Challenge-response authentication
 * Cipher suite
 * Code Access Security
 * Common reference string model
 * CRAM-MD5
 * Cryptographic Message Syntax
 * Cryptographic protocol
 * Cryptographically Generated Address
 * CrypTool
 * Data Validation and Certification Server
 * Datagram Transport Layer Security
 * Dead Peer Detection
 * Delegated Path Discovery
 * Delegated Path Validation
 * Deniable authentication
 * DH/DSS
 * Diffie–Hellman key exchange
 * Diffie–Hellman problem
 * Digest access authentication
 * DigiCipher 2
 * Digital credential
 * Dining cryptographers protocol
 * Distance-bounding protocol
 * Distributed System Security Architecture
 * Dolev-Yao model
 * DomainKeys
 * DomainKeys Identified Mail
 * EAP-AKA
 * EAP-SIM
 * Ecash
 * Electronic money
 * Encrypted key exchange
 * Extensible Authentication Protocol
 * Fiat-Shamir heuristic
 * Generic Bootstrapping Architecture
 * Generic Security Service Algorithm for Secret Key Transaction
 * Grid Security Infrastructure
 * Group Domain of Interpretation
 * H.235
 * Hashcash
 * High Assurance Internet Protocol Encryptor
 * Homomorphic secret sharing
 * Host Identity Protocol
 * HTTP Secure
 * HTTPsec
 * IEEE 802.11i-2004
 * Interlock protocol
 * Internet Key Exchange
 * Internet Security Association and Key Management Protocol
 * IPsec
 * Kerberized Internet Negotiation of Keys
 * Kerberos (protocol)
 * Key exchange
 * Key-agreement protocol
 * KMIP
 * Microsoft Point-to-Point Encryption
 * MIKEY
 * MS-CHAP
 * Multi party fair exchange protocol
 * Multiplexed Transport Layer Security
 * NAT-T
 * Needham-Schroeder protocol
 * Neuman-Stubblebine protocol
 * Non-interactive zero-knowledge proof
 * NTLM
 * Oak Orion
 * Oakley protocol
 * Oblivious transfer
 * OCSP Stapling
 * Off-the-Record Messaging
 * Offline private key protocol
 * Online Certificate Status Protocol
 * Openswan
 * Otway-Rees protocol
 * Password Authenticated Key Exchange by Juggling
 * Password-authenticated key agreement
 * Privacy-enhanced Electronic Mail
 * Private Communications Technology
 * Private information retrieval
 * Proactive secret sharing
 * Proof of knowledge
 * Protected Extensible Authentication Protocol
 * Protocol for Carrying Authentication for Network Access
 * Publius Publishing System
 * Rekeying
 * Renewable security
 * SCVP
 * Secret sharing
 * Secure channel
 * Secure Communications Interoperability Protocol
 * Secure copy
 * Secure file transfer program
 * Secure Hypertext Transfer Protocol
 * Secure multi-party computation
 * Secure Neighbor Discovery Protocol
 * Secure Real-time Transport Protocol
 * Secure Remote Password protocol
 * Secure Shell
 * Secure two-party computation
 * Security association
 * Security protocol notation
 * Security Protocols Open Repository
 * Simple Authentication and Security Layer
 * Simple Certificate Enrollment Protocol
 * Socialist millionaire
 * SPEKE (cryptography)
 * SPNEGO
 * SSH File Transfer Protocol
 * Station-to-Station protocol
 * StrongSwan
 * TACLANE
 * Tcpcrypt
 * Temporal Key Integrity Protocol
 * Threshold shadow scheme
 * TLS-PSK
 * Transport Layer Security
 * Universal composability
 * User:Taeshadow/Page for drafts/Homomorphic electronic voting
 * Vouch by Reference
 * Web-based SSH
 * Wi-Fi Protected Access
 * Wi-Fi Protected Setup
 * Wide Mouth Frog protocol
 * Wired Equivalent Privacy
 * Wireless Transport Layer Security
 * Witness-indistinguishable proof
 * WLAN Authentication and Privacy Infrastructure
 * X.1035
 * X.509
 * XKMS
 * Yahalom (protocol)
 * YAK (cryptography)
 * Yao's Millionaires' Problem
 * Zero-knowledge password proof
 * Zero-knowledge proof
 * Zimmermann-Sassaman key-signing protocol
 * ZRTP


 * Attacks
 * Acoustic cryptanalysis
 * Adaptive chosen-ciphertext attack
 * Adversary (cryptography)
 * Attack model
 * Banburismus
 * Birthday attack
 * Bit-flipping attack
 * Black bag operation
 * Black-bag cryptanalysis
 * Boomerang attack
 * Brute-force attack
 * Chosen-ciphertext attack
 * Chosen-plaintext attack
 * Ciphertext-only attack
 * Clock drift
 * Cold boot attack
 * Collision (computer science)
 * Collision attack
 * Computer forensics
 * Computer fraud
 * Contact analysis (cryptanalysis)
 * Correlation attack
 * Cryptanalytic computer
 * Cube attack
 * Custom hardware attack
 * Davies' attack
 * Decimalization table attack
 * Dictionary attack
 * Differential cryptanalysis
 * Differential equations of addition
 * Differential fault analysis
 * Differential-linear attack
 * Distinguishing attack
 * Distributed.net
 * Doubling-oriented Doche–Icart–Kohel curve
 * Edwards curve
 * Fluhrer, Mantin and Shamir attack
 * Frequency analysis
 * Gardening (cryptanalysis)
 * Hardware keylogger
 * Hessian form of an elliptic curve
 * Higher-order differential cryptanalysis
 * Impossible differential cryptanalysis
 * Index of coincidence
 * Integral cryptanalysis
 * Interpolation attack
 * Jacobian curve
 * John Herivel
 * Kasiski examination
 * KeeLoq
 * Keygen
 * Keystroke logging
 * Known-plaintext attack
 * LAN Manager
 * Linear cryptanalysis
 * LM hash
 * Man-in-the-middle attack
 * MD5CRK
 * Meet-in-the-middle attack
 * Message forgery
 * Metasploit Project
 * Military Cryptanalytics
 * Mod n cryptanalysis
 * Montgomery curve
 * Padding oracle attack
 * Partitioning cryptanalysis
 * Passive attack
 * Password cracking
 * Piling-up lemma
 * Power analysis
 * Preimage attack
 * Pwdump
 * Rainbow table
 * Random number generator attack
 * Ransomware (malware)
 * Related-key attack
 * Replay attack
 * Rootkit
 * Rotational cryptanalysis
 * Rubber-hose cryptanalysis
 * Self-service password reset
 * Side channel attack
 * Sinkov statistic
 * Slide attack
 * Small subgroup confinement attack
 * Steganalysis
 * Stream cipher attack
 * Supply chain attack
 * Table of costs of operations in elliptic curves
 * TEMPEST
 * Timing attack
 * Traffic analysis
 * Tripling-oriented Doche–Icart–Kohel curve
 * Truncated differential cryptanalysis
 * Turingery
 * TWINKLE
 * Twisted Edwards curve
 * Twisted Hessian curves
 * Twists of curves
 * User:TedColes/Sandbox
 * Watermarking attack
 * Weak key
 * XSL attack
 * Zendian Problem
 * Zygalski sheets


 * Algorithms
 * Bach's algorithm
 * Barrett reduction
 * BB84
 * Beaufort cipher
 * Block cipher modes of operation
 * CDMF
 * Ciphertext stealing
 * Common Scrambling Algorithm
 * CryptGenRandom
 * Crypto++
 * Cycles per byte
 * Feedback with Carry Shift Registers
 * Feige-Fiat-Shamir Identification Scheme
 * Generating primes
 * GGH encryption scheme
 * Hash chain
 * Industrial-grade prime
 * ISMACryp
 * JOSEKI (cipher)
 * Key schedule
 * Key Wrap
 * Kochanski multiplication
 * Linear feedback shift register
 * Mental poker
 * Modular exponentiation
 * Montgomery reduction
 * MOSQUITO
 * Pairing-based cryptography
 * Random password generator
 * Randomness extractor
 * RC algorithm
 * Residual block termination
 * Rip van Winkle cipher
 * Schoof's algorithm
 * Secret sharing using the Chinese remainder theorem
 * SecureLog
 * Shamir's Secret Sharing
 * Snuffle
 * Substitution–permutation network
 * Summation generator
 * Type 1 product
 * Type 2 product
 * Type 3 product
 * Type 4 product


 * Public-key Cryptography
 * CA/Browser Forum
 * Certificate authority
 * Certificate server
 * Certificate-based encryption
 * Decisional composite residuosity assumption
 * Detached signature
 * Digital Signature Algorithm
 * Domain Name System Security Extensions
 * ElGamal encryption
 * Hyperelliptic curve cryptography
 * Jumbleme (digital encryption service)
 * KCDSA
 * Keystore
 * McEliece cryptosystem
 * Merkle–Hellman knapsack cryptosystem
 * MQV
 * Niederreiter cryptosystem
 * Non-repudiation
 * Paillier cryptosystem
 * PKCS
 * Pretty Good Privacy
 * Public key certificate
 * Public key infrastructure
 * Rabin cryptosystem
 * Rabin signature algorithm
 * Resource Public Key Infrastructure
 * Revocation list
 * Root certificate
 * RSA
 * RSA problem
 * RSA/Intuative
 * SAFE-BioPharma Association
 * Self-signed certificate
 * Signcryption
 * Strong RSA assumption
 * Subject Alternative Name
 * Trusted third party
 * Web of trust
 * Wireless Public Key Infrastructure