User:Matt Crypto/Crypto hits March-2004

Page accesses for articles in cryptography, sorted by number of hits, in March 2004. Counts for redirects have been absorbed into that of the main article.

Hits   Article name - 3794  Cryptography 2160  Alan Turing 1743  Digital rights management 1477  Zimmermann Telegram 1437  RSA 1368  Public-key cryptography 1272  Steganography 1254  Enigma machine 1175  One-time pad 1123  Knapsack problem 1118  Polyalphabetic cipher 1099  Data Encryption Standard 1036  Pseudorandom number generator 1035  National Security Agency 1013  Code 1006  Advanced Encryption Standard 954  Digital signature 928  RC4 cipher 916  Voynich Manuscript 876  ROT13 873  Man in the middle attack 872  Transport Layer Security 830  DeCSS 827  ECHELON 826  MD5 802  Encryption 795  Asymmetric key algorithm 792  Diffie-Hellman key exchange 791  Dictionary attack 791  Exclusive disjunction 782  Topics in cryptography 738  Key signature 728  Cipher 717  Zimmermann Telegram 704  Symmetric key algorithm 702  Secure shell 697  Quantum cryptography 679  Wired Equivalent Privacy 651  IPSec 638  Triple DES 615  Substitution cipher 610  SHA-1 609  Cryptanalysis 599  List of cryptography topics 596  Wi-Fi Protected Access 592  Illegal prime 566  Fritz-chip 563  Block cipher 555  Elliptic curve cryptography 547  Password cracking 545  Invisible ink 540  ElGamal discrete log cryptosystem 538  Feistel cipher 505  Discrete logarithm 497  Colossus computer 484  Birthday attack 482  Information security 474  HTTPS 448  Digital Signature Algorithm 448  Brute force attack 448  Caesar cipher 447  Hardware random number generator 445  Content-scrambling system 442  TEMPEST 426  Claude Shannon 424  Purple code 423  Stream cipher 409  Security through obscurity 397  Frequency analysis 396  Babington plot 386  Encode 384  Authentication 377  Adi Shamir 373  Cryptographic key 370  International Data Encryption Algorithm 365  Kerckhoffs' law 362  Bletchley Park 357  Blum Blum Shub 357  Electronic voting 348  Cryptonomicon 343  Plaintext 336  Differential cryptanalysis 335  Crypto-anarchism 331  Atbash cipher 324  Government Communications Headquarters 321  Ron Rivest 318  Rijndael 314  VENONA project 313  Block cipher modes of operation 313  Ultra 311  Cryptographic hash function 311  Linear feedback shift register 303  Electronic money 303  Password 300  Leonard Adleman 299  SIGINT 294  Pretty Good Privacy 288  X.509 284  William F. Friedman 280  Kerberos 279  GNU Privacy Guard 277  Snake oil 275  List of cryptographers 274  Polybius square 273  Cryptographically secure pseudo-random number generator 270  Leone Battista Alberti 265  Decipherment 259  Blowfish encryption algorithm 245  Message digest 243  Substitution box 231  Public key infrastructure 226  Cypherpunk 215  Certificate authority 214  Security engineering 213  RC5 212  Secure cryptoprocessor 212  Computer surveillance 210  Cyphertext 208  DigiCipher 2 204  Linear cryptanalysis 199  Computer insecurity 194  Bruce Schneier 188  Key size 186  OpenSSH 185  Transposition cipher 175  Marian Rejewski 170  Pseudonymity 168  Playfair cipher 168  Keyed-hash message authentication code 165  RC6 163  PKI 161  Secret sharing 160  Daniel J. Bernstein 159  Whitfield Diffie 158  Microdot 157  Scytale 156  SIGABA 148  RIPEMD-160 148  Code talkers 146  JN-25 146  Public key certificate 146  Rotor machine 145  Dmitry Sklyarov 144  Typex 139  Twofish 138  Index of coincidence 137  Famous ciphertexts 136  Autokey cipher 134  History of cryptography 132  Covert channel 131  Crypto system 131  Phil Zimmermann 131  Zero-knowledge proof 129  Null cipher 126  Chaffing and winnowing 124  Anonymous remailer 122  Internet key exchange 122  Message Authentication Code 122  Web of trust 119  Ross Anderson 114  Lucifer cipher 113  Tiger hash function 112  MD5CRK 112  Kryptos 112  Cryptogram 111  Cryptographic engineering 110  Initialization vector 108  Books on cryptography 106  One way function 105  Key escrow 103  Merkle-Hellman 101  Chosen plaintext attack 100  Advanced Encryption Standard process 100  Meet-in-the-middle attack 99  Arne Beurling 98  CAST-128 96  OpenPGP 94  Financial cryptography 93  Lorenz cypher 89  Burrows-Abadi-Needham logic 89  Physical security 88  Confidentiality 87  Ralph Merkle 87  Clipper chip 86  CRYPTREC 85  Known-plaintext attack 80  Affine cipher 80  Beale ciphers 79  Martin Hellman 78  Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age 78  The Gold Bug 77  Max Newman 77  Herbert Yardley 76  Traffic analysis 75  NESSIE 75  Distributed.net 74  Vincent Rijmen 74  Unicity distance 73  Permutation cipher 71  The Magic Words are Squeamish Ossifrage 71  40-bit encryption 70  Communication Theory of Secrecy Systems 70  Communications security 70  Geheimfernschreiber 70  Iraqi block cipher 70  RSA Security 68  Codebook 67  Auguste Kerckhoffs 66  Regulation of Investigatory Powers Act 2000 65  Dorabella Cipher 65  Skipjack encryption algorithm 63  Friedrich Kasiski 63  Tamper resistance 61  ADFGVX cipher 61  Ciphertext-only attack 61  Leo Marks 58  Cipherspace 57  Hebern Rotor Machine 57  Privacy-enhanced Electronic Mail 56  Crypto-society 55  Abraham Sinkov 55  Substitution-permutation network 54  Book cipher 54  OpenSSL 53  Eli Biham 53  Digital timestamping 53  Arlington Hall 52  Bernstein v. United States 52  W. T. Tutte 51  David Wagner 51  LibTom Project 50  Tabula recta 50  Security protocol notation 50  Chosen ciphertext attack 50  Tiny Encryption Algorithm 49  Elliptic Curve DSA 49  Confusion and diffusion 48  Yarrow algorithm 48  MARS 47  The Codebreakers 46  VIC cipher 46  Random oracle 45  Rubber-hose cryptanalysis 45  Adaptive chosen ciphertext attack 45  3-Way 45  Certificate Revocation List 44  Visual cryptography 44  Frank Rowlett 44  David Chaum 43  Scrambler 42  Henryk Zygalski 41  Session key 41  Paillier cryptosystem 41  Key authentication 41  Elizebeth Friedman 40  Pass phrase 40  Hushmail 40  Glossary of telecommunications encryption terms 40  Decrypt 40  Blind credential 40  Attacker 40  Agnes Meyer Driscoll 40  Zeroise 39  XTEA 38  S-1 37  Poem code 37  Niels Ferguson 37  CAcert 37  International Association for Cryptologic Research 36  Straddling checkerboard 36  Schnorr signature 36  GOST 36  Cryptome 35  Key derivation function 35  Jerzy Rozycki 35  Self-certifying key 34  Trapdoor function 34  Rabin cryptosystem 34  Certificate-based encryption 34  Serpent encryption algorithm 33  Passive attack 33  NTRUEncrypt 32  Shrinking generator 31  David Wheeler 31  Commitment scheme 30  Key distribution center 29  Don Coppersmith 29  CRYPTO 26  SYSKEY 26  Blind signature 26  Bit-flipping attack 26  Dining cryptographers protocol 25  Timing attack 25  Running key cipher 25  Key signing party 25  Hyperelliptic curve cryptography 25  Horst Feistel 24  COMSEC equipment 24  Snefru 23  Needham-Schroeder 23  Key-agreement protocol 23  Cipher Block Chaining 23  ID-based cryptography 22  Root certificate 22  KY-57 21  Solomon Kullback 21  Joan Daemen 21  Enigmail 20  Oblivious transfer 20  Cryptomathic 19  Undeniable signature 19  Garble 18  Laurence Safford 18  Journal of Cryptology 18  Magic cryptography 17  Cryptographically strong 17  Baby-step giant-step 15  Wide Mouth Frog 15  WHIRLPOOL 15  Otway-Rees 15  Type 1 product 13  A5/1 9  Red pike 7  Taher ElGamal 7  Trusted third party