User:Securiger/Crypto Stubs

The following list was generated by Securiger on 3 May 2004 as a (very rough) guide for which cryptography articles require work. All articles listed in list of cryptography topics were scanned by a simple, read-only bot, (with a long sleep loop between reads to play nice) and the number of bytes counted. Accuracy not guaranteed, and I do not plan to update this list frequently.
 * 28 Tunny (cryptography) (a redirect)
 * 30 ISAAC (cryptography) (a redirect)
 * 33 Claude Shannon (a redirect)
 * 100 FreeLIP
 * 118 Baby-step giant-step
 * 132 Scott Vanstone
 * 211 Key schedule
 * 245 Frank A. Stevenson
 * 262 Direct anonymous attestation
 * 279 Privacy-enhanced Electronic Mail
 * 291 Henryk Zygalski
 * 295 David Chaum
 * 298 COMSEC equipment
 * 299 Journal of Cryptology
 * 301 Financial cryptography
 * 308 Joseph Mauborgne
 * 321 CAcert
 * 323 Solomon Kullback
 * 329 Confidentiality
 * 331 Cryptology ePrint Archive
 * 334 Ralph Merkle
 * 337 Cryptomathic
 * 373 Timing attack
 * 396 WHIRLPOOL
 * 397 SEAL (cipher)
 * 405 Communications Security Establishment
 * 427 Dorabella Cipher
 * 427 Joan Daemen
 * 436 Cryptologia
 * 441 MD5CRK
 * 462 GOST
 * 464 David Wheeler
 * 471 International Association for Cryptologic Research
 * 476 CryptoBuddy
 * 476 List of famous ciphertexts
 * 485 CryptoStick
 * 487 PMAC
 * 491 Zimmerman-Sassaman key-signing protocol
 * 503 Blaise de Vigen&egrave;re
 * 522 Null cipher
 * 528 Cover (telecommunications)
 * 533 Attacker
 * 541 Torus based cryptography
 * 554 Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
 * 567 Key signing party
 * 568 Iraqi block cipher
 * 574 Enigmail
 * 575 Tiger (hash)
 * 584 RSA Security
 * 585 A5/2
 * 596 Pike (cipher)
 * 597 MD4
 * 604 OMAC
 * 606 Taher ElGamal
 * 614 Crypto AG
 * 624 A5/1
 * 624 Niels Ferguson
 * 629 Daniel J. Bernstein
 * 629 Eli Biham
 * 633 CRYPTO
 * 634 WAKE
 * 637 Passive attack
 * 640 Cryptographie ind&eacute;chiffrable
 * 645 Chaffing and winnowing
 * 650 OpenSSL
 * 654 Atbash cipher
 * 659 Random oracle
 * 660 OpenPGP
 * 669 Cryptochannel
 * 670 Communication Theory of Secrecy Systems
 * 673 Crib
 * 707 Elliptic Curve DSA
 * 713 Gardening (cryptanalysis)
 * 721 Mitsuru Matsui
 * 723 David Kahn
 * 724 Covert channel
 * 729 Jerzy Rozycki
 * 730 Defence Signals Directorate
 * 730 Great Cypher
 * 732 Decrypt
 * 740 Known-plaintext attack
 * 745 Internet key exchange
 * 745 S-1
 * 745 Visual cryptography
 * 763 Confusion and diffusion
 * 767 Don Coppersmith
 * 783 Central Security Service
 * 786 Horst Feistel
 * 804 Book cipher
 * 814 Cryptographic Message Syntax
 * 815 Oblivious transfer
 * 825 The Codebreakers
 * 828 Ciphertext-only attack
 * 863 Martin Hellman
 * 864 Bit-flipping attack
 * 869 Codebook
 * 871 S/MIME
 * 872 Type 2 product
 * 874 Secret decoder ring
 * 879 GDES
 * 879 Garble
 * 897 John Tiltman
 * 897 Product cipher
 * 910 Cipherspace
 * 920 &Eacute;tienne Bazeries
 * 932 Security protocol notation
 * 934 Template:Classical cryptography
 * 936 Chosen ciphertext attack
 * 936 Friedrich Kasiski
 * 942 Wide Mouth Frog
 * 943 Dining cryptographers protocol
 * 951 Arthur Scherbius
 * 962 Paillier cryptosystem
 * 962 Snuffle
 * 965 Boris Hagelin
 * 966 Arne Beurling
 * 987 MARS
 * 991 Blind credential
 * 991 GMR
 * 1002 Rabin cryptosystem
 * 1003 Arlington Hall
 * 1008 KY-57
 * 1009 Distributed.net
 * 1011 SYSKEY
 * 1015 Undeniable signature
 * 1017 Snefru
 * 1021 Microdot
 * 1029 Key management
 * 1041 Substitution-permutation network
 * 1047 Rubber-hose cryptanalysis
 * 1065 Certificateless Cryptography
 * 1066 Red Pike
 * 1067 Crypto-society
 * 1081 Keyed-hash message authentication code
 * 1085 VIC cipher
 * 1089 Peter Gutmann
 * 1089 Shrinking generator
 * 1095 Root certificate
 * 1107 Yarrow algorithm
 * 1123 TICOM
 * 1130 Self-certifying key
 * 1134 Max Newman
 * 1136 Vincent Rijmen
 * 1139 Ross Anderson
 * 1144 Cryptogram
 * 1146 Encode
 * 1146 Message Authentication Code
 * 1159 Cryptome
 * 1165 Secure Key Issuing Cryptography
 * 1176 Square (cipher)
 * 1177 Key server
 * 1180 Key derivation function
 * 1183 Schnorr signature
 * 1222 Diplomatic bag
 * 1224 Otway-Rees
 * 1232 Encryption
 * 1240 Russian copulation
 * 1243 Trapdoor function
 * 1245 Cryptographically strong
 * 1248 FISH (cryptography)
 * 1280 Biuro Szyfrow
 * 1281 Babington plot
 * 1319 Hyperelliptic curve cryptography
 * 1321 Gilbert Vernam
 * 1330 Bernstein v. United States
 * 1354 David Wagner
 * 1354 Serpent (cipher)
 * 1364 Electronic signature
 * 1368 HTTPS
 * 1369 PKCS
 * 1372 NTRUEncrypt
 * 1380 Rijndael
 * 1411 MAGENTA
 * 1414 Hushmail
 * 1417 Edward Hebern
 * 1421 Template:Block ciphers
 * 1422 Cleartext
 * 1422 Key-agreement protocol
 * 1423 Electronic money
 * 1443 KHAZAD
 * 1453 Affine cipher
 * 1458 Certificate-based encryption
 * 1459 Physical security
 * 1464 W. T. Tutte
 * 1466 CAST-256
 * 1469 James H. Ellis
 * 1470 SHARK
 * 1471 Cryptographic protocol
 * 1475 Decipherment
 * 1488 KASUMI
 * 1490 MISTY1
 * 1493 RC6
 * 1517 Wired Equivalent Privacy
 * 1518 DigiCipher 2
 * 1526 Glossary of telecommunications encryption terms
 * 1540 Cipher Block Chaining
 * 1544 Cyphertext
 * 1547 Poem code
 * 1550 Camellia (cipher)
 * 1550 LOKI97
 * 1558 Type 1 product
 * 1563 Adi Shamir
 * 1570 RIPEMD-160
 * 1575 Session key
 * 1577 Clifford Cocks
 * 1582 Tabula recta
 * 1582 Twofish
 * 1583 Message digest
 * 1597 Blinding (cryptography)
 * 1602 Ron Rivest
 * 1603 Cypherpunk
 * 1623 Communications security
 * 1626 Herbert Yardley
 * 1666 Symmetric key algorithm
 * 1671 DES-X
 * 1714 Linear cryptanalysis
 * 1720 Chosen plaintext attack
 * 1723 PC Bruno
 * 1739 Common Scrambling Algorithm
 * 1754 Cipher
 * 1775 Key escrow
 * 1785 3-Way
 * 1797 OpenSSH
 * 1803 Hans Thilo-Schmidt
 * 1814 LibTom Project
 * 1825 Blowfish (cipher)
 * 1867 Commitment scheme
 * 1875 Dictionary attack
 * 1876 Initialization vector
 * 1890 Needham-Schroeder
 * 1891 Tamper resistance
 * 1911 Adaptive chosen ciphertext attack
 * 1937 40-bit encryption
 * 1943 Digital timestamping
 * 1944 Cryptonomicon
 * 1955 The Gold Bug
 * 1971 Crypto system
 * 1975 Kerberos
 * 1993 ElGamal discrete log cryptosystem
 * 1994 Key distribution center
 * 2001 Bruce Schneier
 * 2010 Dmitry Sklyarov
 * 2040 Whitfield Diffie
 * 2064 Permutation cipher
 * 2086 Stream cipher
 * 2110 Kerckhoffs' law
 * 2133 Blum Blum Shub
 * 2157 Knapsack problem
 * 2161 Block size (cryptography)
 * 2175 Linear feedback shift register
 * 2187 Man in the middle attack
 * 2199 Phil Zimmermann
 * 2205 Triple DES
 * 2223 Cryptographically secure pseudo-random number generator
 * 2234 SIGINT
 * 2246 Public key certificate
 * 2250 Discrete logarithm
 * 2251 Scrambler
 * 2252 Skipjack (cipher)
 * 2304 ID-based cryptography
 * 2317 Secure shell
 * 2348 One way function
 * 2349 Unicity distance
 * 2349 X.509
 * 2350 Merkle-Hellman
 * 2365 TEMPEST
 * 2381 Brute force attack
 * 2389 Lorenz cypher
 * 2392 Stegotext
 * 2432 Content-scrambling system
 * 2454 JN-25
 * 2454 Wi-Fi Protected Access
 * 2472 Auguste Kerckhoffs
 * 2494 Zeroise
 * 2509 Advanced Encryption Standard process
 * 2542 Security engineering
 * 2543 Illegal prime
 * 2560 Leonard Adleman
 * 2563 Lucifer (cipher)
 * 2576 Digital Signature Algorithm
 * 2582 Cryptographic hash function
 * 2605 XTEA
 * 2626 Key authentication
 * 2661 Characters in cryptography
 * 2695 Polybius square
 * 2701 Padding (cryptography)
 * 2753 Web of trust
 * 2758 Frank Rowlett
 * 2759 Kryptos
 * 2761 Pseudonymity
 * 2786 Beale ciphers
 * 2790 CAST-128
 * 2794 Secure cryptoprocessor
 * 2867 Index of coincidence
 * 2870 ADFGVX cipher
 * 2871 MD5
 * 2903 Trusted Third Party
 * 2906 The Magic Words are Squeamish Ossifrage
 * 2913 Louis W. Tordella
 * 2928 RC5
 * 2930 Certificate authority
 * 2938 Joseph Rochefort
 * 2956 Pass phrase
 * 3024 Laurence Safford
 * 3036 Geheimfernschreiber
 * 3132 Leone Battista Alberti
 * 3161 Snake oil
 * 3173 Agnes Meyer Driscoll
 * 3275 Diffie-Hellman key exchange
 * 3296 Caesar cipher
 * 3313 International Data Encryption Algorithm
 * 3417 Government Communications Headquarters
 * 3459 Scytale
 * 3476 IPSec
 * 3493 Regulation of Investigatory Powers Act 2000
 * 3531 Certificate Revocation List
 * 3531 Secure channel
 * 3536 Feistel cipher
 * 3536 Tiny Encryption Algorithm
 * 3552 NESSIE
 * 3753 Blind signature
 * 3816 Autokey cipher
 * 3862 GNU Privacy Guard
 * 3863 VENONA project
 * 3870 Leo Marks
 * 4016 Block cipher modes of operation
 * 4040 Key exchange
 * 4077 Invisible ink
 * 4080 Polyalphabetic cipher
 * 4082 Marian Rejewski
 * 4185 Crypto-anarchism
 * 4205 Information security
 * 4221 Typex
 * 4250 Bombe
 * 4266 Transport Layer Security
 * 4276 FEAL
 * 4337 Meet-in-the-middle attack
 * 4411 Authentication
 * 4420 Computer surveillance
 * 4484 Code talkers
 * 4539 Clipper chip
 * 4573 Steganalysis
 * 4592 Magic (cryptography)
 * 4624 RC4 (cipher)
 * 4667 Block cipher
 * 4737 SHA-1
 * 4812 Differential cryptanalysis
 * 4924 Zimmermann Telegram
 * 4928 Playfair cipher
 * 5031 ROT13
 * 5055 Cryptanalysis
 * 5082 Plaintext
 * 5126 Traffic analysis
 * 5381 SAFER
 * 5450 Security through obscurity
 * 5708 Asymmetric key algorithm
 * 5894 Straddling checkerboard
 * 5993 Elliptic curve cryptography
 * 6059 Pseudorandom number generator
 * 6116 WikiProject Cryptography
 * 6126 Advanced Encryption Standard
 * 6143 Zero-knowledge proof
 * 6287 Hebern Rotor Machine
 * 6294 Substitution box
 * 6481 Colossus computer
 * 6496 National Security Agency
 * 6708 Public-key cryptography
 * 6813 Abraham Sinkov
 * 6918 Key (cryptography)
 * 7019 Wikipedia talk:WikiProject Cryptography
 * 7069 Bletchley Park
 * 7209 Frequency analysis
 * 7297 Vigen&egrave;re
 * 7330 DeCSS
 * 7365 Password cracking
 * 7492 Key size
 * 7540 ECHELON
 * 7664 Transposition cipher
 * 7775 Cryptographic engineering
 * 7860 Ultra
 * 7982 Running key cipher
 * 8080 Public key infrastructure
 * 8175 Key signature
 * 8239 Burrows-Abadi-Needham logic
 * 8611 SIGABA
 * 8719 Purple code
 * 9417 CRYPTREC
 * 9435 Secret sharing
 * 9456 Code
 * 9526 Fritz-chip
 * 9801 One-time pad
 * 9892 Steganography
 * 10378 Digital signature
 * 10542 Data Encryption Standard
 * 10662 Password
 * 10712 Electronic voting
 * 10773 Alan Turing
 * 11171 RSA
 * 11297 List of cryptographers
 * 11589 William F. Friedman
 * 11654 Elizebeth Friedman
 * 12181 Anonymous remailer
 * 12951 Quantum cryptography
 * 13816 Computer insecurity
 * 14164 Rotor machine
 * 14451 Books on cryptography
 * 16200 Topics in cryptography
 * 16791 Cryptography
 * 17349 Substitution cipher
 * 17726 Hardware random number generator
 * 17899 History of cryptography
 * 18704 Pretty Good Privacy
 * 19994 Digital rights management
 * 32657 Voynich Manuscript
 * 38272 Enigma machine