Near Matches
Ignore Exact
Everything
2
Cryptology (idea)
See all of Cryptology
, there are 3 more in this node.
(
idea
)
by
Xamot
Thu Aug 23 2001 at 14:38:38
Learn More!
- A -
Adleman, Leonard
AES
Alice and Bob
ANSI X9
ANSI X9.9
ANSI X9.30
ANSI X9.31
Applied Cryptography
Assassination Politics
asymmetric cipher
Avalanche Effect
- B -
Charles Babbage
base64
The Beale Ciphers
Birthday Attack
blind signatures
blowfish
Stefan Brands
brute force
- C -
Caesar shift
Caesar shift cipher
capstone
CAST
CAST-256
CBC
cipher
ciphertext
cipher alphabet
cipher text
code
code breaking
The Code Book
Code Talkers
computer security
Confusion and Diffusion
cracker
cypherpunks
Cryptanalysis
Cryptonomicon
cryptology
cryptology: terms for breaking algorithims
cryptogram
Cryptograph
cryptographic primitives
cryptography
Cryptography And Network Security
cryptographer
cryptanalysis
crypto
Crypto Nugget
cut and choose protocols
- D -
dancing men
Decorrelation
decrypt
decryption
DeCSS
DES
Discrete Logarithms
Discrete Logarithm Signatures
differential cryptanalysis
Diffie-Hellman
Digital Cash
digital signing
the dining cryptographers problem
Double Spending
DSA
DSS
- E -
ElGamal
Elliptic Curve Cryptography
encrypt
encrypted
encrypted virus
encryption
encryption algorithm
Encryption Day
English transformations
enigma
ERIKO-CHAN cipher
Everything public PGP keys
Everything2 Crypto Project
- F -
Feal
Horst Feistel
Feistel network
Francis Bacon
frequency analysis
FIPS
FIPS PUBS
FIPS PUB 180-1
- G -
Galois LFSR
GPG
- H -
hacker
Handbook of Applied Cryptography
hash function
homophonic substitution cipher
- I -
IDEA
- J -
JED:Words (2)
- K -
key escrow
Khafre
Khufu
kleptography
- L -
Linux Cryptography Patches
Lucifer
- M -
Mathematics of RSA
MD2
MD5 hash function
mechanical cipher system
Merkle's Puzzles
Message Authentication Codes
mlecchita-vikalpa
modern cryptography
monoalphabetic substitution cipher
- N -
NIST
)
nomenclator
NSA
- O -
One-time Pad
OpenPGP
- P -
Perfect Hash Funcitons
Pigpen cipher
PKCS
PGP
plaintext
plain alphabet
Playfair Cipher
polyalphabetic substitution cipher
private key cryptography
public-key encryption
public key cryptography
purple
- Q -
Quantum Cryptography
- R -
Rambutan
RC4
RC5
RC6
RAP
)
Restricting Cryptography
RFC 1321 (The MD5 Message-Digest Algorithm)
Rijndael
Ron Rivest
Rot-13
ROT26
(silly)
RSA
RSA Secret Key Challenge
- S -
S-Box
S/MIME
SAFE
SAFER
Samizdat
and
Samizdat protocol
Bruce Schneier
secret decoder ring
secure
secure hash
Secure Hash Standard
(SHS)
security
SHA-1
SIGABA
simple substitution cipher
Skipjack
SSL
ssh
Steganographic File System
steganography
Stream Cipher
strong cryptography
strong encryption
Subliminal Channel
substitution cipher
symmetric cipher
symmetric encryption
synchronous stream cipher
- T -
Tempest
transposition cipher
trapdoor function
Triple DES
twofish
- V -
Vigenère cipher
and
Breaking the Vigenère cipher
Wim Van Eck
Van Eck phreaking
- W -
Weak Keys
Web of Trust
World War II Cryptographic Simulation
- X -
XOR
- Z -
zero-knowledge proofs
Phil Zimmerman
/msg
me
with additions to the list.
This the old
Cryptology Meta-Node
.
mental poker
Cryptanalysis
Cryptography
Everything2 Crypto Project
zero knowledge
Alan Turing
Elliptic Curve Cryptography
Playfair Cipher
The Arabian contribution to Cryptology
base64
computer security
Digital Fortress
Avalanche Effect
Birthday attack
Alice and Bob
Vigenère cipher
The Code Book
NLFSR
modern cryptography
Khafre
Rijndael
cryptology: terms for breaking algorithms
zero-knowledge proofs