This category is maintained by WikiProject Stub sorting. Please propose new stub templates and categories here before creation. |
This category is for stub articles relating to cryptography. You can help by expanding them. To add an article to this category, use {{crypto-stub}} instead of {{stub}} . |
See also
editPages in category "Cryptography stubs"
The following 200 pages are in this category, out of approximately 343 total. This list may not reflect recent changes.
(previous page) (next page)A
B
C
- CAPICOM
- Capstone (cryptography)
- Card Verifiable Certificate
- CAST-256
- Ccrypt
- CDMF
- Certification on demand
- Chaos communications
- Chaos machine
- CIKS-1
- Cipher device
- Ciphertext expansion
- Ciphr
- CJCSG
- CLEFIA
- Client certificate
- Client-side encryption
- Code word (communication)
- Codress message
- Commercial National Security Algorithm Suite
- Common reference string model
- Communication Theory of Secrecy Systems
- Communications Machine
- Completeness (cryptography)
- Concrete security
- Conjugate coding
- Controlled Cryptographic Item
- Correlation immunity
- Coset leader
- COSIC
- Cover (telecommunications)
- Cover-coding
- Crab (cipher)
- Cryptanalytic computer
- CryptMT
- Crypto API (Linux)
- Crypto-1
- Crypto (book)
- CryptoBuddy
- Cryptographic log on
- Cryptographic Message Syntax
- Cryptographic module
- Cryptographic Module Validation Program
- Cryptographic Quarterly
- Cryptographie indéchiffrable
- Cryptography newsgroups
- Cryptography Research
- Cryptologia
- Cryptology ePrint Archive
- Cryptoloop
- Cryptomenysis Patefacta
- CRYPTON
- Cryptoperiod
- Cryptosystem
- CS-Cipher
- Matt Curtin
- CWC mode
D
- Data Authentication Algorithm
- Davies attack
- DEAL
- DECIM
- Decorrelation theory
- Delegated Path Discovery
- Deniable authentication
- Designated verifier signature
- Detached signature
- DICING
- Differential fault analysis
- Digital signature forgery
- Digital Signature Standard
- Distribution ensemble
- Dragon (cipher)
- Dusting attack
- Dynamic secrets
E
F
G
H
I
J
K
- KCDSA
- KCipher-2
- Key clustering
- Key generator
- Key signature (cryptography)
- Key signing party
- Key Transparency
- Key-recovery attack
- Keyring (cryptography)
- Keysigning
- Kiss (cryptanalysis)
- KL-43
- KL-51
- Kmc-Subset137
- Knapsack cryptosystems
- Known-key distinguishing attack
- KOV-14
- KOV-21
- Kryptographik
- KSD-64
- KSV-21
- KY-58
- KY-68