Jump to content

User:Peregrinus11/Books/Crypto

From Wikipedia, the free encyclopedia


Cryptography

[edit]

Ciphers, passwords, analysis, ...

[edit]
Advanced Encryption Standard
Authentication
Birthday attack
Black-bag cryptanalysis
Block cipher
Brute-force attack
Brute-force search
Caesar cipher
Checksum
Chosen-plaintext attack
Cipher
Ciphertext
Ciphertext-only attack
Classical cipher
Clipper chip
Code (cryptography)
Code word
Cold boot attack
Cryptanalysis
Cryptogram
Cryptographic engineering
Cryptographic hash function
Cryptography
Cryptography standards
Cryptosystem
Cyberspace Electronic Security Act
Data Encryption Standard
Differential cryptanalysis
Diffie–Hellman key exchange
Digital Millennium Copyright Act
Digital rights management
Digital signature
Encryption
Enigma machine
Export of cryptography from the United States
Frequency analysis
Garbage picking
Hash table
Hash-based message authentication code
History of cryptography
Information-theoretic security
Integer factorization
Integral cryptanalysis
Kerckhoffs's principle
Key (cryptography)
Key authentication
Key derivation function
Key disclosure law
Key escrow
Key generation
Key management
Key size
Key stretching
Known-plaintext attack
Linear cryptanalysis
Man-in-the-middle attack
MD5
Meet-in-the-middle attack
Message authentication code
Modular arithmetic
National Security Agency
One-time pad
One-time password
One-way function
Outline of cryptography
Passphrase
Password
Password cracking
Password fatigue
Password manager
Password policy
Password psychology
Password strength
Password synchronization
Password-authenticated key agreement
Plaintext
Pre-shared key
Pretty Good Privacy
Public-key cryptography
Rainbow table
Random password generator
Related-key attack
Rotor machine
RSA (cryptosystem)
Rubber-hose cryptanalysis
Salt (cryptography)
Security token
Self-service password reset
SHA-1
Single sign-on
Social engineering (security)
Steganography
Strong cryptography
Substitution cipher
Symmetric-key algorithm
Tempest (codename)
Traffic analysis
Transport Layer Security
Transposition cipher
Trojan horse (computing)
Vigenère cipher
Zero-knowledge proof