Category: Cryptography lists and comparisons

Index of cryptography articles
Articles related to cryptography include:
List of ciphertexts
Some famous ciphertexts (or cryptograms), in chronological order by date, are:
List of cryptographers
This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries.
Hash function security summary
This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cry
Comparison of cryptographic hash functions
The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not all-inc
Comparison of disk encryption software
This is a technical feature comparison of different disk encryption software.
Outline of cryptography
The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disci
Comparison of cryptography libraries
The tables below compare cryptography libraries that deal with cryptography algorithms and have API function calls to each of the supported features.
Glossary of cryptographic keys
This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification
List of applications using PKCS 11
This article lists applications and other software implementations using the PKCS #11 standard.
List of cryptographic file systems
This is a list of filesystems with support for filesystem-level encryption. Not to be confused with full-disk encryption.
Books on cryptography
Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sen
Timeline of cryptography
Below is a timeline of notable events related to cryptography.
Cipher security summary
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.
List of telecommunications encryption terms
This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C. * A5/1 – a stream cipher used to
List of hash functions
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.