Cryptography lists and comparisons

Index of cryptography articles

Articles related to cryptography include: (Wikipedia).

Video thumbnail

Randomness Quiz - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Challenge Question - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Totient - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Auditing Tradeoffs - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 2 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography II" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This session will focus on public-key cryptography, including key exchange, public-key encryption,

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Totient Function - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Steven Galbraith, Isogeny graphs, computational problems, and applications to cryptography

VaNTAGe Seminar, September 20, 2022 License: CC-BY-NC-SA Some of the papers mentioned in this talk: Ducas, Pierrot 2019: https://link.springer.com/article/10.1007/s10623-018- 0573-3 (https://rdcu.be/cVYrC) Kohel 1996: http://iml.univ-mrs.fr/~kohel/pub/thesis.pdf Fouquet, Morain 2002: ht

From playlist New developments in isogeny-based cryptography

Video thumbnail

Few other Cryptanalytic Techniques

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Stanford Seminar - The Evolution of Public Key Cryptography

EE380: Computer Systems Colloquium Seminar The Evolution of Public Key Cryptography Speaker: Martin Hellman, Stanford EE (Emeritus) While public key cryptography is seen as revolutionary, after this talk you might wonder why it took Whit Diffie, Ralph Merkle and Hellman so long to discov

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Video thumbnail

Stanford Seminar - Cryptology and Security: the view from 2016 - Whitfield Diffie

"Cryptology and Security: the view from 2016" - Whitfield Diffie, ACM 2015 Turing Award About the talk: On the face of it, the cryptographers have solved their piece of the puzzle but every other aspect of security, from crypto-implementations to operating systems to applications, stinks.

From playlist Engineering

Video thumbnail

Donald Knuth: All Questions Answered - Heroes Lecture Stanford Engineering

Professor Knuth was the guest of honor at this special event on the evening of May 12. Knuth briefly discussed his work and then opened the room queries from the audience. In his typical self-deprecating style, the Professor warns: "the audience should be aware that the answers will be my

From playlist Stanford Engineering Heroes

Video thumbnail

An Uncrackable Code? (Quantum Cryptography) - A Quantum Scientist Explains #QuantumMinutes

Note: at 8:55 it be should ½ x ½ = ¼ of course, not + What is Quantum Cryptography? Today's host, Dr. Lukas Knips, is a quantum researcher in the group of Prof. Harald Weinfurter at the Ludwig-Maximilians-Universität (LMU) München in Germany. His research focusses on free-space Quantum Ke

From playlist Summer of Math Exposition Youtube Videos

Video thumbnail

Cryptography: Codes, Ciphers, and Connections

The encryption of information is as old as information itself. Ever since two people wanted to pass something along, so has there been a third party who wanted to be privy to it. This back and forth battle of creating codes, breaking them, and finding new ones has been happening quietly fo

From playlist Mathematics

Video thumbnail

Stanford Lecture: Donald Knuth - All Questions Answered (May 12, 2011)

May 12, 2011 Donald Knuth, in this Stanford Engineering Hero Lecture, answers questions from the audience--from his opinion of Wikipedia to the next great discovery in computer science to his most memorable mistake. Learn more: http://scpd.stanford.edu/knuth/

From playlist Donald Knuth Lectures

Video thumbnail

Shannon 100 - 26/10/2016 - Anne CANTEAUT

Comment concevoir un algorithme de chiffrement sûr et efficace : l'héritage de Shannon Anne Canteaut (INRIA) Dans son article fondateur publié en 1949 posant les fondements de la cryptographie, Claude Shannon a énoncé deux méthodes de conception visant à éviter les attaques statistiques

From playlist Shannon 100

Video thumbnail

CTNT 2022 - An Introduction to Galois Representations (Lecture 3) - by Alvaro Lozano-Robledo

This video is part of a mini-course on "An Introduction to Galois Representations" that was taught during CTNT 2022, the Connecticut Summer School and Conference in Number Theory. More about CTNT: https://ctnt-summer.math.uconn.edu/

From playlist CTNT 2022 - An Introduction to Galois Representations (by Alvaro Lozano-Robledo)

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

How cryptography and Web3 can fight misinformation and help restore trust in digital media

Subscribe to Stanford Engineering's The Future of Everything podcast: https://the-future-of-everything-stanford-engineering.simplecast.com/ A group of researchers explore how the tools of cryptography can be used to verify the veracity of the images and videos you see online. Many of the

From playlist The Future of Everything

Related pages

Commitment scheme | Cayley–Purser algorithm | KL-43 | Public key fingerprint | CIPHERUNICORN-E | ElGamal encryption | PGPDisk | Related-key attack | Birthday attack | WAKE (cipher) | Navajo I | CCMP (cryptography) | RC5 | DRYAD | Elliptic curve only hash | Universal composability | HAIFA construction | Kasiski examination | Ring signature | Vigenère cipher | Spectr-H64 | Cryptographic hash function | HAS-160 | RSA (cryptosystem) | Feige–Fiat–Shamir identification scheme | Merkle's Puzzles | Four-square cipher | LOKI | Key-recovery attack | Decisional Diffie–Hellman assumption | Public key infrastructure | Traffic analysis | Internet Security Association and Key Management Protocol | XSL attack | Secret decoder ring | Physical unclonable function | Online Certificate Status Protocol | One-way compression function | Fast syndrome-based hash | George Blakley | Electronic signature | Undeniable signature | Merkle signature scheme | Burrows–Abadi–Needham logic | E0 (cipher) | CDMF | MULTI-S01 | Security parameter | Certificate signing request | Trivium (cipher) | Covert channel | SNOW | Pointcheval–Stern signature algorithm | Cryptography standards | Straddling checkerboard | Pseudo-Hadamard transform | Solitaire (cipher) | Impossible differential cryptanalysis | STU-II | Key escrow | Probabilistic encryption | ICE (cipher) | ISAAC (cipher) | DMA attack | MD5CRK | SOBER-128 | Point-to-Point Tunneling Protocol | CAST-256 | Tiny Encryption Algorithm | Partitioning cryptanalysis | Certificateless cryptography | Key size | Time/memory/data tradeoff attack | Dictionary attack | PKCS 12 | Tamper resistance | Madryga | Man-in-the-middle attack | Berlekamp–Massey algorithm | Multivariate cryptography | Rabbit (cipher) | Universal one-way hash function | Clipper chip | Anonymous remailer | KW-37 | Keystream | Station-to-Station protocol | Snake oil (cryptography) | Hard-core predicate | Davies attack | International Data Encryption Algorithm | S/MIME | Otway–Rees protocol | Communications security | Strong cryptography | FIPS 140 | XTEA | Slide attack | Index of coincidence | REDOC | LOKI97 | Post-quantum cryptography | Power analysis | Cryptanalytic computer | Group signature | Known-key distinguishing attack | Message authentication code | Lorenz cipher | Malleability (cryptography) | Self-signed certificate | Symmetric-key algorithm | Binary Goppa code | HMAC | LEVIATHAN (cipher) | Blinding (cryptography) | OpenPGP card | MQV | NTRUSign | Kerberos (protocol) | XXTEA | A5/2 | VIC cipher | NSA cryptography | GOST (block cipher) | KYK-13 | TrueCrypt | Strong RSA assumption | SWIFFT | McEliece cryptosystem | Ciphertext stealing | Authenticated encryption | CRYPTREC | Correlation immunity | Triple DES | Higher-order differential cryptanalysis | Claude Shannon | Piling-up lemma | RadioGatún | Pairing-based cryptography | SHACAL | PKCS 11 | Random oracle | Wadsworth's cipher | Cryptosystem | MacGuffin (cipher) | MD4 | Enigma machine | ABC (stream cipher) | Hierocrypt | ESTREAM | Signcryption | KW-26 | Acoustic cryptanalysis | Diplomatic bag | MS-CHAP | List of cryptographic file systems | Certificate revocation list | Shared secret | Double Ratchet Algorithm | Chosen-plaintext attack | Confusion and diffusion | Secure Hash Algorithms | Nihilist cipher | Timing attack | BEAR and LION ciphers | Schoof–Elkies–Atkin algorithm | RSA Secret-Key Challenge | John Herivel | Two-square cipher | Temporal Key Integrity Protocol | Classical cipher | Advanced Access Content System | Key distribution center | I. J. Good | MESH (cipher) | Simple public-key infrastructure | Information-theoretic security | Algorithmically random sequence | Cryptography | Ladder-DES | Rubber-hose cryptanalysis | Quantum coin flipping | CCM mode | PMAC (cryptography) | KSD-64 | Preimage attack | Very smooth hash | Quantum key distribution | Pohlig–Hellman algorithm | Skein (hash function) | Collision attack | Discrete logarithm | Poly1305 | Linear cryptanalysis | Ciphertext expansion | RC4 | KHAZAD | Whirlpool (hash function) | Salsa20 | E4M | Hill cipher | Digital signature forgery | Random number generator attack | Baby-step giant-step | Gilbert Vernam | RSA Factoring Challenge | W. T. Tutte | UMAC | Data Authentication Algorithm | Computational Diffie–Hellman assumption | Banburismus | Biclique attack | ARIA (cipher) | Quantum digital signature | Military Cryptanalytics | Autokey cipher | MUGI | Block cipher | Message forgery | SHA-3 | Ciphertext-only attack | Differential cryptanalysis | Distinguishing attack | Indistinguishability obfuscation | Differential-linear attack | Galois/Counter Mode | One-way function | Steganalysis | Fill device | GGH encryption scheme | Reservehandverfahren | PKCS | Qrpff | Beaufort cipher | Chosen-ciphertext attack | Cold boot attack | Visual cryptography | Grand Cru (cipher) | Hidden Field Equations | Ciphertext indistinguishability | Crab (cipher) | Bit-flipping attack | Code (cryptography) | BB84 | Cipher runes | GNU Privacy Guard | KCDSA | Caesar cipher | Encrypted function | Sponge function | Disk encryption | Needham–Schroeder protocol | SEED | Key generator | DFC (cipher) | KY-58 | Hyperelliptic curve cryptography | Verisign | Grain (cipher) | History of cryptography | BaseKing | Scramdisk | Full Domain Hash | Hash list | Grover's algorithm | M-94 | Passphrase | XML Encryption | One-key MAC | EdDSA | Reihenschieber | Blum–Goldwasser cryptosystem | ECC patents | High-bandwidth Digital Content Protection | Optimal asymmetric encryption padding | KY-68 | Elliptic-curve cryptography | Mental poker | SEAL (cipher) | Secure channel | Certificate authority | XDH assumption | Alternating step generator | NTRUEncrypt | NSA encryption systems | Hybrid cryptosystem | Books on cryptography | Panama (cryptography) | Block cipher mode of operation | RC2 | Information leakage | GDES | Atbash | Cellular Message Encryption Algorithm | Key generation | ROT13 | Bifid cipher | Pigpen cipher | Treyfer | Digital Signature Algorithm | Password Hashing Competition | NewDES | Xmx | Cryptographic primitive | Unicity distance | Plaintext-aware encryption | SHA-2 | Camellia (cipher) | Substitution–permutation network | Khufu and Khafre | COCONUT98 | M6 (cipher) | Side-channel attack | DES supplementary material | Digital signature | Dining cryptographers problem | Password-authenticated key agreement | Rabin cryptosystem | Py (cipher) | Playfair cipher | Claw-free permutation | WinSCP | National Cipher Challenge | Square (cipher) | Elliptic-curve Diffie–Hellman | Security protocol notation | Advanced Encryption Standard process | Zeroisation | Pig Latin | EFF DES cracker | Integral cryptanalysis | Poem code | RSA Security | KN-Cipher | Lattice-based cryptography | Direct Anonymous Attestation | FEA-M | IEEE P1363 | Polybius square | Filesystem-level encryption | Trifid cipher | Lyra2 | MDS matrix | Mod n cryptanalysis | OCB mode | CIKS-1 | Known-plaintext attack | QUAD (cipher) | Interpolation attack | Completeness (cryptography) | KL-51 | New Data Seal | Great Cipher | Hardware random number generator | Linear-feedback shift register | Plaintext | Comparison of disk encryption software | FISH (cipher) | Steganography | Key management | Stream cipher | XML Signature | KY-3 | Truncated differential cryptanalysis | Replay attack | FROG | Rainbow table | Common Scrambling Algorithm | PBKDF2 | Semantic security | Cryptovirology | Affine cipher | Diffie–Hellman key exchange | Diffie–Hellman problem | Link encryption | SXAL/MBAL | Derived unique key per transaction | FEAL | Attack model | Proxy re-encryption | Alan Turing | Kerckhoffs's principle | Encrypted key exchange | Security level | CAST-128 | Key clustering | Boomerang attack | Yarrow algorithm | Kiss (cryptanalysis) | VINSON | MMB (cipher) | Iraqi block cipher | Private information retrieval | Microdot | Advanced Encryption Standard | Null cipher | Secure multi-party computation | Efficient Probabilistic Public-Key Encryption Scheme | STU-III | Johannes Trithemius | Security association | KG-84 | Skipjack (cipher) | Dragon (cipher) | Twofish | Niederreiter cryptosystem | MD5 | Curve25519 | Serpent (cipher) | Thawte | SAVILLE | Floradora | Torus-based cryptography | Oblivious transfer | Schnorr signature | SHARK | Merkle–Hellman knapsack cryptosystem | Okamoto–Uchiyama cryptosystem | Password cracking | Alphabetum Kaldeorum | Secure Communications Interoperability Protocol | A5/1 | Interlock protocol | M8 (cipher) | Padding (cryptography) | Q (cipher) | Knapsack problem | Cryptanalysis | Advantage (cryptography) | Provable security | Brute-force attack | NESSIE | Key schedule | Hash-based cryptography | HC-256 | Tabula recta | Fluhrer, Mantin and Shamir attack | Red/black concept | SAFER | Hugo Hadwiger | RIPEMD | Verifiable secret sharing | DEAL | Adversary (cryptography) | Entrust | Merkle tree | Secret sharing | Cover (telecommunications) | Mimic function | Akelarre (cipher) | BassOmatic | Scrypt | DeCSS | Polyalphabetic cipher | Nimbus (cipher) | One-time pad | Certificate-based encryption | Three-pass protocol | Witness-indistinguishable proof | Crypt (C) | Key (cryptography) | Pretty Good Privacy | Hasty Pudding cipher | Fortuna (PRNG) | Meet-in-the-middle attack | NOEKEON | Group-based cryptography | NSA Suite B Cryptography | Pike (cipher) | Scrambler | The Magic Words are Squeamish Ossifrage | Concrete security | E2 (cipher) | Message authentication | VEST | List of telecommunications encryption terms | CLEFIA | CS-Cipher | Book cipher | Controlled Cryptographic Item | Feistel cipher | Mercy (cipher) | ADFGVX cipher | Cryptochannel | IDEA NXT | Clock drift | Shor's algorithm | Snefru | Algebraic Eraser | Scytale | DES-X | ElGamal signature scheme | Pre-shared key | Secure key issuing cryptography | Disk encryption software | GOST (hash function) | Root certificate | Rebound attack | NUSH | MICKEY | Product cipher | Hushmail | Blowfish (cipher) | FreeOTFE | Key signature (cryptography) | Transposition cipher | Rambutan (cryptography) | List of cryptographers | GMR (cryptography) | Avalanche effect | CrypTool | Supersingular isogeny key exchange | KL-7 | RC6 | Watermarking attack | Scream (cipher) | Neural cryptography | Stream cipher attacks | Block size (cryptography) | SECG | Rail fence cipher | Grille (cryptography) | Key derivation function | FIPS 140-2 | CBC-MAC | EAX mode | Adaptive chosen-ciphertext attack | Seahorse (software) | Key stretching | GGH signature scheme | Integer factorization | Key authentication | Fortezza | Zero-knowledge proof | NTRU | Anubis (cipher) | Key exchange | Frequency analysis | Schnorr group | Trapdoor function | Collision resistance | Encryption | Dm-crypt | MultiSwap | LEX (cipher) | Blind signature | X.509 | Key-agreement protocol | Hash function security summary | Capstone (cryptography) | SC2000 | Outline of cryptography | Hash chain | Salt (cryptography) | Codebook | KASUMI | Keysigning | Turing (cipher) | Merkle–Damgård construction | Key signing party | RSA problem | Trusted third party | Self-shrinking generator | XTR | The Alphabet Cipher | Broadcast encryption | HAVAL | Dual EC DRBG | Cryptographic key types | MISTY1 | Russian copulation | Goldwasser–Micali cryptosystem | Standard model (cryptography) | Bacon's cipher | LCS35 | Gardening (cryptanalysis) | Cramer–Shoup cryptosystem | Pseudorandom permutation | Session key | Key server (cryptographic) | Running key cipher | Passive attack | FileVault | Blum Blum Shub | ABA digital signature guidelines | Transmission security | Quantum fingerprinting | Public key certificate | Phelix | Chaffing and winnowing | Ssh-agent | SHA-1 | Key whitening | Cryptographic Service Provider | Kalyna (cipher) | Timeline of cryptography | Wired Equivalent Privacy | Cryptographically secure pseudorandom number generator | Distributed.net | Hyper-encryption | SOSEMANUK | Keyfile | Cryptomeria cipher | MAGENTA | Shrinking generator | Zodiac (cipher) | Small subgroup confinement attack | Pepper (cryptography) | Weak key | Substitution cipher | Public-key cryptography | Negligible function | BATON | Quadratic sieve | Paillier cryptosystem | Data Encryption Standard | Rip van Winkle cipher | ISO 19092-2 | UES (cipher) | Argon2 | Computational hardness assumption | Secure voice | Cardan grille | Format-preserving encryption | Web of trust | Codress message | Onion routing | S-1 block cipher | DES Challenges | Residual block termination | List of ciphertexts | Arnold Cipher | NIST hash function competition | NSA Suite A Cryptography | Lucifer (cipher) | Lamport signature | MDC-2 | Array controller based encryption | KOV-14 | Bent function | Initialization vector | Security through obscurity | Padding oracle attack | CIPHERUNICORN-A | Decorrelation theory | Custom hardware attack | Deniable encryption | Cipher security summary | Deterministic encryption | Red Pike (cipher) | Pseudorandom number generator | Enigmail | BestCrypt | Nonlinear-feedback shift register | Decipherment | Rijndael S-box | Curve448 | Authorization certificate | Quantum cryptography | Invisible ink