User:Elvara11/Cryptography

Source: Wikipedia, the free encyclopedia.


Intel Corporation
Electronic mail
Keccak
People's Republic of China
Key length
Spy
Ronald L. Rivest
Ronald Rivest
Electronic commerce
Cryptology
Anchor Books
Block ciphers
E-mail client
Secret code
Binary numeral system
E-mail privacy
Random oracle model
Lorenz SZ40/42
Colloquial
Philip Zimmermann
Denver Post
Len Adleman
Cryptography laws in different nations
General staff
Gabriel de Luetz d'Aramon
Bazeries
Free speech
Fortify (Netscape)
Chicken-and-egg problem
Henri II of France
Directive on the harmonisation of certain aspects of copyright and related rights in the information society
Side-channel attack
Digital watermark
Topics in Cryptography
Mathematical recreations
U.S. Constitution
Pseudorandom function
New Directions in Cryptography
Diffie-Hellman
Information theoretic security
Stream ciphers
Communications
Triple-DES
CRYPTO
MPAA
Dmitry Sklyarov
Blu-ray
Cryptographic hash functions
VPN
Brute force attack
Block cipher modes of operation
1st Amendment
Public key infrastructure
Alberti Cipher Disk
Kerckhoffs's Principle
Quantum computing
Secure multiparty computation
New York Times
UC Berkeley
GCHQ
Quantum physics
RSA (algorithm)
IEEE
National Bureau of Standards
Islamic Republic of Iran
Exponential time
Field agent
Official cover
All Writs Act
Code word
Export of cryptography
Asset (intelligence)
Phillip Rogaway
Strawperson
Capstone (cryptography)
Cryptologia
University of Illinois Press
Lexicographic code
Mihir Bellare
Wetwork
Secret Code
Cut-out (espionage)
Adversary (cryptography)
One-way voice link
Niels Ferguson
William Stallings
Cryptosystem
USENIX Annual Technical Conference
Chosen-plaintext attack
The Code Book
James Gannon
Observer-expectancy effect
United States v. Fricosu
Gardening (cryptanalysis)
Casualty estimation
Key escrow
List of unsolved problems in computer science
Atbash
Hybrid cryptosystem
Eli Biham
Tabula recta
Paranoiac-critical method
Malcolm J. Williamson
Encyclopedia of Cryptography and Security
Charles Rackoff
Eavesdropping
Sarah Flannery
Theomatics
Matt Blaze
Cryptogram
Cryptology (album)
Ciphertext-only attack
Cryptographic protocol
Friedrich Kasiski
Computational hardness assumption
United States Munitions List
Safe house
Black bag operation
The Codebreakers
Clifford B. Hicks
Non-repudiation
USB dead drop
George Blakley
Bernstein v. United States
Cryptography standards
Symmetric-key algorithm
Steven Levy
Auguste Kerckhoffs
David A. Wagner
French Ambassador to the Ottoman Empire
Clustering illusion
Schnorr signature
Dead drop
Pattern recognition (psychology)
Silvio Micali
Cipher disk
FEAL
Provable security
James H. Ellis
Non-official cover
Oded Goldreich
Secure channel
Scytale
Clifford Cocks
Resident spy
Project SHAMROCK
Project MINARET
Cryptographic primitive
Linear cryptanalysis
Market intelligence
Black operation
Visual cryptography
-logy
Agent handling
Tsutomu Shimomura
Kasiski examination
Reverse speech
Signcryption
Chosen-ciphertext attack
List of Special Reconnaissance organizations
Statistical randomness
Concealment device
Microdot
Fnord
MD4
Shafi Goldwasser
Clipper chip
Cramer–Shoup cryptosystem
Encryption
Asemic writing
Strong cryptography
Diplomat
Timing attack
Wassenaar Arrangement
CrypTool
Discrete logarithm
Known-plaintext attack
Adi Shamir
Ciphertext
Puzzle
Key (cryptography)
Skipjack (cipher)
ElGamal encryption
Ron Rivest
List of counterintelligence organizations
Extortion
Message authentication code
Digital Signature Algorithm
Alan Cox
List of important publications in cryptography
S/MIME
Intypedia
Plaintext
Cryptographic engineering
Foreign Affairs
Ralph Merkle
Sacred geometry
Self-incrimination
Suetonius
In Our Time (BBC Radio 4)
David Kahn (writer)
Signature
Source code
Hidden message
Differential cryptanalysis
Nonsense
Counterintelligence failures
Passphrase
Security engineering
One-way function
International Data Encryption Algorithm
Forgery
Martin Hellman
Transposition cipher
Classical cipher
Confidentiality
Secrecy
Intelligence assessment
Paradox
Daniel J. Bernstein
Nuclear MASINT
Wikiversity
Intelligence cycle (target-centric approach)
Square (algebra)
Apophenia
Code (cryptography)
Jefferson disk
Cipher
Johannes Trithemius
Geospatial intelligence
Data integrity
Radiofrequency MASINT
World Intellectual Property Organization
List of cryptographers
Key management
Analysis of competing hypotheses
Frequency analysis
United States Department of Justice
Bit
Brute-force attack
Abstract algebra
Electronic cash
Financial intelligence
Mozilla Thunderbird
Whitfield Diffie
Grille (cryptography)
Imagery intelligence
Key disclosure law
Polymath
Pareidolia