Search results
Jump to navigation
Jump to search
Page title matches
- The term '''cryptography''' comes from [[Greek language|Greek]] κρυπτός ''kryptós'' "hidden, ...pread of computers and electronic communication systems in recent decades, cryptography has become much more broadly important.52 KB (8,332 words) - 05:49, 8 April 2024
- ...y distribution key]], [[Key (cryptography)#public key|public key]], [[Key (cryptography)#key generating key|key generating key]]) ...must be kept secret. A subset of keys that must be kept secret are [[Key (cryptography)#private key|private keys,]] which imply the existence of an associated pub4 KB (564 words) - 23:12, 4 February 2010
- #REDIRECT [[Politics of cryptography]]38 bytes (4 words) - 20:52, 20 May 2010
- {{main|Cryptography}} In cryptography, a '''hash''' or '''message digest''' is a fixed-size string calculated fro16 KB (2,641 words) - 15:51, 8 April 2024
- 36 bytes (4 words) - 21:55, 5 June 2009
- 30 bytes (3 words) - 01:50, 12 February 2009
- 250 bytes (30 words) - 03:05, 21 May 2010
- 49 bytes (6 words) - 21:49, 5 June 2009
- ...y [[Steven Levy]], about the political and legal conflicts in the US about cryptography, such as the [[Clipper Chip]] controversy and the [[Bernstein v. United Sta ...ode.asp?id=2152 RSA Laboratories' Frequently Asked Questions About Today's Cryptography]3 KB (478 words) - 21:53, 10 May 2011
- #REDIRECT [[Cryptography#Codes_versus_ciphers]]47 bytes (5 words) - 21:46, 1 December 2009
- 346 bytes (45 words) - 11:07, 30 October 2008
- {{dambigbox|Snake oil (cryptography)|Snake}} ...which have ''both wildly extravagant marketing claims and appallingly bad cryptography''. Unfortunately, these are somewhat common.6 KB (921 words) - 05:48, 8 April 2024
- There is a large [http://www.faqs.org/faqs/cryptography-faq/ cryptography FAQ] with many links to other material.1 KB (158 words) - 02:53, 6 March 2011
- 34 bytes (4 words) - 21:53, 5 June 2009
- {{r|Quantum cryptography}} {{r|Code (cryptography)}}2 KB (194 words) - 14:48, 4 April 2024
- 178 bytes (28 words) - 21:58, 5 June 2009
- 127 bytes (17 words) - 01:10, 27 November 2008
- {{main|Cryptography}} ...et key" is slightly misleading, as the [[private key]] in [[asymmetric key cryptography]] also must be protected.4 KB (546 words) - 05:48, 8 April 2024
- 35 bytes (4 words) - 04:24, 19 October 2010
- ...the advent of inexpensive computers made widespread access to high quality cryptography possible. The 1990s had the "crypto wars"; intense debates on cryptography policy issues. <ref name="levybook">{{cite book|20 KB (2,946 words) - 05:49, 8 April 2024
- {{main|Cryptography}} ...ic key cryptography.</ref>. The historian David Kahn described public-key cryptography as "the most revolutionary new concept in the field since polyalphabetic su8 KB (1,233 words) - 05:48, 8 April 2024
- ...crypto wars", political controversies and legal cases involving the use of cryptography.129 bytes (16 words) - 01:24, 20 December 2008
- #REDIRECT [[Asymmetric key cryptography]]41 bytes (4 words) - 13:34, 3 October 2008
- 147 bytes (22 words) - 21:51, 5 June 2009
- 364 bytes (54 words) - 22:19, 31 July 2008
- 71 bytes (9 words) - 21:52, 5 June 2009
- 237 bytes (35 words) - 14:55, 25 October 2008
- Political and legal controversy over the use and export of cryptography107 bytes (14 words) - 21:37, 20 May 2010
- {{r|Cryptography}}263 bytes (30 words) - 02:42, 30 November 2008
- Auto-populated based on [[Special:WhatLinksHere/Key (cryptography)]]. Needs checking by a human. {{r|Cryptography}}482 bytes (61 words) - 17:51, 11 January 2010
- 664 bytes (102 words) - 18:31, 13 March 2024
- 149 bytes (23 words) - 02:47, 30 November 2008
- 146 bytes (18 words) - 18:32, 9 August 2008
- Auto-populated based on [[Special:WhatLinksHere/Cryptography controversy]]. Needs checking by a human. {{r|Cryptography}}763 bytes (99 words) - 02:28, 1 April 2024
- 315 bytes (47 words) - 19:24, 9 August 2008
- {{r|Cryptography}}187 bytes (21 words) - 14:54, 25 October 2008
- 269 bytes (23 words) - 00:52, 6 June 2010
- Auto-populated based on [[Special:WhatLinksHere/Symmetric key cryptography]]. Needs checking by a human. {{r|Cryptography}}587 bytes (76 words) - 20:45, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/History of cryptography]]. Needs checking by a human. {{r|Cryptography}}654 bytes (85 words) - 17:13, 11 January 2010
- {{r|Cryptography}} {{r|Symmetric key cryptography}}398 bytes (43 words) - 20:00, 29 July 2010
- 130 bytes (18 words) - 07:43, 3 March 2010
Page text matches
- {{r|Cryptography}} {{r|Avalanche (cryptography)}}640 bytes (81 words) - 04:17, 27 April 2010
- Any of the major texts listed under [[Cryptography/Bibliography | cryptography]] has a substantial section on stream ciphers.138 bytes (18 words) - 21:42, 29 April 2009
- {{r|Asymmetric key cryptography}} {{r|Cryptography controversy}}707 bytes (89 words) - 20:09, 29 July 2010
- {{r|Asymmetric key cryptography}} {{r|Cryptography}}657 bytes (85 words) - 17:19, 11 January 2010
- {{r|Cryptography controversy}} {{r|Cryptography}}973 bytes (125 words) - 14:41, 18 March 2024
- * In {{r|Protocol (cryptography)|cryptography|}}146 bytes (16 words) - 05:57, 2 January 2010
- {{r|Cryptography}} {{r|History of cryptography}}547 bytes (70 words) - 11:35, 11 January 2010
- {{r|cryptography}} {{r|asymmetric key cryptography}} -->259 bytes (33 words) - 18:53, 29 July 2010
- {{r|Asymmetric key cryptography}} {{r|Cryptography}}608 bytes (77 words) - 15:58, 11 January 2010
- {{rpl|Politics of cryptography}} {{rpl|cryptography}}496 bytes (65 words) - 10:09, 13 June 2010
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 18:20, 31 July 2010
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 22:11, 13 June 2010
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 22:45, 21 June 2012
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 22:47, 21 June 2012
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 09:35, 12 January 2011
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 01:35, 22 May 2010
- {{r|Cryptography}} {{r|Key management (cryptography)}}844 bytes (96 words) - 14:48, 4 April 2024
- #REDIRECT [[Cryptography#Codes_versus_ciphers]]47 bytes (5 words) - 21:46, 1 December 2009
- #REDIRECT [[Hash (cryptography)]]33 bytes (3 words) - 06:07, 1 November 2008
- #REDIRECT [[Hash (cryptography)]]33 bytes (3 words) - 06:09, 1 November 2008
- #REDIRECT [[Asymmetric key cryptography]]41 bytes (4 words) - 13:34, 3 October 2008
- #REDIRECT [[Hash_(cryptography)#MD5]]37 bytes (4 words) - 06:38, 19 November 2011
- #REDIRECT [[Asymmetric key cryptography]]41 bytes (4 words) - 14:10, 3 October 2008
- #REDIRECT [[Hash_(cryptography)#Tiger]]39 bytes (4 words) - 06:05, 28 November 2008
- #REDIRECT [[Asymmetric key cryptography]]41 bytes (4 words) - 14:11, 3 October 2008
- #REDIRECT [[Hash_(cryptography)#The_Advanced_Hash_Standard]]60 bytes (7 words) - 06:24, 28 November 2008
- #REDIRECT [[Hash_(cryptography)#SHA]]37 bytes (4 words) - 06:25, 28 November 2008
- #REDIRECT [[Hash_(cryptography)#Skein]]39 bytes (4 words) - 07:25, 29 November 2008
- #REDIRECT [[Politics of cryptography]]38 bytes (4 words) - 20:52, 20 May 2010
- #REDIRECT [[Hash_(cryptography)#Applications]]46 bytes (4 words) - 02:05, 27 November 2008
- #REDIRECT [[Symmetric key cryptography]]40 bytes (4 words) - 05:38, 2 November 2008
- #REDIRECT [[Hash (cryptography)#Skein]]39 bytes (4 words) - 05:44, 12 August 2009
- {{r|Cryptography}} {{r|Symmetric key cryptography}}1 KB (173 words) - 14:49, 4 April 2024
- {{r|Cryptography}} {{r|Code (cryptography)}}219 bytes (24 words) - 14:41, 18 March 2024
- {{r|Cryptography}} {{r|History of cryptography}}724 bytes (100 words) - 14:31, 22 March 2024
- #REDIRECT [[Hash_(cryptography)#SHA-1]]39 bytes (4 words) - 21:09, 26 November 2008
- #REDIRECT [[Hash_(cryptography)#SHA-2]]39 bytes (4 words) - 06:26, 28 November 2008
- {{r|Cryptography}} {{r|Hash (cryptography)}}784 bytes (100 words) - 14:41, 18 March 2024
- In [[cryptography]], the unencrypted message80 bytes (8 words) - 19:07, 28 February 2010
- {{r|Cryptography}} {{r|Snake (animal) oil (cryptography)}}167 bytes (18 words) - 14:21, 8 March 2024
- {{r|Cryptography}} {{r|History of cryptography}}605 bytes (77 words) - 14:41, 18 March 2024
- A method of mixing data, used in cryptography to achieve diffusion.103 bytes (14 words) - 09:24, 26 November 2009
- {{r|Cryptography}} {{r|Protocol (cryptography)}}130 bytes (13 words) - 22:10, 18 April 2012
- {{r|Cryptography}} {{r|Symmetric key cryptography}}398 bytes (43 words) - 20:00, 29 July 2010
- A web site which publishes information on cryptography, freedom, privacy and security.122 bytes (15 words) - 08:44, 6 December 2010
- Methods for attacking the Rivest, Shamir and Adleman public-key cryptography algorithm.124 bytes (14 words) - 06:55, 1 October 2009
- People interested in [[cryptography]] as a tool for privacy, anonymity and social change.125 bytes (16 words) - 03:21, 10 November 2008
- ...or section devoted to block ciphers. See our [[Cryptography/Bibliography | cryptography bibliography]] for additional sources. * ''Applied Cryptography: Protocols, Algorithms, and Source Code in C'' by [[Bruce Schneier]], Wiley2 KB (315 words) - 09:05, 27 September 2009
- *Schneier, Bruce. ''Applied Cryptography''150 bytes (15 words) - 20:53, 11 May 2008
- {{r|Cryptography controversy}} {{r|Snake (animal) oil (cryptography)}}485 bytes (61 words) - 14:21, 8 March 2024
- The long history of the antithetical disciplines [[cryptography]] and [[cryptanalysis]].124 bytes (13 words) - 05:07, 19 October 2010
- Political and legal controversy over the use and export of cryptography107 bytes (14 words) - 21:37, 20 May 2010
- ...itional names for '''A''' and '''B''', the two players, in discussion of [[cryptography]] or [[coding theory]].151 bytes (19 words) - 19:25, 2 December 2008
- A Russian [[Cryptography|cryptographer]] who was the first person prosecuted under the [[DMCA]].132 bytes (16 words) - 21:23, 8 October 2020
- A 19th Century French writer, famous for giving some axioms for [[cryptography]].117 bytes (15 words) - 21:14, 22 May 2010
- {{r|Cryptography controversy}} {{r|Cryptography}}523 bytes (65 words) - 20:16, 11 January 2010
- {{r|Cryptography}} {{r|History of cryptography}}718 bytes (88 words) - 14:17, 28 March 2010
- ...crypto wars", political controversies and legal cases involving the use of cryptography.129 bytes (16 words) - 01:24, 20 December 2008
- Auto-populated based on [[Special:WhatLinksHere/Key (cryptography)]]. Needs checking by a human. {{r|Cryptography}}482 bytes (61 words) - 17:51, 11 January 2010
- A technique based on [[public key]] cryptography to allow people to "sign" documents using their private keys.146 bytes (20 words) - 01:19, 30 November 2008
- ...Communications Headquarters]] as a cryptologist, codeveloped [[public key cryptography]] while it remained classified197 bytes (22 words) - 17:57, 17 February 2011
- {{r|Asymmetric key cryptography}} {{r|Cryptography}}594 bytes (73 words) - 19:48, 11 January 2010
- {{r|Cryptography}} {{r|Hash (cryptography)}}678 bytes (84 words) - 15:58, 11 January 2010
- [[Cryptography|Cryptographer]] who teaches at [[MIT]], co-inventor of the [[RSA algorithm]182 bytes (22 words) - 20:04, 29 July 2010
- Auto-populated based on [[Special:WhatLinksHere/History of cryptography]]. Needs checking by a human. {{r|Cryptography}}654 bytes (85 words) - 17:13, 11 January 2010
- ...y [[Steven Levy]], about the political and legal conflicts in the US about cryptography, such as the [[Clipper Chip]] controversy and the [[Bernstein v. United Sta ...ode.asp?id=2152 RSA Laboratories' Frequently Asked Questions About Today's Cryptography]3 KB (478 words) - 21:53, 10 May 2011
- {{r|Cryptography}} {{r|Symmetric key cryptography}}597 bytes (79 words) - 11:25, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Cryptography controversy]]. Needs checking by a human. {{r|Cryptography}}763 bytes (99 words) - 02:28, 1 April 2024
- Auto-populated based on [[Special:WhatLinksHere/Symmetric key cryptography]]. Needs checking by a human. {{r|Cryptography}}587 bytes (76 words) - 20:45, 11 January 2010
- {{r|Asymmetric key cryptography}} {{r|Cryptography}}774 bytes (99 words) - 15:36, 11 January 2010
- {{r|Cryptography}} {{r|Hash (cryptography)}}618 bytes (78 words) - 17:06, 11 January 2010
- * [[International Data Encryption Algorithm]], a topic in [[cryptography]]212 bytes (26 words) - 12:51, 31 May 2009
- {{r|Cryptography}} {{r|Cryptography}}932 bytes (116 words) - 11:20, 9 December 2009
- See also our [[Cryptography/Bibliography]].137 bytes (18 words) - 04:42, 19 October 2010
- {{r|Cryptography}} {{r|Key (cryptography)}}828 bytes (106 words) - 14:41, 18 March 2024
- {{r|key (cryptography)}}102 bytes (14 words) - 12:50, 13 December 2008
- {{r|Quantum cryptography}} {{r|Code (cryptography)}}2 KB (194 words) - 14:48, 4 April 2024
- Lars Knudsen is a [[Cryptography|cryptographer]] who taught for some years at [[University of Bergen]] and n238 bytes (38 words) - 21:22, 8 October 2020
- {{r|Snake oil (cryptography)}}83 bytes (11 words) - 18:03, 9 March 2024
- The primary high-security [[cryptography|cryptographic]] [[communications security]] machine of [[Nazi Germany]]. Un321 bytes (39 words) - 10:20, 14 June 2010
- {{rpl|hash (cryptography)}}118 bytes (14 words) - 05:05, 26 September 2013
- ...the creator of Pretty Good Privacy or '''PGP''', a widely used program for cryptography|encrypting electronic mail. He has a [http://www.philzimmermann.com/EN/back392 bytes (58 words) - 07:34, 18 March 2024
- ...y distribution key]], [[Key (cryptography)#public key|public key]], [[Key (cryptography)#key generating key|key generating key]]) ...must be kept secret. A subset of keys that must be kept secret are [[Key (cryptography)#private key|private keys,]] which imply the existence of an associated pub4 KB (564 words) - 23:12, 4 February 2010
- {{main|Cryptography}} ...et key" is slightly misleading, as the [[private key]] in [[asymmetric key cryptography]] also must be protected.4 KB (546 words) - 05:48, 8 April 2024
- {{r|Cryptography}}216 bytes (24 words) - 03:15, 17 February 2010
- {{r|Cryptography}}263 bytes (30 words) - 02:42, 30 November 2008
- {{r|Cryptography}}227 bytes (26 words) - 12:43, 8 November 2008
- {{r|Cryptography}}187 bytes (21 words) - 14:54, 25 October 2008
- {{r|cryptography}}211 bytes (27 words) - 00:43, 30 November 2008
- {{r|cryptography}}178 bytes (19 words) - 00:06, 24 May 2008
- {{r|Hash (cryptography)}}200 bytes (23 words) - 20:13, 11 September 2009
- {{r|Hash (cryptography)}}141 bytes (15 words) - 19:39, 3 January 2009
- {{r|Cryptography}}245 bytes (29 words) - 09:38, 18 June 2009
- {{r|Cryptography}}404 bytes (52 words) - 21:37, 27 November 2010
- ...e intended to be secure except in special circumstances; they use strong [[cryptography]] intended to be unbreakable by anyone without the key. Typically, two valu ...art of the controversies over cryptography in the 1990s; see [[politics of cryptography]]. Among the critics, a common term for escrowed encryption is '''GAK''' fo2 KB (334 words) - 05:49, 8 April 2024
- {{r|Cryptography}}356 bytes (42 words) - 10:42, 3 September 2008
- '''Secure Sockets Layer (SSL)''' is an [[cryptography#two-way encryption|encrypted]] end-to-end [[protocol (computer)| protocol]] | title = Applied Cryptography1 KB (210 words) - 05:49, 8 April 2024
- ...t who was on the cypherpunks mailing list and moderates its successor, the cryptography list.497 bytes (81 words) - 05:48, 8 April 2024
- {{r|cryptography}}141 bytes (16 words) - 06:04, 31 March 2009
- ...and Bob]], and sometimes the other characters, are used to name roles in [[cryptography]].460 bytes (66 words) - 12:39, 30 November 2009