Search results
Jump to navigation
Jump to search
Page title matches
- The term '''cryptography''' comes from [[Greek language|Greek]] κρυπτός ''kryptós'' "hidden, ...pread of computers and electronic communication systems in recent decades, cryptography has become much more broadly important.52 KB (8,332 words) - 05:49, 8 April 2024
- 30 bytes (3 words) - 01:50, 12 February 2009
- 250 bytes (30 words) - 03:05, 21 May 2010
- 49 bytes (6 words) - 21:49, 5 June 2009
- ...y [[Steven Levy]], about the political and legal conflicts in the US about cryptography, such as the [[Clipper Chip]] controversy and the [[Bernstein v. United Sta ...ode.asp?id=2152 RSA Laboratories' Frequently Asked Questions About Today's Cryptography]3 KB (478 words) - 21:53, 10 May 2011
- #REDIRECT [[Cryptography#Codes_versus_ciphers]]47 bytes (5 words) - 21:46, 1 December 2009
- ...y distribution key]], [[Key (cryptography)#public key|public key]], [[Key (cryptography)#key generating key|key generating key]]) ...must be kept secret. A subset of keys that must be kept secret are [[Key (cryptography)#private key|private keys,]] which imply the existence of an associated pub4 KB (564 words) - 23:12, 4 February 2010
- #REDIRECT [[Politics of cryptography]]38 bytes (4 words) - 20:52, 20 May 2010
- {{main|Cryptography}} In cryptography, a '''hash''' or '''message digest''' is a fixed-size string calculated fro16 KB (2,641 words) - 15:51, 8 April 2024
- 36 bytes (4 words) - 21:55, 5 June 2009
- 178 bytes (28 words) - 21:58, 5 June 2009
- 127 bytes (17 words) - 01:10, 27 November 2008
- {{main|Cryptography}} ...et key" is slightly misleading, as the [[private key]] in [[asymmetric key cryptography]] also must be protected.4 KB (546 words) - 05:48, 8 April 2024
- 35 bytes (4 words) - 04:24, 19 October 2010
- ...the advent of inexpensive computers made widespread access to high quality cryptography possible. The 1990s had the "crypto wars"; intense debates on cryptography policy issues. <ref name="levybook">{{cite book|20 KB (2,946 words) - 05:49, 8 April 2024
- {{main|Cryptography}} ...ic key cryptography.</ref>. The historian David Kahn described public-key cryptography as "the most revolutionary new concept in the field since polyalphabetic su8 KB (1,233 words) - 05:48, 8 April 2024
- ...crypto wars", political controversies and legal cases involving the use of cryptography.129 bytes (16 words) - 01:24, 20 December 2008
- #REDIRECT [[Asymmetric key cryptography]]41 bytes (4 words) - 13:34, 3 October 2008
- 147 bytes (22 words) - 21:51, 5 June 2009
- 364 bytes (54 words) - 22:19, 31 July 2008
Page text matches
- {{r|Cryptography}} {{r|Avalanche (cryptography)}}640 bytes (81 words) - 04:17, 27 April 2010
- Any of the major texts listed under [[Cryptography/Bibliography | cryptography]] has a substantial section on stream ciphers.138 bytes (18 words) - 21:42, 29 April 2009
- {{r|Asymmetric key cryptography}} {{r|Cryptography controversy}}707 bytes (89 words) - 20:09, 29 July 2010
- {{r|Asymmetric key cryptography}} {{r|Cryptography}}657 bytes (85 words) - 17:19, 11 January 2010
- {{r|Cryptography controversy}} {{r|Cryptography}}973 bytes (125 words) - 14:41, 18 March 2024
- * In {{r|Protocol (cryptography)|cryptography|}}146 bytes (16 words) - 05:57, 2 January 2010
- {{r|Cryptography}} {{r|History of cryptography}}547 bytes (70 words) - 11:35, 11 January 2010
- {{r|cryptography}} {{r|asymmetric key cryptography}} -->259 bytes (33 words) - 18:53, 29 July 2010
- {{r|Asymmetric key cryptography}} {{r|Cryptography}}608 bytes (77 words) - 15:58, 11 January 2010
- {{rpl|Politics of cryptography}} {{rpl|cryptography}}496 bytes (65 words) - 10:09, 13 June 2010
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 18:20, 31 July 2010
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 22:11, 13 June 2010
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 22:45, 21 June 2012
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 22:47, 21 June 2012
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 09:35, 12 January 2011
- #REDIRECT [[Cryptography]]26 bytes (2 words) - 01:35, 22 May 2010
- {{r|Cryptography}} {{r|Key management (cryptography)}}844 bytes (96 words) - 14:48, 4 April 2024
- #REDIRECT [[Hash (cryptography)]]33 bytes (3 words) - 06:07, 1 November 2008
- #REDIRECT [[Cryptography#Codes_versus_ciphers]]47 bytes (5 words) - 21:46, 1 December 2009
- #REDIRECT [[Hash (cryptography)]]33 bytes (3 words) - 06:09, 1 November 2008