Search results

Jump to navigation Jump to search

Page title matches

  • The term '''cryptography''' comes from [[Greek language|Greek]] κρυπτός ''kryptós'' "hidden, ...pread of computers and electronic communication systems in recent decades, cryptography has become much more broadly important.
    52 KB (8,332 words) - 05:49, 8 April 2024
  • 30 bytes (3 words) - 01:50, 12 February 2009
  • 250 bytes (30 words) - 03:05, 21 May 2010
  • 49 bytes (6 words) - 21:49, 5 June 2009
  • ...y [[Steven Levy]], about the political and legal conflicts in the US about cryptography, such as the [[Clipper Chip]] controversy and the [[Bernstein v. United Sta ...ode.asp?id=2152 RSA Laboratories' Frequently Asked Questions About Today's Cryptography]
    3 KB (478 words) - 21:53, 10 May 2011
  • #REDIRECT [[Cryptography#Codes_versus_ciphers]]
    47 bytes (5 words) - 21:46, 1 December 2009
  • ...y distribution key]], [[Key (cryptography)#public key|public key]], [[Key (cryptography)#key generating key|key generating key]]) ...must be kept secret. A subset of keys that must be kept secret are [[Key (cryptography)#private key|private keys,]] which imply the existence of an associated pub
    4 KB (564 words) - 23:12, 4 February 2010
  • #REDIRECT [[Politics of cryptography]]
    38 bytes (4 words) - 20:52, 20 May 2010
  • {{main|Cryptography}} In cryptography, a '''hash''' or '''message digest''' is a fixed-size string calculated fro
    16 KB (2,641 words) - 15:51, 8 April 2024
  • 36 bytes (4 words) - 21:55, 5 June 2009
  • 178 bytes (28 words) - 21:58, 5 June 2009
  • 127 bytes (17 words) - 01:10, 27 November 2008
  • {{main|Cryptography}} ...et key" is slightly misleading, as the [[private key]] in [[asymmetric key cryptography]] also must be protected.
    4 KB (546 words) - 05:48, 8 April 2024
  • 35 bytes (4 words) - 04:24, 19 October 2010
  • ...the advent of inexpensive computers made widespread access to high quality cryptography possible. The 1990s had the "crypto wars"; intense debates on cryptography policy issues. <ref name="levybook">{{cite book|
    20 KB (2,946 words) - 05:49, 8 April 2024
  • {{main|Cryptography}} ...ic key cryptography.</ref>. The historian David Kahn described public-key cryptography as "the most revolutionary new concept in the field since polyalphabetic su
    8 KB (1,233 words) - 05:48, 8 April 2024
  • ...crypto wars", political controversies and legal cases involving the use of cryptography.
    129 bytes (16 words) - 01:24, 20 December 2008
  • #REDIRECT [[Asymmetric key cryptography]]
    41 bytes (4 words) - 13:34, 3 October 2008
  • 147 bytes (22 words) - 21:51, 5 June 2009
  • 364 bytes (54 words) - 22:19, 31 July 2008

Page text matches

  • {{r|Cryptography}} {{r|Avalanche (cryptography)}}
    640 bytes (81 words) - 04:17, 27 April 2010
  • Any of the major texts listed under [[Cryptography/Bibliography | cryptography]] has a substantial section on stream ciphers.
    138 bytes (18 words) - 21:42, 29 April 2009
  • {{r|Asymmetric key cryptography}} {{r|Cryptography controversy}}
    707 bytes (89 words) - 20:09, 29 July 2010
  • {{r|Asymmetric key cryptography}} {{r|Cryptography}}
    657 bytes (85 words) - 17:19, 11 January 2010
  • {{r|Cryptography controversy}} {{r|Cryptography}}
    973 bytes (125 words) - 14:41, 18 March 2024
  • * In {{r|Protocol (cryptography)|cryptography|}}
    146 bytes (16 words) - 05:57, 2 January 2010
  • {{r|Cryptography}} {{r|History of cryptography}}
    547 bytes (70 words) - 11:35, 11 January 2010
  • {{r|cryptography}} {{r|asymmetric key cryptography}} -->
    259 bytes (33 words) - 18:53, 29 July 2010
  • {{r|Asymmetric key cryptography}} {{r|Cryptography}}
    608 bytes (77 words) - 15:58, 11 January 2010
  • {{rpl|Politics of cryptography}} {{rpl|cryptography}}
    496 bytes (65 words) - 10:09, 13 June 2010
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 18:20, 31 July 2010
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 22:11, 13 June 2010
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 22:45, 21 June 2012
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 22:47, 21 June 2012
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 09:35, 12 January 2011
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 01:35, 22 May 2010
  • {{r|Cryptography}} {{r|Key management (cryptography)}}
    844 bytes (96 words) - 14:48, 4 April 2024
  • #REDIRECT [[Hash (cryptography)]]
    33 bytes (3 words) - 06:07, 1 November 2008
  • #REDIRECT [[Cryptography#Codes_versus_ciphers]]
    47 bytes (5 words) - 21:46, 1 December 2009
  • #REDIRECT [[Hash (cryptography)]]
    33 bytes (3 words) - 06:09, 1 November 2008
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)