Index of cryptography articles: Difference between revisions

Content deleted Content added
No edit summary
Tags: Reverted Visual edit Mobile edit Mobile web edit
rm redlinks and nonlinks
 
(31 intermediate revisions by 17 users not shown)
Line 1:
{{shortShort description|Wikipedia indexnone}}
Articles related to cryptography include:
 
{{Compact ToC|side=yes|num=yes|seealso=yes|nobreak=yes}}
 
==A==
Line 52 ⟶ 50:
[[Asiacrypt]] [[Talk:Asiacrypt| ]] •
[[Atbash]] [[Talk:Atbash| ]] •
[[Attribute-based encryption]] [[Talk:Attribute-based encryption| ]] •
[[Attack model]] [[Talk:Attack model| ]] •
[[Auguste Kerckhoffs]] [[Talk:Auguste Kerckhoffs| ]] •
Line 93 ⟶ 92:
[[Blaise de Vigenère]] [[Talk:Blaise de Vigenère| ]] •
[[Bletchley Park]] [[Talk:Bletchley Park| ]] •
Blind credential [[Talk:Blind credential| ]] •
[[Blinding (cryptography)]] [[Talk:Blinding (cryptography)| ]] •
[[Blind signature]] [[Talk:Blind signature| ]] •
Line 202 ⟶ 200:
[[Confidentiality]] [[Talk:Confidentiality| ]] •
[[Confusion and diffusion]] [[Talk:Confusion and diffusion| ]] •
[[Content-scrambling systemScramble System]] [[Talk:Content-scrambling systemScramble System| ]] •
[[Controlled Cryptographic Item]] [[Talk:Controlled Cryptographic Item| ]] •
[[Corkscrew (program)]] [[Talk:Corkscrew (program)| ]] •
Line 214 ⟶ 212:
[[CRHF]] [[Talk:CRHF| ]] •
[[Crib (cryptanalysis)]] [[Talk:Crib (cryptanalysis)| ]] •
[[CrossCrypt]] [[Talk:CrossCrypt| ]] •
[[Crowds (anonymity network)]] [[Talk:Crowds (anonymity network) | ]] •
[[Crypt (C)]] [[Talk:Crypt (C)| ]] •
Line 255 ⟶ 252:
[[Cryptonomicon]] [[Talk:Cryptonomicon| ]] •
[[CrypTool]] [[Talk:CrypTool| ]] •
[[Crypto phone]] [[Talk:Crypto phone| ]] •
[[Crypto-society]] [[Talk:Crypto-society| ]] •
[[Cryptosystem]] [[Talk:Cryptosystem| ]] •
Line 333 ⟶ 329:
[[Dragon (cipher)]] [[Talk:Dragon (cipher)| ]] •
[[DRYAD]] [[Talk:DRYAD| ]] •
[[Dual_EC_DRBG]] [[Talk:Dual EC DRBG| ]]
 
==E==
Line 518 ⟶ 514:
[[Indifferent chosen-ciphertext attack]] [[Talk:Indifferent chosen-ciphertext attack| ]] •
[[Indistinguishability obfuscation]] [[Talk:Indistinguishability obfuscation| ]] •
[[Indocrypt]] [[Talk:Indocrypt| ]] •
[[Information leakage]] [[Talk:Information leakage| ]] •
[[Information Security Group]] [[Talk:Information Security Group| ]] •
Line 543 ⟶ 538:
 
==J==
[[Jacques Stern (cryptographer)]] [[Talk:Jacques Stern| ]] •
[[JADE (cypher machine)]] [[Talk:JADE (cypher machine)| ]] •
[[James Gillogly]] [[Talk:James Gillogly| ]] •
Line 615 ⟶ 610:
[[Known-key distinguishing attack]] [[Talk:Known-key distinguishing attack| ]] •
[[Known-plaintext attack]] [[Talk:Known-plaintext attack| ]] •
[[KnownSafe]] [[Talk:KnownSafe| ]] •
[[KOI-18]] [[Talk:KOI-18| ]] •
[[KOV-14]] [[Talk:KOV-14| ]] •
Line 626 ⟶ 620:
[[KW-37]] [[Talk:KW-37| ]] •
[[KY-3]] [[Talk:KY-3| ]] •
[[KY-57]] [[Talk:KY-57| ]] •
[[KY-58]] [[Talk:KY-58| ]] •
[[KY-68]] [[Talk:KY-68| ]] •
Line 647 ⟶ 640:
[[LEVIATHAN (cipher)]] [[Talk:LEVIATHAN (cipher)| ]] •
[[LEX (cipher)]] [[Talk:LEX (cipher)| ]] •
[[Libelle (cipher)]] [[Talk:Libelle (cipher)| ]] •
[[Linear cryptanalysis]] [[Talk:Linear cryptanalysis| ]] •
[[Linear-feedback shift register]] [[Talk:Linear feedback shift register| ]] •
Line 655 ⟶ 647:
[[List of cryptographic file systems]] [[Talk:List of cryptographic file systems| ]] •
[[List of cryptographic key types]] [[Talk:List of cryptographic key types| ]] •
[[List of cryptology conferences]] [[Talk:List of cryptology conferences| ]] •
[[List of telecommunications encryption terms]] [[Talk:List of telecommunications encryption terms| ]] • [[List of people associated with Bletchley Park]] •
[[Talk:List of people associated with Bletchley Park| ]] [[List of SFTP clients]] [[Talk:List of SFTP clients| ]] •
Line 762 ⟶ 753:
[[NSA cryptography]] [[Talk:NSA cryptography| ]] •
[[NSA encryption systems]] [[Talk:NSA encryption systems| ]] •
NSA in fiction [[Talk:NSA in fiction| ]] •
[[NSAKEY]] [[Talk:NSAKEY| ]] •
[[NSA Suite A Cryptography]] [[Talk:NSA Suite A Cryptography| ]] •
Line 804 ⟶ 794:
==P==
[[Padding (cryptography)]] [[Talk:Padding (cryptography)| ]] •
[[Padding oracle attack]] [[Talk:Padding oracle attack| ]]
[[Paillier cryptosystem]] [[Talk:Paillier cryptosystem| ]] •
[[Pairing-based cryptography]] [[Talk:Pairing-based cryptography| ]] •
[[Panama (cryptography)]] [[Talk:Panama (cryptography)| ]]
[[Partitioning cryptanalysis]] [[Talk:Partitioning cryptanalysis| ]] •
[[Passive attack]] [[Talk:Passive attack| ]]
[[Passphrase]] [[Talk:Passphrase| ]]
[[Password]] [[Talk:Password| ]]
[[Password-authenticated key agreement]] [[Talk:Password-authenticated key agreement| ]]
[[Password cracking]] [[Talk:Password cracking| ]]
[[Password Hashing Competition]] [[Talk:Password Hashing Competition| ]]
[[Paul Carl Kocher|Paul Kocher]] [[Talk:Paul Kocher| ]] •
[[Paulo Pancatuccio]] [[Talk:Paulo Pancatuccio| ]]
[[Paulo S. L. M. Barreto]] [[Talk:Paulo S. L. M. Barreto| ]] •
[[Paul van Oorschot]] [[Talk:Paul van Oorschot| ]] •
Line 822 ⟶ 812:
[[PC Bruno]] [[Talk:PC Bruno| ]] •
[[Pepper (cryptography)]] [[Talk:Pepper (cryptography)| ]] •
[[Perfect forward secrecy]] [[Talk:Perfect forward secrecy| ]]
[[Perforated sheets]] [[Talk:Perforated sheets| ]]
[[Permutation cipher]] [[Talk:Permutation cipher| ]] •
[[Peter Gutmann (computer scientist)]] [[Talk:Peter Gutmann (computer scientist)| ]]
[[Peter Junger]] [[Talk:Peter Junger| ]] •
[[Peter Twinn]] [[Talk:Peter Twinn| ]] •
Line 833 ⟶ 823:
[[Phelix]] [[Talk:Phelix| ]] •
[[Phil Zimmermann]] [[Talk:Phil Zimmermann| ]] •
[[Photuris (protocol)]] [[Talk:Photuris (protocol)| ]]
[[Physical security]] [[Talk:Physical security| ]]
[[Physical unclonable function]] [[Talk:Physical unclonable function| ]]
[[Pig Latin]] [[Talk:Pig Latin| ]] •
[[Pigpen cipher]] [[Talk:Pigpen cipher| ]] •
[[Pike (cipher)]] [[Talk:Pike (cipher)| ]] •
[[Piling-up lemma]] [[Talk:Piling-up lemma| ]]
[[Pinwheel (cryptography)]] [[Talk:Pinwheel (cryptography)| ]]
[[Piotr Smoleński]] [[Talk:Piotr Smoleński| ]] •
[[Pirate decryption]] [[Talk:Pirate decryption| ]]
[[PKC (conference)]] [[Talk:PKC (conference)| ]] •
[[PKCS]] [[Talk:PKCS| ]]
[[PKCS 11]] [[Talk:PKCS 11| ]]
[[PKCS 12]] [[Talk:PKCS 12| ]]
[[PKIX]] [[Talk:PKIX| ]] •
[[Plaintext]] [[Talk:Plaintext| ]]
[[Plaintext-aware encryption]] [[Talk:Plaintext-aware encryption| ]]
[[Playfair cipher]] [[Talk:Playfair cipher| ]] •
[[Plugboard]] [[Talk:Plugboard| ]]
[[PMAC (cryptography)]] [[Talk:PMAC (cryptography)| ]]
[[Poem code]] [[Talk:Poem code| ]]
[[Pohlig–Hellman algorithm]] [[Talk:Pohlig–Hellman algorithm| ]] •
[[Point-to-Point Tunneling Protocol]] [[Talk:Point-to-Point Tunneling Protocol| ]]
[[Pointcheval–Stern signature algorithm]] [[Talk:Pointcheval–Stern signature algorithm| ]] •
[[Poly1305]] [[Talk:Poly1305| ]] •
[[Polyalphabetic cipher]] [[Talk:Polyalphabetic cipher| ]]
[[Polybius square]] [[Talk:Polybius square| ]] •
Portex[[Post-quantum cryptography]] [[Talk:PortexPost-quantum cryptography| ]] •
[[Post-quantumQuantum cryptographyCryptography Standardization]] [[Talk:Post-quantumQuantum Cryptography cryptographyStandardization| ]] •
[[CrossCryptPower analysis]] [[Talk:CrossCryptPower analysis| ]] •
Post-Quantum Cryptography Standardization [[Talk:Post-Quantum Cryptography Standardization| ]] •
Power[[Preimage analysisattack]] [[Talk:PowerPreimage analysisattack| ]] •
Preimage[[Pre-shared attackkey]] [[Talk:PreimagePre-shared attackkey| ]] •
Pre-shared[[Pretty keyGood Privacy]] [[Talk:Pre-sharedPretty Good keyPrivacy| ]] •
Pretty[[Printer Good Privacysteganography]] [[Talk:Pretty GoodPrinter Privacysteganography| ]] •
[[Privacy-enhanced Electronic Mail]] [[Talk:Privacy-enhanced Electronic Mail| ]] •
Printer steganography [[Talk:Printer steganography| ]] •
[[Private Communications Technology]] [[Talk:Private Communications Technology| ]] •
Privacy-enhanced Electronic Mail [[Talk:Privacy-enhanced Electronic Mail| ]] •
[[Private Communicationsinformation Technologyretrieval]] [[Talk:Private Communicationsinformation Technologyretrieval| ]] •
Private[[Probabilistic information retrievalencryption]] [[Talk:Private informationProbabilistic retrievalencryption| ]] •
Probabilistic[[Product encryptioncipher]] [[Talk:ProbabilisticProduct encryptioncipher| ]] •
Product[[Proof-of-work ciphersystem]] [[Talk:ProductProof-of-work ciphersystem| ]] •
[[Protected Extensible Authentication Protocol]] [[Talk:Protected Extensible Authentication Protocol| ]] •
Proof-of-work system [[Talk:Proof-of-work system| ]] •
[[CryptoProvable phonesecurity]] [[Talk:CryptoProvable phonesecurity| ]] •
Protected Extensible Authentication Protocol [[Talk:Protected Extensible Authentication Protocol| ]] •
[[Provably secure cryptographic hash function]] [[Talk:Provably secure cryptographic hash function| ]] •
Provable security [[Talk:Provable security| ]] •
[[Proxy re-encryption]] [[Talk:Proxy re-encryption| ]] •
Provably secure cryptographic hash function [[Talk:Provably secure cryptographic hash function| ]] •
Proxy re[[Pseudo-encryptionHadamard transform]] [[Talk:Proxy rePseudo-encryptionHadamard transform| ]] •
Pseudo-Hadamard transform[[Pseudonymity]] [[Talk:Pseudo-Hadamard transformPseudonymity| ]] •
Pseudonymity[[Pseudorandom function]] [[Talk:PseudonymityPseudorandom function| ]] •
[[Pseudorandom functionnumber generator]] [[Talk:Pseudorandom functionnumber generator| ]] •
[[Pseudorandom number generatorpermutation]] [[Talk:Pseudorandom number generatorpermutation| ]] •
Pseudorandom[[Public permutationkey certificate]] [[Talk:PseudorandomPublic key permutationcertificate| ]] •
[[Public -key certificatecryptography]] [[Talk:Public -key certificatecryptography| ]] •
[[Public- key cryptographyfingerprint]] [[Talk:Public- key cryptographyfingerprint| ]] •
[[Public key fingerprintinfrastructure]] [[Talk:Public key fingerprintinfrastructure| ]] •
Public key infrastructure[[PURPLE]] [[Talk:Public key infrastructurePURPLE| ]] •
PURPLE[[PuTTY]] [[Talk:PURPLEPuTTY| ]] •
PuTTY[[Py (cipher)]] [[Talk:PuTTYPy (cipher)| ]]
Py (cipher) [[Talk:Py (cipher)| ]]
 
==Q==
Line 905 ⟶ 894:
[[Rabbit (cipher)]] [[Talk:Rabbit (cipher)| ]] •
[[Rabin cryptosystem]] [[Talk:Rabin cryptosystem| ]] •
[[Rabin–WilliamsRabin encryptionsignature]] [[Talk:Rabin–WilliamsRabin encryptionsignature| ]] •
[[RadioGatún]] [[Talk:RadioGatún| ]] •
[[Rail fence cipher]] [[Talk:Rail fence cipher| ]] •
Line 938 ⟶ 927:
[[Rip van Winkle cipher]] [[Talk:Rip van Winkle cipher| ]] •
[[Robert Morris (cryptographer)]] [[Talk:Robert Morris (cryptographer)| ]] •
Robot certificate authority [[Talk:Robot certificate authority| ]] •
[[Rockex]] [[Talk:Rockex| ]] •
[[Rolf Noskwith]] [[Talk:Rolf Noskwith| ]] •
Line 1,014 ⟶ 1,002:
==S==
[[S-1 block cipher]] [[Talk:S-1| ]] •
[[Secure and Fast Encryption Routine|SAFER]] [[Talk:SAFER| ]] •
[[Salsa20]] [[Talk:Salsa20| ]] •
[[Salt (cryptography)]] [[Talk:Salt (cryptography)| ]] •
Line 1,159 ⟶ 1,147:
[[Tcpcrypt]] [[Talk:Tcpcrypt| ]] •
[[Television encryption]] [[Talk:Television encryption| ]] •
[[Tempest (codename)|TEMPEST]] [[Talk:TEMPEST| ]] •
[[Template:Cryptographic software]] [[Talk:Cryptographic software| ]] •
[[Temporal Key Integrity Protocol]] [[Talk:Temporal Key Integrity Protocol| ]] •
Line 1,214 ⟶ 1,202:
==U==
[[UES (cipher)]] [[Talk:UES (cipher)| ]] •
[[Ultra (cryptography)]] [[Talk:Ultra (cryptography)| ]] •
[[UMAC (cryptography)|UMAC]] [[Talk:UMAC| ]] •
[[Unbalanced Oil and Vinegar]] [[Talk:Unbalanced Oil and Vinegar| ]] •
[[Undeniable signature]] [[Talk:Undeniable signature| ]] •
Line 1,294 ⟶ 1,282:
* [[Books on cryptography]] – an annotated list of suggested readings.
* [[List of cryptographers]] – an annotated list of cryptographers.
* [[List of important publications in computer science#Cryptography|Important publications in cryptography]] – some cryptography papers in computer science.
* [[Wikipedia:WikiProject Cryptography|WikiProject Cryptography]] – discussion and resources for editing cryptography articles.