digplanet beta 1: Athena
Share digplanet:

Applications of cryptography

Classical cryptography

Cryptographers

Cryptographic algorithms

Cryptographic attacks

Cryptographic hardware

Cryptographic primitives

Cryptographic protocols

Cryptographic software

Cryptography contests

Cryptography law

Cryptography lists and comparisons

Cryptography organizations

Cryptography publications

Cryptography standards

Cryptologic education

Disk encryption

History of cryptography

Key management

Kleptography

Post-quantum cryptography

Public-key cryptography

Quantum cryptography

Randomness

Steganography

Symmetric-key cryptography

Theory of cryptography

 

Agriculture

Applied sciences

Arts

Belief

Business

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

The main article for this category is Cryptography.

Cryptography is, traditionally, the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.

Portals

Cryptography

    

Sections

Applications of cryptography

Classical cryptography

Cryptographers

Cryptographic algorithms

Cryptographic attacks

Cryptographic hardware

Cryptographic primitives

Cryptographic protocols

Cryptographic software

Cryptography contests

Cryptography law

Cryptography lists and comparisons

Cryptography organizations

Cryptography publications

Cryptography standards

Cryptography stubs

Cryptologic education

Disk encryption

History of cryptography

Key management

Kleptography

Post-quantum cryptography

Public-key cryptography

Quantum cryptography

Randomness

Steganography

Symmetric-key cryptography

Theory of cryptography

  

Pages

3-Subset Meet-in-the-Middle attack

6th Special Security Communications Team (United States)

Accumulator (cryptography)

Anonymous matching

Array controller based encryption

Atlantic City algorithm

BREACH (security exploit)

Backdoor (computing)

Batch cryptography

Bcrypt

Blacker (security)

Blind credential

Blinding (cryptography)

Bus encryption

CRIME

Cipher

Ciphertext

Ciphertext expansion

Civision

Client-side encryption

Code (cryptography)

Code word

Codebook

Codress message

Cohen's cryptosystem

Communications security

Comparison of cryptographic hash functions

Completeness (cryptography)

Computer security

Concrete security

Conjugate coding

Convergent encryption

Correlation immunity

Cover (telecommunications)

Cover-coding

Critical Security Parameter

CrySyS Lab

CrypTool

Cryptanalysis

CryptoParty

Cryptochannel

Cryptographic High Value Product

Cryptographic Module Testing Laboratory

Cryptographic Service Provider

Cryptographic engineering

Cryptographic hash function

Cryptographic nonce

Cryptography

Cryptosystem

Cryptovirology

Cypherpunks (book)

Data at Rest

Data in Use

Database encryption

Decentralized Autonomous Organization

Decipherment

Deniable encryption

Designated verifier signature

Digital credential

Digital signature forgery

Dining cryptographers problem

Diplomatic bag

Direct Anonymous Attestation

Discrete logarithm

EFF DES cracker

Electronic signature

Encrypted function

Encryption

End-to-end encryption

Enigma machine

Entropic security

Ephemeral key

Export of cryptography from the United States

Factorization of polynomials over finite fields

Feedback with Carry Shift Registers

Floradora

Forking lemma

Format-transforming encryption

Forward anonymity

Frederick Edward Hulme

Friend-to-friend

Fully undetectable

Functional encryption

Generic group model

Geometric cryptography

Group key

HTTP Strict Transport Security

Hardware random number generator

HashClash

Honey Encryption

Hybrid cryptosystem

Hyper-encryption

Index of coincidence

Information leakage

Initialization vector

Jötunvillur

KY-7

Kerckhoffs's principle

Key (cryptography)

Key Ceremony

Key number method

Keyring (cryptography)

Kiss (cryptanalysis)

Knapsack cryptosystems

Knapsack problem

Lattice-based cryptography

Learning with errors

Length extension attack

Letter frequency

MDS matrix

Malleability (cryptography)

Master/Session

Mean Shortest Distance

Mental poker

Mimic function

Mix network

Mulabhadra

Multiple encryption

Musical cryptogram

NIPRNet

Naor-Reingold Pseudorandom Function

Neil Leslie Webster

Noisy-storage model

Non-commutative cryptography

Normal basis

Nothing up my sleeve number

Off-line Root CA

One-time pad

One-way function

Outline of cryptography

PGP word list

PKIoverheid

Padding (cryptography)

Passphrase

Password Authenticated Key Exchange by Juggling

Password psychology

Password strength

Password-based cryptography

Pizzino

Plaintext

Polygraphic substitution

Post-quantum cryptography

PrivateCore

Privilege Management Infrastructure

Proof-of-stake

Proof-of-work system

Protocol composition logic

Provable security

Proxy re-encryption

Pseudorandom ensemble

Pseudorandom generator

Quantum Byzantine agreement

Quantum cryptography

Quantum key distribution

Randomness

Red/black concept

S/MIME

SFINKS

SIGINT Activity Designator

SIPRNet

SPKAC

Sacher hexachord

Salt (cryptography)

Scrambler

Secure Hash Algorithm

Secure Hash Standard

Secure cryptoprocessor

Secure voice

Security association

Security engineering

Security parameter

Security through obscurity

Self-shrinking generator

Server gated cryptography

Server-based signatures

Signals intelligence

Signatures with efficient protocols

Snake oil (cryptography)

SnapTag

Software token

Standard model (cryptography)

Statistically close

Strong cryptography

Strong secrecy

Subliminal channel

Superincreasing sequence

Symmetric Boolean function

TRESOR

Tamper resistance

Texas Instruments signing key controversy

Thawte Crypto Challenge

Tokenization (data security)

Trace Zero Cryptography

Transmission security

Trapdoor function

Trusted Computing

Trusted third party

Two-way security

Undeniable signature

Unicity distance

Unknown key-share attack

Variably Modified Permutation Composition

Verifiable secret sharing

Visual cryptography

Vocoder

Voice inversion

Vormetric

WYSIWYS

X.1035

YAK (cryptography)

Yao's test

    

Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Category:Cryptography — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
46819 videos foundNext > 

Lecture 1: Introduction to Cryptography by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com. The book chapter "Introduction" for this video is also available ...

Cryptography 101 - The Basics

In this video we cover basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto.

Theory and Practice of Cryptography

Google Tech Talks November, 28 2007 Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and...

Public Key Cryptography: Diffie-Hellman Key Exchange

Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete log...

CISSP Training - Cryptography

PalaestraTraining.com This video on Cryptography (Part 1 of 3) is part of our CISSP certification Training Series. (ISC)2 CISSP certification is one of the t...

James Lyne: Cryptography and the power of randomness

James Lyne is the Director of Technology Strategy at Sophos, a research firm concerned with cyber security. He works with law enforcement and other defense o...

Public Key Cryptography - Computerphile

Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography note...

Cryptography: Unbroken Codes

While cryptography has progressed by leaps and bounds, some codes still haven't been broken. Tune in to learn more about some of history's strangest unbroken...

Information Security—Before & After Public-Key Cryptography

[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20t...

Public Key Cryptography: RSA Encryption Algorithm

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular expone...

46819 videos foundNext > 

4275 news items

 
The Australian
Mon, 18 Aug 2014 07:07:41 -0700

“The problem is cryptography, in order to be secure, requires heavy computer-assisted calculations to make it efficient and is very impractical for humans to do,'' Queensland University of Technology researcher Xavier Boyen said. “We have a lot of new ...
 
MIT Technology Review
Sun, 17 Aug 2014 21:01:36 -0700

As we have argued before and have now demonstrated, modern cryptography could enable agencies to find and surgically extract warrant-authorized data about persons of interest like needles in a haystack of encrypted data, while guarding both the secrecy ...

Toronto Star

V3.co.uk
Tue, 19 Aug 2014 03:18:45 -0700

BlackBerry has announced the creation of a new business unit designed to focus on some of its most valuable assets, ranging from the Internet of Things (IoT) to cryptography. BlackBerry said the new BlackBerry Technology Solutions (BTS) would comprise ...
 
Phys.Org
Tue, 05 Aug 2014 05:56:52 -0700

Cryptographers in China have have developed a new type of cryptography that can better resist so-called offline "dictionary attacks", denial of service (DoS) hacks, and cracks involving eavesdroppers. Their approach, reported in the International ...
 
physicsworld.com
Tue, 05 Aug 2014 07:18:41 -0700

The National Institute of Standards and Technology (NIST) lacks independence and uncritically adhered to the wishes of US electronic eavesdroppers in releasing a weakened random-number generator in 2006. So says a group of mathematicians and ...
 
Tom's Guide
Tue, 12 Aug 2014 10:23:15 -0700

At the DEF CON 22 hacker conference here last week, security expert Kenneth White presented an update on the Open Crypto Audit Project, an effort by White and cryptographer Matthew Green to examine open-source cryptography software, check it for ...
 
Sackville Tribune Post
Fri, 01 Aug 2014 03:18:45 -0700

Mount Allison University honours computer science and math student Karen Korstanje recently presented her research at the Fourth International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers ...
 
MarketWatch
Wed, 23 Jul 2014 14:00:00 -0700

SAN FRANCISCO & SAN DIEGO, Jul 23, 2014 (BUSINESS WIRE) -- Cryptography Research , the security division of Rambus (NASDAQ:RMBS) , and Entropic (NASDAQ:ENTR) , a world leader in semiconductor solutions for the connected home, today ...
Loading

Oops, we seem to be having trouble contacting Twitter

Talk About Cryptography

You can talk about Cryptography with people all over the world in our discussions.

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!