digplanet beta 1: Athena
Share digplanet:

Applications of cryptography

Classical cryptography

Cryptographers

Cryptographic algorithms

Cryptographic attacks

Cryptographic hardware

Cryptographic primitives

Cryptographic protocols

Cryptographic software

Cryptography contests

Cryptography law

Cryptography lists and comparisons

Cryptography organizations

Cryptography publications

Cryptography standards

Cryptologic education

Disk encryption

History of cryptography

Key management

Kleptography

Post-quantum cryptography

Public-key cryptography

Quantum cryptography

Randomness

Steganography

Symmetric-key cryptography

Theory of cryptography

 

Agriculture

Applied sciences

Arts

Belief

Business

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

The main article for this category is Cryptography.

Cryptography is, traditionally, the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.

Portals

Cryptography

    

Sections

Applications of cryptography

Classical cryptography

Cryptographers

Cryptographic algorithms

Cryptographic attacks

Cryptographic hardware

Cryptographic primitives

Cryptographic protocols

Cryptographic software

Cryptography contests

Cryptography law

Cryptography lists and comparisons

Cryptography organizations

Cryptography publications

Cryptography standards

Cryptography stubs

Cryptologic education

Disk encryption

History of cryptography

Key management

Kleptography

Post-quantum cryptography

Public-key cryptography

Quantum cryptography

Randomness

Steganography

Symmetric-key cryptography

Theory of cryptography

  

Pages

3-Subset Meet-in-the-Middle attack

6th Special Security Communications Team (United States)

Accumulator (cryptography)

Anonymous matching

Array controller based encryption

Atlantic City algorithm

BREACH (security exploit)

Backdoor (computing)

Batch cryptography

Bcrypt

Blacker (security)

Blind credential

Blinding (cryptography)

Bus encryption

CRIME

Cipher

Ciphertext

Ciphertext expansion

Civision

Client-side encryption

Code (cryptography)

Code word

Codebook

Codress message

Cohen's cryptosystem

Communications security

Comparison of cryptographic hash functions

Completeness (cryptography)

Computer security

Concrete security

Conjugate coding

Convergent encryption

Correlation immunity

Cover (telecommunications)

Cover-coding

Critical Security Parameter

CrySyS Lab

CrypTool

Cryptanalysis

CryptoParty

Cryptochannel

Cryptographic High Value Product

Cryptographic Module Testing Laboratory

Cryptographic Service Provider

Cryptographic engineering

Cryptographic hash function

Cryptographic nonce

Cryptography

Cryptosystem

Cryptovirology

Cypherpunks (book)

Data at Rest

Data in Use

Database encryption

Decentralized Autonomous Organization

Decipherment

Deniable encryption

Designated verifier signature

Digital credential

Digital signature forgery

Dining cryptographers problem

Diplomatic bag

Direct Anonymous Attestation

Discrete logarithm

EFF DES cracker

Electronic signature

Encrypted function

Encryption

End-to-end encryption

Enigma machine

Entropic security

Ephemeral key

Export of cryptography from the United States

Factorization of polynomials over finite fields

Feedback with Carry Shift Registers

Floradora

Forking lemma

Format-transforming encryption

Forward anonymity

Frederick Edward Hulme

Friend-to-friend

Fully undetectable

Functional encryption

Generic group model

Geometric cryptography

Group key

HTTP Strict Transport Security

Hardware random number generator

HashClash

Honey Encryption

Hybrid cryptosystem

Hyper-encryption

Index of coincidence

Information leakage

Jötunvillur

KY-7

Kerckhoffs's principle

Key (cryptography)

Key Ceremony

Key number method

Keyring (cryptography)

Kiss (cryptanalysis)

Knapsack cryptosystems

Knapsack problem

Lattice-based cryptography

Learning with errors

Length extension attack

Letter frequency

MDS matrix

Malleability (cryptography)

Master/Session

Mean Shortest Distance

Mental poker

Mimic function

Mix network

Mulabhadra

Multiple encryption

Musical cryptogram

NIPRNet

Naor-Reingold Pseudorandom Function

Neil Leslie Webster

Noisy-storage model

Non-commutative cryptography

Normal basis

Nothing up my sleeve number

Off-line Root CA

One-time pad

One-way function

Outline of cryptography

PGP word list

PKIoverheid

Padding (cryptography)

Passphrase

Password Authenticated Key Exchange by Juggling

Password psychology

Password strength

Password-based cryptography

Pizzino

Plaintext

Polygraphic substitution

Post-quantum cryptography

PrivateCore

Privilege Management Infrastructure

Proof-of-stake

Proof-of-work system

Protocol composition logic

Provable security

Proxy re-encryption

Pseudorandom ensemble

Pseudorandom generator

Quantum Byzantine agreement

Quantum cryptography

Quantum key distribution

Randomness

Red/black concept

S/MIME

SFINKS

SIGINT Activity Designator

SIPRNet

SPKAC

Sacher hexachord

Salt (cryptography)

Scrambler

Secure Hash Algorithm

Secure Hash Standard

Secure cryptoprocessor

Secure voice

Security association

Security engineering

Security parameter

Security through obscurity

Self-shrinking generator

Server gated cryptography

Server-based signatures

Signals intelligence

Signatures with efficient protocols

Snake oil (cryptography)

SnapTag

Software token

Standard model (cryptography)

Statistically close

Strong cryptography

Strong secrecy

Subliminal channel

Superincreasing sequence

Symmetric Boolean function

TRESOR

Tamper resistance

Texas Instruments signing key controversy

Thawte Crypto Challenge

Tokenization (data security)

Trace Zero Cryptography

Transmission security

Trapdoor function

Trusted Computing

Trusted third party

Two-way security

Undeniable signature

Unicity distance

Unknown key-share attack

Variably Modified Permutation Composition

Verifiable secret sharing

Visual cryptography

Vocoder

Voice inversion

Vormetric

WYSIWYS

X.1035

YAK (cryptography)

Yao's test


Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Category:Cryptography — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
48757 videos foundNext > 

Lecture 1: Introduction to Cryptography by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com. The book chapter "Introduction" for this video is also available ...

Cryptography 101 - The Basics

In this video we cover basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto.

Theory and Practice of Cryptography

Google Tech Talks November, 28 2007 Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and...

Public Key Cryptography: Diffie-Hellman Key Exchange

Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete log...

CISSP Training - Cryptography

PalaestraTraining.com This video on Cryptography (Part 1 of 3) is part of our CISSP certification Training Series. (ISC)2 CISSP certification is one of the t...

James Lyne: Cryptography and the power of randomness

James Lyne is the Director of Technology Strategy at Sophos, a research firm concerned with cyber security. He works with law enforcement and other defense o...

Cryptography: Unbroken Codes

While cryptography has progressed by leaps and bounds, some codes still haven't been broken. Tune in to learn more about some of history's strangest unbroken...

A Short History of Cryptography - A Brief History of Cryptography

A Short History of Cryptography - A Brief History of Cryptography.

Public Key Cryptography - Computerphile

Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography note...

Information Security—Before & After Public-Key Cryptography

[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20t...

48757 videos foundNext > 

1554 news items

 
The Australian
Mon, 18 Aug 2014 07:07:41 -0700

“The problem is cryptography, in order to be secure, requires heavy computer-assisted calculations to make it efficient and is very impractical for humans to do,'' Queensland University of Technology researcher Xavier Boyen said. “We have a lot of new ...
 
physicsworld.com
Tue, 05 Aug 2014 07:18:41 -0700

The National Institute of Standards and Technology (NIST) lacks independence and uncritically adhered to the wishes of US electronic eavesdroppers in releasing a weakened random-number generator in 2006. So says a group of mathematicians and ...
 
MIT Technology Review
Sun, 17 Aug 2014 21:01:36 -0700

As we have argued before and have now demonstrated, modern cryptography could enable agencies to find and surgically extract warrant-authorized data about persons of interest like needles in a haystack of encrypted data, while guarding both the secrecy ...
 
Phys.Org
Tue, 05 Aug 2014 05:56:52 -0700

Cryptographers in China have have developed a new type of cryptography that can better resist so-called offline "dictionary attacks", denial of service (DoS) hacks, and cracks involving eavesdroppers. Their approach, reported in the International ...
 
Gizmodo Australia
Fri, 22 Aug 2014 00:08:39 -0700

It sounds like something out of an episode of Spooks: Researchers have discovered a way to use simple touch to decode the cryptography keys that are intended to secure your information. It's as easy as gauging the electric potential coursing through ...
 
MarketWatch
Thu, 28 Aug 2014 14:03:35 -0700

SAN FRANCISCO & HSINCHU, Taiwan, Aug 28, 2014 (BUSINESS WIRE) -- Cryptography Research, the security division of Rambus RMBS, -0.89% today announced that MStar Semiconductor, Inc., a leading semiconductor company for display and digital ...
 
Sky News
Thu, 21 Aug 2014 02:07:39 -0700

Mr Tromer – who demonstrated the technique at a cryptography conference in California this week – says his team has used the method to crack several widely used security standards. Previous research efforts have found that analysing the power ...

Scientific Computing

Scientific Computing
Mon, 25 Aug 2014 01:26:15 -0700

Modern cryptography is not infallible. All encryption types, among which we can find the widely used RSA, can theoretically be broken. If so, how to ensure that our data remains protected? The answer lies in the time and computational effort required ...
Loading

Oops, we seem to be having trouble contacting Twitter

Talk About Cryptography

You can talk about Cryptography with people all over the world in our discussions.

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!