Tags
- A
- Adiantum
- Adi Shamir
- Advanced encryption standard
- Adversary
- Affine transformation
- Akelarre
- Algorithm
- Algorithm design
- Alphabet
- American National Standards Institute
- An
- Anubis
- Aria
- ASCON
- Attack
- Authenticated encryption
- Authentication
- Authentication protocol
- Automated teller machine
- Avalanche effect
- Bank
- Bassomatic
- Baton
- Bijection
- Birthday attack
- Bitcoin
- Blake
- Block
- Block cipher mode of operation
- Block size
- Blowfish
- Bruce Schneier
- Brute-force attack
- Camellia
- CAST-128
- CBC-MAC
- CCM mode
- Chiasmus
- Chi-squared test
- Chosen-plaintext attack
- Cipher
- Ciphertext
- Ciphertext indistinguishability
- Circular shift
- CiteSeerX
- Claude Shannon
- CLEFIA
- Code
- Computer memory
- Computer security
- Confidentiality
- Confusion
- Crab
- Cryptanalysis
- Cryptocurrency
- Cryptographically secure pseudorandom number generator
- Cryptographic hash function
- Cryptographic primitive
- Cryptographic protocol
- Cryptography
- Crypton
- Cryptosystem
- CSRC
- Daniel J. Bernstein
- Data Encryption Standard
- Data flow diagram
- Data in use
- Data security
- Deal
- DES-X
- Deterministic algorithm
- DFC
- Dhole
- Differential cryptanalysis
- Differential fault analysis
- Differential-linear attack
- Diffusion
- Digital signature
- Disk encryption theory
- DOI
- Donald Trump
- E²
- ECB
- EFF DES cracker
- Electronic Frontier Foundation
- Electronic hardware
- Eli Biham
- Encryption
- Encryption at rest
- End-to-end encryption
- ETH Zurich
- EuroCrypt
- Exclusive or
- FAQ
- FEAL
- Federal Information Processing Standards
- Federal Office for Information Security
- Feistel cipher
- Formal language
- Format-preserving encryption
- Frog
- Galois/Counter Mode
- Gate count
- Gettin' Ready
- Golden ratio
- GOST
- Grand Cru
- Group
- Hardware security module
- Hash function
- IBM
- Ice
- Information privacy
- Information-theoretic security
- Initialization vector
- Integral cryptanalysis
- Intellectual Property
- International Data Encryption Algorithm
- International Standard Book Number
- Inverse function
- Joan Daemen
- Kademlia
- Kalyna
- Kasumi
- Kendall rank correlation coefficient
- Key derivation function
- Key exchange
- Keygen
- Key generation
- Key generator
- Key schedule
- Key size
- Keystream
- Key stretching
- Khufu and Khafre
- Knot Twine
- Known-key distinguishing attack
- Kuznyechik
- Lea
- Linear cryptanalysis
- Loki
- Lookup table
- Lucifer
- M6
- M8
- MacGuffin
- Magenta
- Mars
- Meet-in-the-middle attack
- Mercy
- Mesh
- Message authentication code
- Mix network
- MMB
- Modular arithmetic
- Moment
- National Institute of Standards and Technology
- NESSIE
- New
- Nimbus
- NIST
- Nonce
- NSA
- Number
- NUSH
- One-way function
- Onion routing
- Oracle attack
- Oracle machine
- Padding
- Padding oracle attack
- Patent
- Payment Card Industry Data Security Standard
- Permutation
- Personal identification number
- Plaintext
- PMAC
- Post-quantum cryptography
- Power analysis
- Prince
- Provable security
- Pseudorandomness
- Pseudorandom noise
- Pseudorandom number generator
- Pseudorandom permutation
- Public domain
- Public-key cryptography
- Q
- Quantum cryptography
- Quantum key distribution
- Randomization
- Random number
- Random number generation
- Ransomware
- RC2
- RC5
- RC6
- REDOC
- Reduction
- Related-key attack
- Robert Heaton
- Ron Rivest
- Row- and column-major order
- Safer
- Salsa20
- Saville
- S-box
- Secure channel
- Security
- Seed
- Semantic security
- Serpent
- Shared secret
- Shark
- Side-channel attack
- Simon
- Skinny Present
- Skipjack
- SM4
- Software
- Sophos
- Speck
- Square
- SSL
- Steganography
- Stream cipher
- Substitution cipher
- SXAL/MBAL
- Symmetric-key algorithm
- Symmetric-key encryption
- The post
- Throughput
- Timing attack
- TLS
- Transposition cipher
- Trapdoor function
- Triple DES
- Trusted timestamping
- Twofish
- UES
- Universal hashing
- V
- Vincent Rijmen
- Wayback Machine
- What
- Why
- Xmx
- XOR
- XOR cipher
- XTEA
- Xuejia Lai
- XXTEA
- Zodiac