Cryptography: Trending topics

  
  
  
  

The following are the current most viewed articles on Wikipedia within Wikipedia's Cryptography category. Think of it as a What's Hot list for Cryptography. More info »

This is a beta release and so the figures may be a day or two out of date. We'd love to get your thoughts.

Rank Topic Wikipedia views
1 Cryptography 5,909 Sparkline of topic views for 2 weeks
2 Encryption 3,766 Sparkline of topic views for 2 weeks
3 Enigma machine 2,631 Sparkline of topic views for 2 weeks
4 Digital signature 2,595 Sparkline of topic views for 2 weeks
5 Randomness 2,096 Sparkline of topic views for 2 weeks
6 Vocoder 1,905 Sparkline of topic views for 2 weeks
7 Cryptographic hash function 1,829 Sparkline of topic views for 2 weeks
8 Password strength 1,708 Sparkline of topic views for 2 weeks
9 Cipher 1,695 Sparkline of topic views for 2 weeks
10 Knapsack problem 1,283 Sparkline of topic views for 2 weeks
11 Proof of concept 1,192 Sparkline of topic views for 2 weeks
12 Electronic signature 1,060 Sparkline of topic views for 2 weeks
13 Signals intelligence 1,054 Sparkline of topic views for 2 weeks
14 One-time pad 1,033 Sparkline of topic views for 2 weeks
15 Compromise 1,024 Sparkline of topic views for 2 weeks
16 Salt (cryptography) 866 Sparkline of topic views for 2 weeks
17 Elliptic curve cryptography 734 Sparkline of topic views for 2 weeks
18 Bigram 726 Sparkline of topic views for 2 weeks
19 S/MIME 588 Sparkline of topic views for 2 weeks
20 Quantum cryptography 538 Sparkline of topic views for 2 weeks
21 Key (cryptography) 489 Sparkline of topic views for 2 weeks
22 Boolean function 459 Sparkline of topic views for 2 weeks
23 List of unsolved problems in computer science 454 Sparkline of topic views for 2 weeks
24 Cryptographic nonce 418 Sparkline of topic views for 2 weeks
25 Trusted Computing 405 Sparkline of topic views for 2 weeks
26 Plaintext 394 Sparkline of topic views for 2 weeks
27 Passphrase 391 Sparkline of topic views for 2 weeks
28 Security through obscurity 373 Sparkline of topic views for 2 weeks
29 SIPRNet 354 Sparkline of topic views for 2 weeks
30 Initialization vector 330 Sparkline of topic views for 2 weeks
31 One-way function 312 Sparkline of topic views for 2 weeks
32 Scrambler 309 Sparkline of topic views for 2 weeks
33 Discrete logarithm 308 Sparkline of topic views for 2 weeks
34 Computer insecurity 288 Sparkline of topic views for 2 weeks
35 Clipper chip 286 Sparkline of topic views for 2 weeks
36 Communications security 273 Sparkline of topic views for 2 weeks
37 Ciphertext 270 Sparkline of topic views for 2 weeks
38 Byzantine fault tolerance 255 Sparkline of topic views for 2 weeks
39 Code word 247 Sparkline of topic views for 2 weeks
40 Outline of cryptography 236 Sparkline of topic views for 2 weeks
41 S-box 233 Sparkline of topic views for 2 weeks
42 Avalanche effect 227 Sparkline of topic views for 2 weeks
43 Security engineering 217 Sparkline of topic views for 2 weeks
44 Tamper resistance 215 Sparkline of topic views for 2 weeks
45 Kerckhoffs' principle 214 Sparkline of topic views for 2 weeks
46 Padding (cryptography) 209 Sparkline of topic views for 2 weeks
47 Comparison of cryptographic hash functions 207 Sparkline of topic views for 2 weeks
48 Diplomatic bag 203 Sparkline of topic views for 2 weeks
49 Friend-to-friend 199 Sparkline of topic views for 2 weeks
50 NIPRNet 174 Sparkline of topic views for 2 weeks
51 EFF DES cracker 173 Sparkline of topic views for 2 weeks
52 Code (cryptography) 166 Sparkline of topic views for 2 weeks
53 Block design 165 Sparkline of topic views for 2 weeks
54 Decipherment 163 Sparkline of topic views for 2 weeks
55 Deniable encryption 149 Sparkline of topic views for 2 weeks
56 Perfect forward secrecy 148 Sparkline of topic views for 2 weeks
57 Homomorphic encryption 145 Sparkline of topic views for 2 weeks
58 Nothing up my sleeve number 141 Sparkline of topic views for 2 weeks
59 Codebook 137 Sparkline of topic views for 2 weeks
60 Cryptovirology 131 Sparkline of topic views for 2 weeks
61 Mental poker 118 Sparkline of topic views for 2 weeks
62 Snake oil (cryptography) 110 Sparkline of topic views for 2 weeks
63 Malleability (cryptography) 108 Sparkline of topic views for 2 weeks
64 Index of coincidence 108 Sparkline of topic views for 2 weeks
65 Cryptosystem 108 Sparkline of topic views for 2 weeks
66 Quantum key distribution 107 Sparkline of topic views for 2 weeks
67 Collision resistance 107 Sparkline of topic views for 2 weeks
68 Secure cryptoprocessor 100 Sparkline of topic views for 2 weeks
69 Commitment scheme 94 Sparkline of topic views for 2 weeks
70 Trapdoor function 93 Sparkline of topic views for 2 weeks
71 Blind signature 93 Sparkline of topic views for 2 weeks
72 Pairing 91 Sparkline of topic views for 2 weeks
73 PGP word list 90 Sparkline of topic views for 2 weeks
74 Block size (cryptography) 87 Sparkline of topic views for 2 weeks
75 Texas Instruments signing key controversy 87 Sparkline of topic views for 2 weeks
76 Intermediate certificate authorities 86 Sparkline of topic views for 2 weeks
77 ID-based encryption 84 Sparkline of topic views for 2 weeks
78 Security association 83 Sparkline of topic views for 2 weeks
79 Confusion and diffusion 69 Sparkline of topic views for 2 weeks
80 Lamport signature 62 Sparkline of topic views for 2 weeks
81 Cryptographic Service Provider 57 Sparkline of topic views for 2 weeks
82 Software token 56 Sparkline of topic views for 2 weeks
83 CrypTool 56 Sparkline of topic views for 2 weeks
84 Server gated cryptography 55 Sparkline of topic views for 2 weeks
85 Trusted third party 54 Sparkline of topic views for 2 weeks
86 Visual cryptography 53 Sparkline of topic views for 2 weeks
87 Provable security 49 Sparkline of topic views for 2 weeks
88 Multiple encryption 48 Sparkline of topic views for 2 weeks
89 Chaocipher 47 Sparkline of topic views for 2 weeks
90 End-to-end encryption 46 Sparkline of topic views for 2 weeks
91 Secure voice 46 Sparkline of topic views for 2 weeks
92 Blom's scheme 45 Sparkline of topic views for 2 weeks
93 Authenticated encryption 44 Sparkline of topic views for 2 weeks
94 Lattice problem 44 Sparkline of topic views for 2 weeks
95 Digital credential 43 Sparkline of topic views for 2 weeks
96 HashClash 42 Sparkline of topic views for 2 weeks
97 Authorization certificate 41 Sparkline of topic views for 2 weeks
98 Information leakage 41 Sparkline of topic views for 2 weeks
99 Link encryption 41 Sparkline of topic views for 2 weeks
100 Key distribution 41 Sparkline of topic views for 2 weeks
101 Quantum Byzantine agreement 41 Sparkline of topic views for 2 weeks
102 Cryptographic engineering 40 Sparkline of topic views for 2 weeks
103 ID-based cryptography 40 Sparkline of topic views for 2 weeks
104 Correlation attack 37 Sparkline of topic views for 2 weeks
105 Permutation box 37 Sparkline of topic views for 2 weeks
106 Cardan grille 36 Sparkline of topic views for 2 weeks
107 Proof-of-work system 36 Sparkline of topic views for 2 weeks
108 Cipher runes 36 Sparkline of topic views for 2 weeks
109 Hybrid cryptosystem 36 Sparkline of topic views for 2 weeks
110 RED/BLACK concept 35 Sparkline of topic views for 2 weeks
111 Transmission security 34 Sparkline of topic views for 2 weeks
112 Lattice-based cryptography 33 Sparkline of topic views for 2 weeks
113 Privilege Management Infrastructure 32 Sparkline of topic views for 2 weeks
114 Ciphertext indistinguishability 30 Sparkline of topic views for 2 weeks
115 Mean Shortest Distance 29 Sparkline of topic views for 2 weeks
116 Voice inversion 29 Sparkline of topic views for 2 weeks
117 Mix network 29 Sparkline of topic views for 2 weeks
118 Strong secrecy 29 Sparkline of topic views for 2 weeks
119 Bent function 27 Sparkline of topic views for 2 weeks
120 Burrows–Abadi–Needham logic 26 Sparkline of topic views for 2 weeks
121 Group signature 24 Sparkline of topic views for 2 weeks
122 Verifiable secret sharing 24 Sparkline of topic views for 2 weeks
123 Merkle signature scheme 24 Sparkline of topic views for 2 weeks
124 Unicity distance 23 Sparkline of topic views for 2 weeks
125 BLACKER 23 Sparkline of topic views for 2 weeks
126 Kish cypher 23 Sparkline of topic views for 2 weeks
127 Strong cryptography 22 Sparkline of topic views for 2 weeks
128 Persons 22 Sparkline of topic views for 2 weeks
129 One-way encryption 22 Sparkline of topic views for 2 weeks
130 Direct Anonymous Attestation 22 Sparkline of topic views for 2 weeks
131 Tokenization (data security) 21 Sparkline of topic views for 2 weeks
132 Blinding (cryptography) 21 Sparkline of topic views for 2 weeks
133 Kleptography 21 Sparkline of topic views for 2 weeks
134 Forking lemma 21 Sparkline of topic views for 2 weeks
135 WYSIWYS 21 Sparkline of topic views for 2 weeks
136 Authority revocation list 21 Sparkline of topic views for 2 weeks
137 Floradora 20 Sparkline of topic views for 2 weeks
138 Pizzino 20 Sparkline of topic views for 2 weeks
139 Key Ceremony 19 Sparkline of topic views for 2 weeks
140 Crypto-politics 19 Sparkline of topic views for 2 weeks
141 Unknown key-share attack 19 Sparkline of topic views for 2 weeks
142 Undeniable signature 18 Sparkline of topic views for 2 weeks
143 Correlation immunity 18 Sparkline of topic views for 2 weeks
144 Root Key Ceremony 18 Sparkline of topic views for 2 weeks
145 Symmetric key management 18 Sparkline of topic views for 2 weeks
146 Ring signature 17 Sparkline of topic views for 2 weeks
147 Rabin signature algorithm 17 Sparkline of topic views for 2 weeks
148 Horton Principle 17 Sparkline of topic views for 2 weeks
149 Secure Hash Standard 16 Sparkline of topic views for 2 weeks
150 Forgery (cryptography) 16 Sparkline of topic views for 2 weeks
151 Self-shrinking generator 15 Sparkline of topic views for 2 weeks
152 Standard Model (cryptography) 15 Sparkline of topic views for 2 weeks
153 Subliminal channels 15 Sparkline of topic views for 2 weeks
154 U-Prove 15 Sparkline of topic views for 2 weeks
155 Signcryption 14 Sparkline of topic views for 2 weeks
156 Critical Security Parameter 14 Sparkline of topic views for 2 weeks
157 Off-line Root CA 14 Sparkline of topic views for 2 weeks
158 Dining cryptographers problem 14 Sparkline of topic views for 2 weeks
159 Mulabhadra 14 Sparkline of topic views for 2 weeks
160 Normal basis 13 Sparkline of topic views for 2 weeks
161 Password-based cryptography 13 Sparkline of topic views for 2 weeks
162 Ephemeral key 13 Sparkline of topic views for 2 weeks
163 Boneh/Franklin scheme 13 Sparkline of topic views for 2 weeks
164 Blum-Micali algorithm 13 Sparkline of topic views for 2 weeks
165 Mimic function 12 Sparkline of topic views for 2 weeks
166 Forward anonymity 12 Sparkline of topic views for 2 weeks
167 Transient-key cryptography 12 Sparkline of topic views for 2 weeks
168 Multivariate cryptography 12 Sparkline of topic views for 2 weeks
169 BLS (cryptography) 12 Sparkline of topic views for 2 weeks
170 Symmetric Boolean function 12 Sparkline of topic views for 2 weeks
171 Cryptochannel 11 Sparkline of topic views for 2 weeks
172 Blind credential 11 Sparkline of topic views for 2 weeks
173 Russian copulation 11 Sparkline of topic views for 2 weeks
174 Kiss (cryptanalysis) 11 Sparkline of topic views for 2 weeks
175 Group key 11 Sparkline of topic views for 2 weeks
176 Spkac 11 Sparkline of topic views for 2 weeks
177 X.1035 11 Sparkline of topic views for 2 weeks
178 Polygraphic substitution 10 Sparkline of topic views for 2 weeks
179 Entropic security 10 Sparkline of topic views for 2 weeks
180 Anonymous veto network 10 Sparkline of topic views for 2 weeks
181 Group-based cryptography 10 Sparkline of topic views for 2 weeks
182 Cryptographic Test Correction 10 Sparkline of topic views for 2 weeks
183 Proxy re-encryption 9 Sparkline of topic views for 2 weeks
184 Concrete security 9 Sparkline of topic views for 2 weeks
185 Security parameter 9 Sparkline of topic views for 2 weeks
186 Password psychology 9 Sparkline of topic views for 2 weeks
187 Array controller based encryption 9 Sparkline of topic views for 2 weeks
188 Feedback with Carry Shift Registers 9 Sparkline of topic views for 2 weeks
189 @firma 9 Sparkline of topic views for 2 weeks
190 Cover (telecommunications) 8 Sparkline of topic views for 2 weeks
191 Ciphertext expansion 8 Sparkline of topic views for 2 weeks
192 KY-7 8 Sparkline of topic views for 2 weeks
193 File Camouflage 8 Sparkline of topic views for 2 weeks
194 Master/Session 8 Sparkline of topic views for 2 weeks
195 Learning with errors 8 Sparkline of topic views for 2 weeks
196 Deterministic encryption 7 Sparkline of topic views for 2 weeks
197 Public Key Name Service 7 Sparkline of topic views for 2 weeks
198 Password Authenticated Key Exchange by Juggling 7 Sparkline of topic views for 2 weeks
199 Yao's test 7 Sparkline of topic views for 2 weeks
200 National Security Agency academic publications 7 Sparkline of topic views for 2 weeks
201 Hyper-encryption 6 Sparkline of topic views for 2 weeks
202 Bus encryption 6 Sparkline of topic views for 2 weeks
203 Cover-coding 6 Sparkline of topic views for 2 weeks
204 Trace Zero Cryptography 6 Sparkline of topic views for 2 weeks
205 Adaptive multithreaded encryption 6 Sparkline of topic views for 2 weeks
206 Generic group model 6 Sparkline of topic views for 2 weeks
207 Completeness (cryptography) less than 5 views
208 Conjugate coding less than 5 views
209 Cocks IBE scheme less than 5 views
210 Averaging argument less than 5 views
211 Keyring (cryptography) less than 5 views
212 Codress message less than 5 views
213 Encrypted function less than 5 views
214 Pseudorandom ensemble less than 5 views
215 Unsolved problems in computer science less than 5 views
216 Statistically close less than 5 views
217 Superincreasing sequence less than 5 views
218 Civision less than 5 views
219 Protocol composition logic less than 5 views
220 Designated verifier signature less than 5 views

Subcategories

Parent categories


Encyclopedia

From Wikipedia, the free encyclopedia

Cryptography is, traditionally, the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.

Padlock3.png
See also: Timeline of cryptography

(previous 200) (next 200)

Subcategories

This category has the following 18 subcategories, out of 23 total.

A

C

D

H

K

L

O

P

P cont.

Q

R

S

Pages in category "Cryptography"

The following 182 pages are in this category, out of 213 total. This list may not reflect recent changes (learn more).

A

B

C

C cont.

D

E

F

G

H

I

K

L

L cont.

M

N

O

P

Q

R

S

(previous 200) (next 200)

Study guide

Up to date as of January 14, 2010

From Wikiversity

Commons-logo.svg Search Wikimedia Commons for images, sounds and other media related to: Cryptography

Pages in category "Cryptography"

This category contains only the following page.

S


Wiktionary

Up to date as of January 15, 2010

Definition from Wiktionary, a free dictionary

Subcategories

This category has the following 3 subcategories, out of 3 total.

c

f

j


Wikibooks

Up to date as of January 23, 2010

From Wikibooks, the open-content textbooks collection

This category contains pages that are part of the Cryptography book.

Related categories

The following 3 related categories may be of interest, out of 3 total.

P

S

T

Books or Pages

The following 62 pages are in this category, out of 62 total.

B

C

C cont.

C cont.

D

M

P

T

W








Got something to say? Make a comment.
Your name
Your email address
Message