The Full Wiki

More info on Theory of cryptography

Theory of cryptography: Trending topics

Advertisements
  

The following are the current most viewed articles on Wikipedia within Wikipedia's Theory of cryptography category. Think of it as a What's Hot list for Theory of cryptography. More info »

This is a beta release and so the figures may be a day or two out of date. We'd love to get your thoughts.

Rank Topic Wikipedia views
1 Zero-knowledge proof 233 Sparkline of topic views for 2 weeks
2 Semiprime 158 Sparkline of topic views for 2 weeks
3 Random oracle 102 Sparkline of topic views for 2 weeks
4 Trapdoor function 93 Sparkline of topic views for 2 weeks
5 Lenstra–Lenstra–Lovász lattice basis reduction algorithm 87 Sparkline of topic views for 2 weeks
6 Secure multi-party computation 72 Sparkline of topic views for 2 weeks
7 Strong authentication 67 Sparkline of topic views for 2 weeks
8 Safe prime 62 Sparkline of topic views for 2 weeks
9 Pseudorandom function family 57 Sparkline of topic views for 2 weeks
10 Polynomial basis 39 Sparkline of topic views for 2 weeks
11 Oblivious transfer 37 Sparkline of topic views for 2 weeks
12 Semantic security 37 Sparkline of topic views for 2 weeks
13 Random function 35 Sparkline of topic views for 2 weeks
14 Information theoretic security 34 Sparkline of topic views for 2 weeks
15 Differential privacy 34 Sparkline of topic views for 2 weeks
16 Rabin fingerprint 33 Sparkline of topic views for 2 weeks
17 Non-interactive zero-knowledge proof 29 Sparkline of topic views for 2 weeks
18 Strong prime 27 Sparkline of topic views for 2 weeks
19 Private information retrieval 21 Sparkline of topic views for 2 weeks
20 Advantage (cryptography) 21 Sparkline of topic views for 2 weeks
21 Neural cryptography 21 Sparkline of topic views for 2 weeks
22 Quadratic residuosity problem 20 Sparkline of topic views for 2 weeks
23 Pseudorandom permutation 19 Sparkline of topic views for 2 weeks
24 Common reference string model 19 Sparkline of topic views for 2 weeks
25 Hard-core predicate 18 Sparkline of topic views for 2 weeks
26 Universal composability 18 Sparkline of topic views for 2 weeks
27 Pseudo-Hadamard transform 17 Sparkline of topic views for 2 weeks
28 Probabilistic encryption 15 Sparkline of topic views for 2 weeks
29 Standard Model (cryptography) 15 Sparkline of topic views for 2 weeks
30 Lattice reduction 14 Sparkline of topic views for 2 weeks
31 Leftover hash lemma 14 Sparkline of topic views for 2 weeks
32 Decorrelation theory 14 Sparkline of topic views for 2 weeks
33 Distribution ensemble 13 Sparkline of topic views for 2 weeks
34 Computational hardness assumption 12 Sparkline of topic views for 2 weeks
35 Plaintext-aware encryption 10 Sparkline of topic views for 2 weeks
36 Phi-hiding assumption 10 Sparkline of topic views for 2 weeks
37 Witness-indistinguishable proof 8 Sparkline of topic views for 2 weeks
38 Differential equations of addition 8 Sparkline of topic views for 2 weeks
39 Chaos communications 7 Sparkline of topic views for 2 weeks
40 Generic group model 6 Sparkline of topic views for 2 weeks
41 Dual basis in a field extension less than 5 views
42 Claw-free permutation less than 5 views
43 Fiat-Shamir heuristic less than 5 views
44 Averaging argument less than 5 views
45 Uniform ensemble less than 5 views
46 Coppersmith method less than 5 views

Subcategories

Parent categories


Encyclopedia

From Wikipedia, the free encyclopedia

Theory of cryptography refers to the study of cryptographic algorithms and protocols in a formal framework. The two main goals of the study are definitions and proofs of security.

Subcategories

This category has only the following subcategory.

C


Advertisements






Got something to say? Make a comment.
Your name
Your email address
Message