Home
Random
Nearby
Log in
Settings
Give to Wikipedia
About Wikipedia
Disclaimers
Search
Template
:
Cryptography navbox
Language
Watch
Change
v
t
e
Cryptography
General
Cryptographic protocol
Authentication protocol
Cryptanalysis
Cryptocurrency
Cryptosystem
Hash function
Cryptographic hash function
Key derivation function
Digital signature
Key (cryptography)
Key exchange
Key schedule
Ransomware
Secure channel
Encryption
Decryption
Plaintext
Ciphertext
Shared secret
History of cryptography
Outline of cryptography
Cryptographic primitive
Cryptographic nonce
Cryptovirology
Kleptography
Key generator
Key stretching
Keygen
Cryptojacking malware
Random number generation
Cryptographically secure pseudorandom number generator
(CSPRNG)
Pseudorandom noise
(PRN)
Insecure channel
Subliminal channel
End-to-end encryption
Harvest now, decrypt later
Information-theoretic security
Codetext
Trapdoor function
Trusted timestamping
Key-based routing
Onion routing
Garlic routing
Kademlia
Mix network
Mathematics
Cryptographic hash function
Block cipher
Stream cipher
Symmetric-key algorithm
Authenticated encryption
Public-key cryptography
Quantum key distribution
Quantum cryptography
Post-quantum cryptography
Message authentication code
Random numbers
Steganography