# Category:**Cryptography**

Wikimedia Commons has media related to .Cryptography |

** Cryptography** is the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of

*encryption*. In the past,

**cryptography**helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of

**cryptography**has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce.

**Cryptography**is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.

## Subcategories

This category has the following 30 subcategories, out of 30 total.

### A

### C

### D

### E

### H

### K

### L

### N

### O

### P

### Q

### R

### S

### T

### Σ

## Pages in category "**Cryptography**"

The following 200 pages are in this category, out of approximately 274 total. This list may not reflect recent changes (learn more).

(previous page) (next page)### 0–9

### A

### B

### C

- Chaffing and winnowing
- Chaotic cryptology
- Cipher
- Ciphertext
- Ciphertext expansion
- Ciphertext indistinguishability
- Client-side encryption
- CloudMask
- Code (
**cryptography**) - Code word
- Codebook
- Codress message
- Communications security
- Comparison of cryptographic hash functions
- Completeness (
**cryptography**) - Computer security
- Concrete security
- Conjugate coding
- Convergent encryption
- Correlation immunity
- Cover (telecommunications)
- Cover-coding
- Critical security parameter
- Cryptanalysis
- Crypto Wars
- Crypto-shredding
- Cryptochannel
- Cryptographic hash function
- Cryptographic High Value Product
- Cryptographic Module Testing Laboratory
- Cryptographic multilinear map
- Cryptographic nonce
- Cryptographic Service Provider
- CrypTool
- CryptoParty
- Cryptosystem
- Cryptovirology
- CrySyS Lab
- Cypherpunks (book)

### D

- Data at rest
- Data in use
- Database encryption
- Decipherment
- Deniable encryption
- Designated verifier signature
- Device-independent quantum
**cryptography** - DigiDoc
- Digital credential
- Dining cryptographers problem
- Diplomatic bag
- Direct Anonymous Attestation
- Discrete logarithm
- Discriminant Book
- DogTag
- Dynamic encryption

### E

### F

### H

### I

### K

- Kerckhoffs's principle
- Key (
**cryptography**) - Key ceremony
- Key checksum value
- Key derivation function
- Key distribution in wireless sensor networks
- Key Management Interoperability Protocol
- Key-agreement protocol
- Key-based routing
- Keyring (
**cryptography**) - KLJN Secure Key Exchange
- Knapsack cryptosystems
- Knapsack problem
- Kurzsignale

### L

### M

- Malleability (
**cryptography**) - Mask generation function
- Master/Session
- MDS matrix
- Memory-hard function
- Mental poker
- Messaging Layer Security
- Microsoft Security Development Lifecycle
- MIME Object Security Services
- Mimic function
- Mix network
- Mlecchita vikalpa
- Mulabhadra
- Multiple encryption
- Musical cryptogram

### N

### P

- Padding (
**cryptography**) - Passphrase
- Password Authenticated Key Exchange by Juggling
- Password strength
- Password-based
**cryptography** - Pepper (
**cryptography**) - PGP word list
- Philco computers
- Pizzino
- PKIoverheid
- Plaintext
- Point to Point Encryption
- Polygraphic substitution
- POODLE
- Post-quantum
**cryptography** - PRESENT
- Prince (cipher)
- Private set intersection
- PrivateCore
- Privilege Management Infrastructure
- Probabilistic signature scheme
- Proof of knowledge
- Proof of space
- Proof of stake
- Proof of work
- Protocol composition logic
- Provable security
- Proxy re-encryption
- Pseudorandom ensemble
- Pseudorandom generator
- Public-key
**cryptography** - PURB (
**cryptography**)