• Thumbnail for Cryptography
    work in cryptography concerns cryptographic primitives—algorithms with basic cryptographic properties—and their relationship to other cryptographic problems...
    98 KB (10,730 words) - 08:25, 22 April 2024
  • Thumbnail for Cryptographic nonce
    initialization vectors and in cryptographic hash functions. A nonce is an arbitrary number used only once in a cryptographic communication, in the spirit...
    7 KB (898 words) - 00:40, 15 April 2024
  • Thumbnail for Cryptographic hash function
    Most cryptographic hash functions are designed to take a string of any length as input and produce a fixed-length hash value. A cryptographic hash function...
    45 KB (6,067 words) - 00:54, 2 April 2024
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    53 KB (5,552 words) - 22:03, 30 March 2024
  • A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
    9 KB (1,009 words) - 22:25, 21 March 2024
  • Thumbnail for Encryption
    types of keys in cryptographic systems are symmetric-key and public-key (also known as asymmetric-key). Many complex cryptographic algorithms often use...
    33 KB (3,575 words) - 16:30, 24 April 2024
  • stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be...
    12 KB (1,496 words) - 14:16, 25 March 2024
  • A cryptographic module is a component of a computer system that securely implements cryptographic algorithms, typically with some element of tamper resistance...
    2 KB (140 words) - 03:08, 4 April 2024
  • Al-Kindi wrote a book on cryptography entitled Risalah fi Istikhraj al-Mu'amma (Manuscript for the Deciphering Cryptographic Messages), in which he described...
    50 KB (6,651 words) - 19:44, 20 March 2024
  • Thumbnail for Cryptanalysis
    is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown. In...
    44 KB (5,176 words) - 19:58, 18 April 2024