Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
#
2013 65537
A
A5/0 A5/1 A5/2 A5/3 A5/4 Adaptive attack AEAD (authenticated encryption with associated data) AES (Advanced Encryption Standard) AES-CCM AES-GCM AES-GCM-SIV AES-NI AES-SIV AIM (Advanced INFOSEC Machine) AKA AKS (Agrawal–Kayal–Saxena) Algebraic cryptanalysis Alice All-or-nothing transform (AONT) Anonymous signature Applied Cryptography Applied cryptography ARC4 Argon2 ARX (Add-Rotate-XOR) ASIACRYPT Asymmetric cryptography Attack Attribute-based encryption (ABE) Authenticated cipher Axolotl
B
Backdoor Backtracking resistance Backward secrecy Base64 BassOmatic BB84 bcrypt Biclique cryptanalysis BIKE (Bit Flipping Key Encapsulation) BIP (Bitcoin improvement proposal) Bit Gold Bitcoin Black BLAKE BLAKE2 BLAKE3 Bleichenbacher attack Blind signature Block cipher Blockchain Blockcipher Blowfish BLS (Boneh-Lynn-Shacham) signature Bob Boolean function Boomerang attack BQP (bounded-error quantum polynomial time) Braid group cryptography Brainpool curves Break-in recovery Broadcast encryption Brute-force attack Bulletproof Byzantine fault tolerance
C
CAESAR Caesar’s cipher CAVP (Cryptographic Algorithm Validation Program) CBC (cipher block chaining) CECPQ (combined elliptic-curve and post-quantum) Cellular automata Ceremony Certificate Certificate authority (CA) Certificate transparency (CT) ChaCha20 CHES (Conference on Cryptographic Hardware and Embedded Systems) CIA Ciphertext stealing Clipper CMVP (Cryptographic Module Validation Program) Code-based cryptography Commitment Concurrent zero-knowledge Consensus protocol Control word COPACOBANA (Cost-Optimized PArallel COde Breaker) Cothority (collective authority) Cryptanalysis Cryptids Crypto CRYPTO Crypto AG Crypto period Crypto variable Crypto wars Cryptobiosis Cryptocurrency Crypto-Gram Cryptography Cryptologia Cryptology Cryptonomicon Cryptorchidism Cryptovirology CRYPTREC CSIDH (Commutative Supersingular Isogeny Diffie–Hellman) CTF (capture the flag) Cube attack Curve25519 Curve448 Cypher
D
Daemon Davies–Meyer Decentralized private computation Déchiffrer Décrypter Deniable encryption DES (Data Encryption Standard) Dictionary Dictionary attack Differential cryptanalysis Diffie–Hellman Disclosure Discrete logarithm problem Distinguisher Distributed randomness Dolev–Yao model Double ratchet Dragonfly DRBG (deterministic random bit generator) DSA (Digital Signature Algorithm) DSS (Digital Signature Standard) DVB-CSA
E
E0 ECB (electronic codebook) ECC ECDLP (Elliptic-curve discrete logarithm problem) ECDSA (Elliptic-curve DSA) ECIES (Elliptic-curve IES) Ed25519 EdDSA EKMS (Electronic Key Management System) Electronic codebook ElGamal Elligator Elliptic curve Elliptic-curve cryptography Encipherment End-to-end encryption (E2EE) Enigma Entropy ePrint Erathosthenes’ sieve eSTREAM Ethereum Eurocrypt Eve E-voting
F
Factoring problem Feedback shift register Feistel network Fialka (Фиалка) Fiat–Shamir FIPS 140-2 FIPS 140-3 Forgery Formal verification Format-preserving encryption Forward secrecy FOX FSE (Fast Software Encryption) Fully homomorphic encryption Functional encryption Future secrecy Fuzzy extractor
G
Generalized birthday problem GNFS (General Number Field Sieve) GOST Grain Gröbner basis Group signature Grover’s algorithm
H
Hardcore predicate Hash function Hash-based cryptography Heartbleed Hedged signature HFE (Hidden Field Equations) HMAC (Hash-based MAC) Homomorphic encryption HPC (Hasty Pudding Cipher) HSM (hardware security module) HTTP/3 Hyperelliptic-curve cryptography
I
IACR (International Association for Cryptologic Research) IDEA (International Data Encryption Algorithm) IDEA NXT Identity-based encryption IES (Integrated Encryption Scheme) Impatient saboteur Impossibility Impossible differential attack IND-CCA IND-CPA Indelibility Indifferentiability Indistinguishability Indistinguishability obfuscation (iO) Information-theoretic security INT-CTXT Invisible signature IOTA IPES (Improved Proposed Encryption Standard) IPSec ISO standard Isogeny-based cryptography
J
Journal of Cryptology (JoC)
K
KASUMI Keccak KeeLoq KEM (key encapsulation mechanism) Kerberos Kerckhoffs’ principles Key derivation function (KDF) Key escrow Key management Key wrapping Kleptography Known-key attack Kupyna (Купина)
L
Laconic zero-knowledge proof Lai–Massey Lamport signature Lattice-based cryptography Le Chiffre Leakage-resilient cryptography Learning with errors (LWE) Length extension attack Length-preserving encryption LFSR (linear feedback shift register) Lightweight cryptography Linear cryptanalysis Linkability LM hash Luby–Rackoff Lucifer
M
MAC (message authentication code) MAGENTA Malleability Manger attack Man-in-the-middle MASH (Modular Arithmetic Secure Hash) McEliece encryption scheme MD4 MD5 MDC (Message Digest Cipher) MDC-2 (Modification Detection Code 2) Meet-in-the-middle Merkle puzzle Merkle tree Merkle–Damgård construction Mersenne twister Message franking Miller–Rabin MINERVA Mining Misuse resistance Mixnet MQV (Menezes–Qu–Vanstone) Multicollision Multi-party computation (MPC) Multivariate cryptography
N
NBS (National Bureau of Standards) NESSIE (New European Schemes for Signatures, Integrity, and Encryption) “New Directions in Cryptography” NFSR (nonlinear feedback shift register) NIST (National Institute of Standards and Technology) NIZK (non-interactive zero-knowledge) Noekeon Noise Nonce Non-committing encryption Non-outsourceability Non-slanderability NSA (National Security Agency) NT hash NTRU (Nth degree Truncated polynomial Ring Units) Null cipher
O
OAEP (Optimal Asymmetric Encryption Padding) Oblivious key management system (OKMS) Oblivious PRF (OPRF) Oblivious RAM (ORAM) Oblivious transfer Obscurity OCB (offset codebook mode) One-time pad One-way function Onion-AE OPAQUE OpenSSL Oracle OTR (Off-the-Record)
P
Padding oracle attack Paillier cryptosystem Pairing Pairing-based cryptography PAKE (password-authenticated key exchange) Paradigm Password hash function PBKDF2 (Password-Based Key Derivation Function 2) PCT (Private Communications Technology) PEP (Plaintext equivalence proof) Perfect forward secrecy Permutation-based cryptography PES (Proposed Encryption Standard) PET (Plaintext equivalence test) PFS PGP (Pretty Good Privacy) Photuris Picnic PKC PKCS (Public Key Cryptography Standards) Poly1305 Polynomial complexity Post-compromise security Post-quantum cryptography Post-quantum RSA Prediction resistance Preimage PRESENT PRIMES Privacy-preserving Private information retrieval (PIR) Proof of burn Proof of catalytic space Proof of human work Proof of replication Proof of reserve Proof of security Proof of sequential work Proof of space Proof of spacetime Proof of stake Proof of storage Proof of useful work Proof of work Provable security Provably secure Proxy re-encryption Pseudo-random Pseudorandom function (PRF) Pseudorandom number generator (PRNG) Pseudorandom permutation (PRP) Public-key cryptography PUF (physically unclonable function) Puncturable encryption Puncturable pseudorandom function (PPRF)
Q
Quantum computer Quantum cryptography Quantum encryption Quantum key distribution Quantum signature QUIC (Quick UDP Internet Connections)
R
Rabin cryptosystem Rainbow tables Random bits Random oracle Randomness Range proof RC4 RC5 RC6 Real world Real World Crypto (RWC) Rectangle attack Related-key attack Research papers Revocation Rijndael Ring signature RIPEMD-160 Rivest–Shamir–Adleman ROBOT (Return Of Bleichenbacher’s Oracle Threat) ROS RSA Rubber-hose cryptanalysis Rumba20
S
SAEP (Simplified OAEP) Salsa20 Sandwich attack S-box Scalar sci.crypt Scrambler scrypt Searchable encryption secp256k1 Secret sharing Security Security proof Semantic security Serious Cryptography Serpent SHA-0 SHA-1 SHA-2 SHA-3 SHA-3 competition SHACAL Shamir’s secret database Shor’s algorithm SHS (Secure Hash Standard) Side channel Side-channel attack Sigaba Signal protocol Signature Signcryption SIKE (Supersingular Isogeny Key Encapsulation) SIMECK SIMON SipHash SIV-AES Skipjack Slide attack SM Smart contract Snake-oil SNARK (succinct non-interactive argument of knowledge) SNIP (secret-shared non-interactive proof) SNOW 3G Solitaire SPECK SPEKE (Simple Password Exponential Key Exchange) SPHINCS Sponge function SRP (Secure Remote Password) SSH (Secure Shell) SSL (Secure Socket Layer) STARK (scalable transparent arguments of knowledge) Steganography Stream cipher Substitution-permutation network (SPN) Suck Sugar beet auctions Suite A SUPERCOP Superpolynomial complexity SVP (shortest vector problem) Symmetric-key cryptography
T
TCC Test vectors Threefish Threshold encryption Threshold secret-sharing Threshold signature Time AI™ Time-lock encryption Time-lock puzzle Timing attack TLS (Transport Layer Security) Tor Traitor tracing Transfinite cryptography Trapdoor Triple DES Trivium True random number generator (TRNG) Trusted third party Tweakable block cipher Twitter Twofish
U
Undeniable signature Universal composability Universal hash function Updatable encryption
V
Verifiable delay function (VDF) Verifiable random function (VRF) Verifiable unpredictable function (VUF) Vigenère cipher VSH (Very Smooth Hash)
W
Wallet Watermarking White-box cryptography Winternitz signature WireGuard
X
X25519 X3DH XMSS (eXtended Merkle Signature Scheme) XOF (extendable output function) XOR XOR encryption
Z
Zerocash ZKP (zero-knowledge proof) ZRTP
Index of Terms
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion