Cryptography

A

Authenticated encryption
Authority revocation list
Authorization certificate
Avalanche effect

B

Benaloh cryptosystem
Bigram
Biometric word list
Blind credential
Blind signature
Blinding (cryptography)
Block size (cryptography)
Blom's scheme
Boolean function
Burrows-Abadi-Needham logic
Bus encryption
Byzantine fault tolerance

C

CAVNET
CEN Workshop Agreement
CLEFIA
Capstone (cryptography)
Cardan grille
Cherry Ripe (numbers station)
Cipher runes
Ciphertext expansion
Ciphertext indistinguishability
Claw-free permutation
Cleartext
Clipper chip
Code (cryptography)
Code (information theory)
Code word
Codebook
Codress message
Collision resistance
Commitment scheme
Communications security
Compromise
Computational hardness assumption
Computational theorist
Computer insecurity
Computer surveillance
Concrete security
Confusion and diffusion
Conjugate coding
Copycoder
Correlation immunity
Cover (telecommunications)
Cover-coding
Critical Security Parameter
Cryptochannel
Cryptogram
Cryptographic Service Provider
Cryptographic engineering
Cryptographic hash function
Cryptographic log on
Cryptographic nonce
Cryptographically Generated Addresses
Cryptographically strong
Cryptography
Portal:Cryptography
Cryptography Classification
Cryptography in Japan
Cryptosystem
Cryptovirology

D

Decipherment
Decrypt
Deniable encryption
Deterministic encryption
Differential equations of addition
Digital credential
Digital signature
Digital signatures and law
Diplomatic bag
Direct anonymous attestation
Discrete logarithm
Distribution ensemble
Dual basis in a field extension

E

ELINT
Electronic signature
Elliptic curve cryptography
Encryption
End-to-end encryption
Enigma machine
Entropic security
Ephemeral key
Existential forgery

F

FISINT
Forgery (MAC)
Friend-to-friend
Félix Delastelle

G

Garble
Georgia Cryptologic Center
Group key
Group signature

H

HIPAA compliant email postscript
Hardware random number generator
Homomorphic encryption
Hybrid cryptosystem
Hyper-encryption

I

ID-based cryptography
Illegal prime
Index of coincidence
Information leakage
Initialization vector
Intermediate certificate authorities

K

Kerckhoffs' principle
Key (cryptography)
Key distribution
Kiss (cryptanalysis)
Knapsack problem

L

Lamport signature
Lenstra–Lenstra–Lovász lattice basis reduction algorithm
Link encryption
Wikipedia:WikiProject Cryptography/List of cryptography topics
List of open problems in computer science

M

Malleability (cryptography)
Mean Shortest Distance
Mental poker
Message authentication code
Mimic function
Mix network
Multi party fair exchange protocol

N

NIPRNet
Negligible function (cryptography)
Normal basis
Notarikon
Nothing up my sleeve number
Null cipher

O

One-time pad
One-way function

P

PGP word list
Padding (cryptography)
Passphrase
Password
Password psychology
Password strength
Password-based cryptography
Perfect forward secrecy
Phi-hiding assumption
Plaintext
Pockels effect
Polygraphic substitution
Polynomial basis
Proof of concept
Proof-of-work system
Provable security
Proxy re-encryption
Pseudo-Hadamard transform
Pseudorandom ensemble
Public-key cryptography
Punchscan

Q

Quadratic residuosity problem
Quantum computer
Quantum cryptography

R

RC algorithm
RED/BLACK concept
RSA Conference
Rabin fingerprint
Randomness
Reciprocal cipher
Ring signature
Rossignols
Russian copulation

S

SIGINT
SIPRNet
Safe prime
Salt (cryptography)
Samhain (software)
Scrambler
Secure Hash Standard
Secure cryptoprocessor
Secure voice
Security Protocols Open Respository
Security association
Security engineering
Security parameter
Security through obscurity
Self-shrinking generator
Semiprime
Server gated cryptography
Shrinking generator
Snake oil (cryptography)

S

Software token
Standard Model (cryptography)
Strong cryptography
Strong prime
Strong secrecy
Substitution box
Superencryption

T

Tamper resistance
Topics in cryptography
Traffic-flow security
Transmission security
Trapdoor function
Trench code
Trusted Computing
Trusted third party

U

Undeniable signature
Unicity distance
Uniform ensemble
User talk:Ciphergoth/One-time pad

V

Verifiable secret sharing
Visual cryptography
Vocoder
Voice inversion