• Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
    6 KB (819 words) - 05:08, 24 March 2025
  • Thumbnail for Cryptography
    work in cryptography concerns cryptographic primitives—algorithms with basic cryptographic properties—and their relationship to other cryptographic problems...
    99 KB (10,975 words) - 11:30, 14 May 2025
  • Thumbnail for Cryptographic hash function
    Most cryptographic hash functions are designed to take a string of any length as input and produce a fixed-length hash value. A cryptographic hash function...
    49 KB (6,299 words) - 20:13, 4 May 2025
  • In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level...
    13 KB (1,332 words) - 01:56, 12 March 2025
  • In cryptographic protocol design, cryptographic agility or crypto-agility is the ability to switch between multiple cryptographic primitives. A cryptographically...
    12 KB (1,222 words) - 11:18, 7 February 2025
  • Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself or...
    24 KB (2,852 words) - 05:01, 2 May 2025
  • Black-box obfuscation (category Cryptographic primitives)
    In cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that...
    7 KB (979 words) - 14:23, 8 March 2025
  • it suitable for use in cryptography. It is also referred to as a cryptographic random number generator (CRNG). Most cryptographic applications require random...
    29 KB (3,633 words) - 08:24, 16 April 2025
  • A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
    9 KB (1,015 words) - 07:59, 25 April 2025
  • Thumbnail for Sponge function
    uses. They can be used to model or implement many cryptographic primitives, including cryptographic hashes, message authentication codes, mask generation...
    7 KB (846 words) - 09:04, 19 April 2025
  • Thumbnail for Encryption
    types of keys in cryptographic systems are symmetric-key and public-key (also known as asymmetric-key). Many complex cryptographic algorithms often use...
    34 KB (3,645 words) - 17:52, 2 May 2025
  • Thumbnail for Digital signature
    to the recipient. Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial...
    45 KB (5,315 words) - 16:52, 11 April 2025
  • stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be...
    13 KB (1,524 words) - 21:51, 14 May 2025
  • Initialization vector (category Cryptography)
    In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state....
    14 KB (1,797 words) - 08:53, 7 September 2024
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 19:45, 6 February 2025
  • with other cryptographic primitives); in this case they are described as universal hash functions. Among the typical uses of non-cryptographic hash functions...
    7 KB (796 words) - 00:45, 28 April 2025
  • Signcryption (category Public-key cryptography)
    In cryptography, signcryption is a public-key primitive that simultaneously performs the functions of both digital signature and encryption. Encryption...
    7 KB (918 words) - 20:22, 28 January 2025
  • Thumbnail for Symmetric-key algorithm
    Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of...
    15 KB (1,540 words) - 19:12, 22 April 2025
  • Panama is a cryptographic primitive which can be used both as a hash function and a stream cipher, but its hash function mode of operation has been broken...
    4 KB (352 words) - 12:48, 29 July 2024
  • Block cipher (category Cryptographic primitives)
    can be used to build other cryptographic primitives, such as those below. For these other primitives to be cryptographically secure, care has to be taken...
    51 KB (6,569 words) - 08:42, 11 April 2025
  • "Modules In Process List - Cryptographic Module Validation Program | CSRC | CSRC". CSRC | NIST. Retrieved 2024-11-22. "Cryptographic Module Validation Program...
    46 KB (1,565 words) - 06:44, 21 May 2025
  • In cryptography, the white-box model refers to an extreme attack scenario, in which an adversary has full unrestricted access to a cryptographic implementation...
    20 KB (2,481 words) - 12:46, 21 October 2024
  • Thumbnail for Block cipher mode of operation
    Block cipher mode of operation (category Cryptographic algorithms)
    which combined confidentiality and data integrity into a single cryptographic primitive (an encryption algorithm). These combined modes are referred to...
    52 KB (5,828 words) - 22:45, 25 April 2025
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    63 KB (6,408 words) - 13:56, 6 May 2025
  • 1991. L. Brown, Josef Pieprzyk and Jennifer Seberry, "LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications", in Advances in Cryptology...
    6 KB (723 words) - 23:05, 27 March 2024
  • function is typically used. Such systems almost always use symmetric key cryptographic algorithms. The term PSK is used in Wi-Fi encryption such as Wired Equivalent...
    3 KB (416 words) - 16:50, 23 January 2025
  • Multivariate cryptography is the generic term for asymmetric cryptographic primitives based on multivariate polynomials over a finite field F {\displaystyle...
    8 KB (1,147 words) - 02:58, 17 April 2025
  • Muller, Phelix: Fast Encryption and Authentication in a Single Cryptographic Primitive (includes source code) T. Good, W. Chelton, M. Benaissa: Review...
    8 KB (789 words) - 08:24, 28 November 2023
  • Benchmarking of Cryptographic Hashes – measurements of hash function speed on various platforms The ECRYPT Hash Function Website – A wiki for cryptographic hash...
    16 KB (806 words) - 20:08, 6 August 2024
  • The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
    3 KB (322 words) - 07:10, 20 February 2025