• Thumbnail for Visual cryptography
    Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
    11 KB (1,416 words) - 02:11, 12 March 2025
  • Thumbnail for Binary image
    several generalizations of the basic scheme including k-out-of-n visual cryptography, and using opaque sheets but illuminating them by multiple sets of...
    16 KB (1,756 words) - 23:16, 1 May 2025
  • Indistinguishability obfuscation Multivariate cryptography Post-quantum cryptography Quantum cryptography Steganography Visual cryptography Chaotic cryptology Japanese...
    20 KB (1,901 words) - 07:15, 23 January 2025
  • Thumbnail for Moni Naor
    against chosen ciphertext attack and creating non-malleable cryptography, visual cryptography (with Adi Shamir), and suggesting various methods for verifying...
    8 KB (681 words) - 09:52, 15 March 2025
  • Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
    67 KB (2,933 words) - 10:14, 4 January 2025
  • Thumbnail for Adi Shamir
    contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the...
    11 KB (808 words) - 18:27, 27 April 2025
  • watermark – Electronic identifier embedded in an audio signal Visual cryptography – Cryptographic technique Security printing – Field of the printing industry...
    52 KB (6,107 words) - 08:09, 29 April 2025
  • Secret sharing (category Cryptography)
    remainder theorem Secure multiparty computation Shamir's secret sharing Visual cryptography Shamir, Adi (1 November 1979). "How to share a secret" (PDF). Communications...
    28 KB (3,790 words) - 01:56, 1 May 2025
  • Thumbnail for Alice and Bob
    fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature...
    24 KB (2,023 words) - 11:40, 24 February 2025
  • cast appropriately and that the votes are accurately tallied using visual cryptography. After the voter selects their candidates, a voting machine prints...
    24 KB (2,707 words) - 06:57, 15 February 2025
  • Thumbnail for Cipher
    Cipher (category Cryptography)
    In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
    18 KB (2,166 words) - 09:30, 26 April 2025
  • Thumbnail for Sanjoy Paul
    Amitabha; Paul, Sanjoy (July 2010). "Watermarking video content using visual cryptography and scene averaged image". 2010 IEEE International Conference on...
    6 KB (523 words) - 23:59, 1 May 2024
  • Man-in-the-middle attack (category Cryptographic attacks)
    In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly...
    23 KB (2,561 words) - 14:02, 23 April 2025
  • of any unsigned puzzle. The puzzles focused heavily on data security, cryptography, steganography, and Internet anonymity. It has been called "the most...
    18 KB (1,734 words) - 14:38, 1 May 2025
  • The tables below compare cryptography libraries that deal with cryptography algorithms and have application programming interface (API) function calls...
    44 KB (1,547 words) - 13:17, 18 March 2025
  • Thumbnail for .NET Framework version history
    updating the System.Security.Cryptography APIs to support the Windows CNG cryptography APIs [...] since it supports modern cryptography algorithms [Suite B Support]...
    64 KB (6,766 words) - 15:58, 10 February 2025
  • Reference (redirect from Visual reference)
    used that intentionally hide the reference from some observers, as in cryptography.[citation needed] References feature in many spheres of human activity...
    11 KB (1,339 words) - 17:02, 23 February 2025
  • Side-channel attack (category Cryptographic attacks)
    protocol or algorithm itself (e.g. flaws found in a cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights...
    31 KB (3,618 words) - 07:13, 16 February 2025
  • Thumbnail for Transposition cipher
    In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
    25 KB (3,604 words) - 12:24, 11 March 2025
  • Thumbnail for Identicon
    Identicon (redirect from Visual hash)
    An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of avatar...
    5 KB (455 words) - 07:50, 16 April 2025
  • semiconductor intellectual property core Hard-core predicate, a concept in cryptography Hard Corps (disambiguation) All pages with titles beginning with Hardcore...
    3 KB (330 words) - 01:07, 14 August 2024
  • computation Quantum cryptography, a variety of cryptography employing quantum mechanics or quantum computers Quartz Composer, a node-based visual programming...
    1 KB (199 words) - 19:26, 22 July 2024
  • Java KeyStore (category Public-key cryptography)
    Keyring (cryptography) Public key infrastructure The keytool Command - a key and certificate management utility CERTivity - A multi-platform visual tool for...
    2 KB (163 words) - 21:30, 19 February 2024
  • Thumbnail for Cultural depictions of Maximilian I, Holy Roman Emperor
    Warburg and Friedländer opine that the sketches likely reflect an immediate visual experience, because, among other reasons, from a retrospective point-of-view...
    308 KB (33,765 words) - 01:32, 24 March 2025
  • of Evolutionary Paleobiology at Cambridge University 29 January 2004 Cryptography Simon Singh, science writer and author of The Code Book: The Secret History...
    457 KB (296 words) - 21:55, 1 May 2025
  • difluoride, see: 1,1-Difluoroethylene Verifiable Delay Function, in cryptography This disambiguation page lists articles associated with the title VDF...
    510 bytes (79 words) - 22:33, 13 June 2024
  • - Java Formal language and Automata Package CrypTool - illustrates cryptographic and cryptanalytic concepts Britannica Encarta Encyclopædia Britannica...
    6 KB (384 words) - 20:38, 30 March 2025
  • In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity...
    49 KB (5,677 words) - 14:49, 30 April 2025
  • Cryptol (category Cryptographic software)
    Cryptol is a domain-specific programming language for cryptography developed by the Portland, Oregon based software development firm, Galois, Inc. It is...
    4 KB (260 words) - 01:08, 23 September 2024
  • In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric. MISTY1 is one of the selected...
    5 KB (455 words) - 14:35, 30 July 2023