Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
11 KB (1,416 words) - 02:11, 12 March 2025
Binary image (section Visual cryptography)
several generalizations of the basic scheme including k-out-of-n visual cryptography, and using opaque sheets but illuminating them by multiple sets of...
16 KB (1,756 words) - 23:16, 1 May 2025
Indistinguishability obfuscation Multivariate cryptography Post-quantum cryptography Quantum cryptography Steganography Visual cryptography Chaotic cryptology Japanese...
20 KB (1,901 words) - 07:15, 23 January 2025
against chosen ciphertext attack and creating non-malleable cryptography, visual cryptography (with Adi Shamir), and suggesting various methods for verifying...
8 KB (681 words) - 09:52, 15 March 2025
Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
67 KB (2,933 words) - 10:14, 4 January 2025
contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the...
11 KB (808 words) - 18:27, 27 April 2025
watermark – Electronic identifier embedded in an audio signal Visual cryptography – Cryptographic technique Security printing – Field of the printing industry...
52 KB (6,107 words) - 08:09, 29 April 2025
Secret sharing (category Cryptography)
remainder theorem Secure multiparty computation Shamir's secret sharing Visual cryptography Shamir, Adi (1 November 1979). "How to share a secret" (PDF). Communications...
28 KB (3,790 words) - 01:56, 1 May 2025
Alice and Bob (redirect from Characters in cryptography)
fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature...
24 KB (2,023 words) - 11:40, 24 February 2025
End-to-end auditable voting (redirect from Cryptographic voting system)
cast appropriately and that the votes are accurately tallied using visual cryptography. After the voter selects their candidates, a voting machine prints...
24 KB (2,707 words) - 06:57, 15 February 2025
Cipher (category Cryptography)
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
18 KB (2,166 words) - 09:30, 26 April 2025
Amitabha; Paul, Sanjoy (July 2010). "Watermarking video content using visual cryptography and scene averaged image". 2010 IEEE International Conference on...
6 KB (523 words) - 23:59, 1 May 2024
Man-in-the-middle attack (category Cryptographic attacks)
In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly...
23 KB (2,561 words) - 14:02, 23 April 2025
of any unsigned puzzle. The puzzles focused heavily on data security, cryptography, steganography, and Internet anonymity. It has been called "the most...
18 KB (1,734 words) - 14:38, 1 May 2025
The tables below compare cryptography libraries that deal with cryptography algorithms and have application programming interface (API) function calls...
44 KB (1,547 words) - 13:17, 18 March 2025
updating the System.Security.Cryptography APIs to support the Windows CNG cryptography APIs [...] since it supports modern cryptography algorithms [Suite B Support]...
64 KB (6,766 words) - 15:58, 10 February 2025
Reference (redirect from Visual reference)
used that intentionally hide the reference from some observers, as in cryptography.[citation needed] References feature in many spheres of human activity...
11 KB (1,339 words) - 17:02, 23 February 2025
Side-channel attack (category Cryptographic attacks)
protocol or algorithm itself (e.g. flaws found in a cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights...
31 KB (3,618 words) - 07:13, 16 February 2025
Transposition cipher (redirect from Transposition (cryptography))
In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
25 KB (3,604 words) - 12:24, 11 March 2025
Identicon (redirect from Visual hash)
An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of avatar...
5 KB (455 words) - 07:50, 16 April 2025
Hardcore (section Visual media)
semiconductor intellectual property core Hard-core predicate, a concept in cryptography Hard Corps (disambiguation) All pages with titles beginning with Hardcore...
3 KB (330 words) - 01:07, 14 August 2024
computation Quantum cryptography, a variety of cryptography employing quantum mechanics or quantum computers Quartz Composer, a node-based visual programming...
1 KB (199 words) - 19:26, 22 July 2024
Java KeyStore (category Public-key cryptography)
Keyring (cryptography) Public key infrastructure The keytool Command - a key and certificate management utility CERTivity - A multi-platform visual tool for...
2 KB (163 words) - 21:30, 19 February 2024
Warburg and Friedländer opine that the sketches likely reflect an immediate visual experience, because, among other reasons, from a retrospective point-of-view...
308 KB (33,765 words) - 01:32, 24 March 2025
of Evolutionary Paleobiology at Cambridge University 29 January 2004 Cryptography Simon Singh, science writer and author of The Code Book: The Secret History...
457 KB (296 words) - 21:55, 1 May 2025
difluoride, see: 1,1-Difluoroethylene Verifiable Delay Function, in cryptography This disambiguation page lists articles associated with the title VDF...
510 bytes (79 words) - 22:33, 13 June 2024
List of educational software (section Cryptography)
- Java Formal language and Automata Package CrypTool - illustrates cryptographic and cryptanalytic concepts Britannica Encarta Encyclopædia Britannica...
6 KB (384 words) - 20:38, 30 March 2025
Public key certificate (redirect from Certificate (cryptography))
In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity...
49 KB (5,677 words) - 14:49, 30 April 2025
Cryptol (category Cryptographic software)
Cryptol is a domain-specific programming language for cryptography developed by the Portland, Oregon based software development firm, Galois, Inc. It is...
4 KB (260 words) - 01:08, 23 September 2024
In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric. MISTY1 is one of the selected...
5 KB (455 words) - 14:35, 30 July 2023