Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
12 KB (1,411 words) - 09:59, 24 June 2025
Binary image (section Visual cryptography)
several generalizations of the basic scheme including k-out-of-n visual cryptography, and using opaque sheets but illuminating them by multiple sets of...
16 KB (1,756 words) - 23:16, 1 May 2025
Indistinguishability obfuscation Multivariate cryptography Post-quantum cryptography Quantum cryptography Steganography Visual cryptography Chaotic cryptology Japanese...
20 KB (1,901 words) - 17:17, 17 July 2025
against chosen ciphertext attack and creating non-malleable cryptography, visual cryptography (with Adi Shamir), and suggesting various methods for verifying...
8 KB (676 words) - 21:14, 25 July 2025
Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
66 KB (2,911 words) - 02:58, 27 July 2025
contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the...
11 KB (808 words) - 13:17, 17 June 2025
watermark – Electronic identifier embedded in an audio signal Visual cryptography – Cryptographic technique Security printing – Field of the printing industry...
52 KB (6,092 words) - 20:53, 17 July 2025
Secret sharing (category Cryptography)
remainder theorem Secure multiparty computation Shamir's secret sharing Visual cryptography Shamir, Adi (1 November 1979). "How to share a secret" (PDF). Communications...
28 KB (3,790 words) - 09:49, 24 June 2025
Alice and Bob (redirect from Characters in cryptography)
fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature...
24 KB (2,026 words) - 20:47, 18 June 2025
End-to-end auditable voting (redirect from Cryptographic voting system)
cast appropriately and that the votes are accurately tallied using visual cryptography. After the voter selects their candidates, a voting machine prints...
25 KB (2,760 words) - 20:06, 18 June 2025
Cipher (category Cryptography)
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
18 KB (2,152 words) - 16:42, 23 July 2025
Man-in-the-middle attack (category Cryptographic attacks)
In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly...
23 KB (2,560 words) - 23:17, 28 July 2025
The tables below compare cryptography libraries that deal with cryptography algorithms and have application programming interface (API) function calls...
46 KB (1,559 words) - 11:29, 3 August 2025
Amitabha; Paul, Sanjoy (July 2010). "Watermarking video content using visual cryptography and scene averaged image". 2010 IEEE International Conference on...
6 KB (523 words) - 23:59, 1 May 2024
of any unsigned puzzle. The puzzles focused heavily on data security, cryptography, steganography, and Internet anonymity. It has been called "the most...
19 KB (1,737 words) - 09:39, 2 August 2025
Identicon (redirect from Visual hash)
An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of avatar...
5 KB (451 words) - 01:22, 20 May 2025
Reference (redirect from Visual reference)
used that intentionally hide the reference from some observers, as in cryptography.[citation needed] References feature in many spheres of human activity...
11 KB (1,339 words) - 08:52, 3 August 2025
Transposition cipher (redirect from Transposition (cryptography))
In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
27 KB (3,838 words) - 08:23, 5 June 2025
computation Quantum cryptography, a variety of cryptography employing quantum mechanics or quantum computers Quartz Composer, a node-based visual programming...
1 KB (199 words) - 19:26, 22 July 2024
Side-channel attack (category Cryptographic attacks)
information. These attacks differ from those targeting flaws in the design of cryptographic protocols or algorithms. (Cryptanalysis may identify vulnerabilities...
32 KB (3,647 words) - 21:01, 25 July 2025
updating the System.Security.Cryptography APIs to support the Windows CNG cryptography APIs [...] since it supports modern cryptography algorithms [Suite B Support]...
64 KB (6,766 words) - 02:43, 16 June 2025
Java KeyStore (category Public-key cryptography)
Keyring (cryptography) Public key infrastructure The keytool Command - a key and certificate management utility CERTivity - A multi-platform visual tool for...
2 KB (163 words) - 21:30, 19 February 2024
Decorrelation (section Cryptography)
temporal (handling of movement in the lateral geniculate nucleus). In cryptography, decorrelation is used in cipher design (see Decorrelation theory) and...
4 KB (457 words) - 06:59, 30 July 2025
June 23, 2025. Retrieved June 25, 2025. "Get ahead with quantum-secure cryptography - WWDC25 - Videos". Apple Developer. Retrieved July 6, 2025. Cunningham...
24 KB (2,592 words) - 09:05, 4 August 2025
Warburg and Friedländer opine that the sketches likely reflect an immediate visual experience, because, among other reasons, from a retrospective point-of-view...
308 KB (33,765 words) - 15:46, 23 May 2025
of Evolutionary Paleobiology at Cambridge University 29 January 2004 Cryptography Simon Singh, science writer and author of The Code Book: The Secret History...
461 KB (296 words) - 19:33, 15 July 2025
CrypTool (category Cryptography contests)
with C#/.NET/WPF) (abbreviated CT2) uses the concept of visual programming to clarify cryptographic processes. Currently, CT2 contains more than 150 crypto...
8 KB (616 words) - 21:59, 29 June 2025
List of educational software (section Cryptography)
Khan Academy Microsoft Copilot Bouncy Castle CrypTool - illustrates cryptographic and cryptanalytic concepts Britannica Encarta Encyclopædia Britannica...
18 KB (721 words) - 03:32, 1 August 2025
Crypto++ (category Cryptographic software)
libcrypto++, and libcryptopp) is a free and open-source C++ class library of cryptographic algorithms and schemes written by Wei Dai. Crypto++ has been widely...
19 KB (1,321 words) - 09:26, 22 July 2025
heavy metal/punk rock band Shintenchi Kaibyaku Shudan: Zigzag, a japanese visual-kei band ZigZag (magazine), a UK rock music magazine Zig Zag (manga), a...
5 KB (610 words) - 00:00, 9 February 2025