• Thumbnail for Visual cryptography
    Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
    12 KB (1,411 words) - 09:59, 24 June 2025
  • Thumbnail for Binary image
    several generalizations of the basic scheme including k-out-of-n visual cryptography, and using opaque sheets but illuminating them by multiple sets of...
    16 KB (1,756 words) - 23:16, 1 May 2025
  • Indistinguishability obfuscation Multivariate cryptography Post-quantum cryptography Quantum cryptography Steganography Visual cryptography Chaotic cryptology Japanese...
    20 KB (1,901 words) - 17:17, 17 July 2025
  • Thumbnail for Moni Naor
    against chosen ciphertext attack and creating non-malleable cryptography, visual cryptography (with Adi Shamir), and suggesting various methods for verifying...
    8 KB (676 words) - 21:14, 25 July 2025
  • Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
    66 KB (2,911 words) - 02:58, 27 July 2025
  • Thumbnail for Adi Shamir
    contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the...
    11 KB (808 words) - 13:17, 17 June 2025
  • watermark – Electronic identifier embedded in an audio signal Visual cryptography – Cryptographic technique Security printing – Field of the printing industry...
    52 KB (6,092 words) - 20:53, 17 July 2025
  • Thumbnail for Secret sharing
    Secret sharing (category Cryptography)
    remainder theorem Secure multiparty computation Shamir's secret sharing Visual cryptography Shamir, Adi (1 November 1979). "How to share a secret" (PDF). Communications...
    28 KB (3,790 words) - 09:49, 24 June 2025
  • Thumbnail for Alice and Bob
    fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature...
    24 KB (2,026 words) - 20:47, 18 June 2025
  • cast appropriately and that the votes are accurately tallied using visual cryptography. After the voter selects their candidates, a voting machine prints...
    25 KB (2,760 words) - 20:06, 18 June 2025
  • Thumbnail for Cipher
    Cipher (category Cryptography)
    In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
    18 KB (2,152 words) - 16:42, 23 July 2025
  • Man-in-the-middle attack (category Cryptographic attacks)
    In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly...
    23 KB (2,560 words) - 23:17, 28 July 2025
  • The tables below compare cryptography libraries that deal with cryptography algorithms and have application programming interface (API) function calls...
    46 KB (1,559 words) - 11:29, 3 August 2025
  • Thumbnail for Sanjoy Paul
    Amitabha; Paul, Sanjoy (July 2010). "Watermarking video content using visual cryptography and scene averaged image". 2010 IEEE International Conference on...
    6 KB (523 words) - 23:59, 1 May 2024
  • Thumbnail for Cicada 3301
    of any unsigned puzzle. The puzzles focused heavily on data security, cryptography, steganography, and Internet anonymity. It has been called "the most...
    19 KB (1,737 words) - 09:39, 2 August 2025
  • Thumbnail for Identicon
    Identicon (redirect from Visual hash)
    An Identicon is a visual representation of a hash value, usually of an IP address, that serves to identify a user of a computer system as a form of avatar...
    5 KB (451 words) - 01:22, 20 May 2025
  • Reference (redirect from Visual reference)
    used that intentionally hide the reference from some observers, as in cryptography.[citation needed] References feature in many spheres of human activity...
    11 KB (1,339 words) - 08:52, 3 August 2025
  • Thumbnail for Transposition cipher
    In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
    27 KB (3,838 words) - 08:23, 5 June 2025
  • computation Quantum cryptography, a variety of cryptography employing quantum mechanics or quantum computers Quartz Composer, a node-based visual programming...
    1 KB (199 words) - 19:26, 22 July 2024
  • Side-channel attack (category Cryptographic attacks)
    information. These attacks differ from those targeting flaws in the design of cryptographic protocols or algorithms. (Cryptanalysis may identify vulnerabilities...
    32 KB (3,647 words) - 21:01, 25 July 2025
  • Thumbnail for .NET Framework version history
    updating the System.Security.Cryptography APIs to support the Windows CNG cryptography APIs [...] since it supports modern cryptography algorithms [Suite B Support]...
    64 KB (6,766 words) - 02:43, 16 June 2025
  • Java KeyStore (category Public-key cryptography)
    Keyring (cryptography) Public key infrastructure The keytool Command - a key and certificate management utility CERTivity - A multi-platform visual tool for...
    2 KB (163 words) - 21:30, 19 February 2024
  • temporal (handling of movement in the lateral geniculate nucleus). In cryptography, decorrelation is used in cipher design (see Decorrelation theory) and...
    4 KB (457 words) - 06:59, 30 July 2025
  • June 23, 2025. Retrieved June 25, 2025. "Get ahead with quantum-secure cryptography - WWDC25 - Videos". Apple Developer. Retrieved July 6, 2025. Cunningham...
    24 KB (2,592 words) - 09:05, 4 August 2025
  • Thumbnail for Cultural depictions of Maximilian I, Holy Roman Emperor
    Warburg and Friedländer opine that the sketches likely reflect an immediate visual experience, because, among other reasons, from a retrospective point-of-view...
    308 KB (33,765 words) - 15:46, 23 May 2025
  • of Evolutionary Paleobiology at Cambridge University 29 January 2004 Cryptography Simon Singh, science writer and author of The Code Book: The Secret History...
    461 KB (296 words) - 19:33, 15 July 2025
  • Thumbnail for CrypTool
    CrypTool (category Cryptography contests)
    with C#/.NET/WPF) (abbreviated CT2) uses the concept of visual programming to clarify cryptographic processes. Currently, CT2 contains more than 150 crypto...
    8 KB (616 words) - 21:59, 29 June 2025
  • Khan Academy Microsoft Copilot Bouncy Castle CrypTool - illustrates cryptographic and cryptanalytic concepts Britannica Encarta Encyclopædia Britannica...
    18 KB (721 words) - 03:32, 1 August 2025
  • Crypto++ (category Cryptographic software)
    libcrypto++, and libcryptopp) is a free and open-source C++ class library of cryptographic algorithms and schemes written by Wei Dai. Crypto++ has been widely...
    19 KB (1,321 words) - 09:26, 22 July 2025
  • heavy metal/punk rock band Shintenchi Kaibyaku Shudan: Zigzag, a japanese visual-kei band ZigZag (magazine), a UK rock music magazine Zig Zag (manga), a...
    5 KB (610 words) - 00:00, 9 February 2025