Below is a timeline of notable events related to cryptography. 36th century – The Sumerians develop cuneiform writing and the Egyptians develop hieroglyphic...
16 KB (2,012 words) - 04:24, 24 July 2025
of the Caesar cipher which was developed in ancient Rome, used by Julius Caesar in the 1st century BC. An early entry on the Timeline of cryptography...
19 KB (2,089 words) - 09:15, 13 July 2025
Cryptography, the use of codes and ciphers, began thousands of years ago. Until recent decades, it has been the story of what might be called classical...
53 KB (6,893 words) - 22:53, 28 July 2025
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
82 KB (9,126 words) - 16:08, 3 June 2025
Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
66 KB (2,911 words) - 02:58, 27 July 2025
operating systems Timeline of programming languages Timeline of artificial intelligence Timeline of cryptography Timeline of algorithms Timeline of quantum computing...
5 KB (403 words) - 00:14, 27 June 2025
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
67 KB (6,893 words) - 20:11, 29 July 2025
alternative history or timeline. The many-worlds interpretation uses decoherence to explain the measurement process and the emergence of a quasi-classical...
70 KB (8,393 words) - 00:51, 3 August 2025
Wave interference (redirect from Interference of waves)
is equal to the vector sum of the amplitudes of the individual waves. If a crest of a wave meets a crest of another wave of the same frequency at the same...
34 KB (4,646 words) - 18:00, 12 July 2025
force acting on the macroscopic boundaries of a confined space which arises from the quantum fluctuations of a field. The term Casimir pressure is sometimes...
64 KB (8,105 words) - 18:03, 2 July 2025
Quantum mind (category Theory of mind)
The quantum mind or quantum consciousness is a group of hypotheses proposing that local physical laws and interactions from classical mechanics or connections...
70 KB (7,911 words) - 19:45, 18 July 2025
Key size (redirect from Cryptography/key length)
In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines...
29 KB (3,225 words) - 14:31, 21 June 2025
event. In the course of developing this experiment, he coined the term Verschränkung (entanglement). According to historian of science Robert P. Crease...
9 KB (739 words) - 03:51, 25 May 2025
of mathematical concepts that generalize geometry to describe physical phenomena at distance scales comparable to the Planck length. Each theory of quantum...
3 KB (353 words) - 16:47, 23 May 2025
Scattering (redirect from Scattering of electromagnetic radiation)
In physics, scattering is a wide range of physical processes where moving particles or radiation of some form, such as light or sound, are forced to deviate...
30 KB (3,725 words) - 17:58, 23 July 2025
generalizes the stationary action principle of classical mechanics. It replaces the classical notion of a single, unique classical trajectory for a system...
86 KB (14,277 words) - 08:57, 19 May 2025
notion of limits. The two types of calculus in quantum calculus are q-calculus and h-calculus. The goal of both types is to find "analogs" of mathematical...
6 KB (1,155 words) - 14:46, 20 May 2025
surface of a crystal of nickel metal, displayed a diffraction pattern. This confirmed the hypothesis, advanced by Louis de Broglie in 1924, of wave-particle...
19 KB (2,242 words) - 17:16, 23 May 2025
Rydberg formula (category History of physics)
calculates the wavelengths of a spectral line in many chemical elements. The formula was primarily presented as a generalization of the Balmer series for all...
13 KB (1,900 words) - 18:29, 23 June 2025
This is a list of notable textbooks on classical mechanics and quantum mechanics arranged according to level and surnames of the authors in alphabetical...
12 KB (999 words) - 05:09, 18 July 2025
list of timelines of events over the period of World War II. Timeline of events preceding World War II Timeline of World War II (1939) Timeline of World...
3 KB (318 words) - 03:10, 23 May 2025
Klein–Gordon equation (category Equations of physics)
field into momentum space, the solution is usually written in terms of a superposition of plane waves whose energy and momentum obey the energy-momentum dispersion...
38 KB (6,564 words) - 16:36, 17 June 2025
Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations...
6 KB (624 words) - 17:34, 27 February 2025
Quantum chaos (section Correlating statistical descriptions of quantum mechanics with classical behaviour)
Quantum chaos is a branch of physics focused on how chaotic classical dynamical systems can be described in terms of quantum theory. The primary question...
35 KB (4,340 words) - 08:44, 25 May 2025
Quantum Bayesianism (redirect from Bayesian interpretation of quantum mechanics)
philosophy of physics, quantum Bayesianism is a collection of related approaches to the interpretation of quantum mechanics, the most prominent of which is...
70 KB (8,326 words) - 16:45, 18 July 2025
The timeline of historic inventions is a chronological list of particularly significant technological inventions and their inventors, where known. This...
254 KB (25,784 words) - 23:23, 4 August 2025
cipher mode of operation Stream cipher Key (cryptography) Key size Cryptographic key types Symmetric-key cryptography Public-key cryptography (sometimes...
18 KB (1,725 words) - 16:02, 28 July 2025
classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for secure communication,...
5 KB (720 words) - 06:35, 18 August 2024
This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware...
71 KB (7,760 words) - 09:59, 30 July 2025
Michele Mosca (category Academic staff of the University of Waterloo)
ca. 2025-03-07. Retrieved 2025-04-09. "NIST publishes timeline for quantum-resistant cryptography, but enterprises must move faster". CSO Online. Retrieved...
9 KB (920 words) - 13:01, 30 June 2025