From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

Period: 2024-06-01 to 2024-06-30

Total views: 5,874,384

Updated: 03:24, 6 July 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 563,737 18,791 B High
2 Telegram (software) 369,042 12,301 B Mid
3 WikiLeaks 281,653 9,388 B Low
4 Alan Turing 274,874 9,162 GA Top
5 Bitcoin 155,526 5,184 B High
6 The Imitation Game 107,601 3,586 C Mid
7 Tor (network) 88,716 2,957 B Mid
8 Cryptocurrency 83,537 2,784 C High
9 Blockchain 79,796 2,659 B High
10 Enigma machine 69,780 2,326 C High
11 Transport Layer Security 66,528 2,217 B Top
12 National Security Agency 61,696 2,056 C High
13 Voynich manuscript 59,796 1,993 B Low
14 HTTPS 54,284 1,809 C High
15 Diffie–Hellman key exchange 51,953 1,731 C Top
16 Joan Clarke 48,818 1,627 C Mid
17 RSA (cryptosystem) 46,886 1,562 C Top
18 Virtual private network 43,607 1,453 C Mid
19 Advanced Encryption Standard 42,788 1,426 B Top
20 HTTP Strict Transport Security 39,597 1,319 C Low
21 Cryptography 37,937 1,264 C Top
22 MD5 36,223 1,207 C Top
23 SHA-2 35,745 1,191 C Top
24 Signal (messaging app) 35,330 1,177 C Mid
25 Darknet market 35,057 1,168 B Mid
26 Secure Shell 34,316 1,143 C High
27 Public-key cryptography 31,313 1,043 C Top
28 Changpeng Zhao 30,898 1,029 Start Low
29 Vault 7 30,741 1,024 C Mid
30 Block cipher mode of operation 30,610 1,020 C Top
31 Man-in-the-middle attack 28,010 933 C Mid
32 Bletchley Park 27,008 900 B High
33 Dogecoin 26,482 882 C Low
34 GCHQ 26,296 876 B Low
35 History of bitcoin 26,256 875 C Low
36 Digital signature 25,358 845 C Top
37 Kryptos 24,260 808 C Low
38 Caesar cipher 23,841 794 FA High
39 HMAC 23,621 787 C High
40 Vitalik Buterin 23,163 772 C Low
41 Vigenère cipher 23,153 771 B Low
42 Keychain (software) 22,864 762 Start Unknown
43 Information theory 22,678 755 B Top
44 Zimmermann Telegram 22,646 754 B High
45 Password 22,294 743 C Top
46 Cryptographic hash function 22,271 742 C Top
47 Steganography 21,562 718 B High
48 Cryptanalysis of the Enigma 21,538 717 C Mid
49 Proton Mail 21,298 709 C Low
50 Knapsack problem 20,692 689 C Mid
51 Claude Shannon 20,266 675 C Top
52 SHA-1 20,134 671 C Top
53 Active Directory 20,079 669 C Low
54 Pretty Good Privacy 19,979 665 B High
55 Sator Square 19,685 656 B Low
56 Zero-knowledge proof 19,379 645 C Top
57 Rainbow table 19,169 638 C High
58 Trusted Platform Module 18,758 625 C Mid
59 Encryption 18,655 621 C Top
60 Certificate authority 18,052 601 C High
61 Merkle tree 18,008 600 C Mid
62 Information security 17,778 592 B Top
63 Letter frequency 17,757 591 B Low
64 Wi-Fi Protected Access 17,363 578 C Mid
65 NordVPN 17,360 578 C Mid
66 Elliptic-curve cryptography 17,183 572 C High
67 Cipher 17,041 568 C Top
68 Gordon Welchman 16,717 557 C Low
69 Post-quantum cryptography 16,691 556 C High
70 ROT13 16,343 544 C Mid
71 Bombe 15,746 524 B Mid
72 Code talker 15,407 513 B Low
73 Kerberos (protocol) 15,099 503 C High
74 Public key infrastructure 15,067 502 C Top
75 One-time pad 14,909 496 C Top
76 Digital rights management 14,615 487 B High
77 One-time password 14,558 485 C Mid
78 Homomorphic encryption 14,129 470 C High
79 Phone hacking 13,674 455 Start Mid
80 Ultra (cryptography) 13,308 443 C High
81 Secure Hash Algorithms 13,217 440 Start High
82 Elliptic Curve Digital Signature Algorithm 12,878 429 C High
83 Salt (cryptography) 12,776 425 Start High
84 Bcrypt 12,697 423 C Mid
85 Galois/Counter Mode 12,260 408 C Mid
86 SHA-3 12,136 404 Start Mid
87 Data Encryption Standard 11,988 399 C Top
88 Public key certificate 11,519 383 C Top
89 SSH File Transfer Protocol 11,516 383 Start Unknown
90 OpenVPN 11,402 380 C Mid
91 Symmetric-key algorithm 11,197 373 Start Top
92 .onion 11,166 372 C Low
93 Alice and Bob 10,972 365 Start Low
94 Colossus computer 10,861 362 B Mid
95 Brute-force attack 10,753 358 C High
96 Shiba Inu (cryptocurrency) 10,731 357 Start Low
97 Authentication 10,503 350 C High
98 Grover's algorithm 10,286 342 C Mid
99 OpenSSL 10,219 340 B High
100 Integer factorization 10,073 335 B Mid
101 Link 16 9,949 331 Start Low
102 Mullvad 9,904 330 Start Low
103 Theoretical computer science 9,883 329 B Low
104 Conel Hugh O'Donel Alexander 9,851 328 Start Low
105 Forward secrecy 9,702 323 C High
106 PBKDF2 9,676 322 C Low
107 InterPlanetary File System 9,561 318 C Low
108 Substitution cipher 9,481 316 Unknown Unknown
109 Pay television 9,445 314 Start Unknown
110 Cypherpunk 9,351 311 C Mid
111 Comparison of BitTorrent clients 9,162 305 List Low
112 Differential privacy 9,079 302 C Unknown
113 Cryptanalysis 9,074 302 C High
114 Authenticated encryption 8,900 296 C Mid
115 Cryptonomicon 8,802 293 C Low
116 Fort Meade 8,745 291 C Low
117 Cryptographic nonce 8,583 286 Start High
118 The Tor Project 8,525 284 C Mid
119 Message authentication code 8,418 280 C Top
120 Shamir's secret sharing 8,367 278 C High
121 Beale ciphers 8,327 277 B Low
122 Quantum key distribution 8,317 277 B Mid
123 Tails (operating system) 8,219 273 Start Low
124 EdDSA 8,143 271 C High
125 I2P 8,139 271 B Low
126 Bitwarden 8,028 267 C Low
127 Apple–FBI encryption dispute 7,996 266 C Low
128 ChaCha20-Poly1305 7,863 262 C Low
129 Birthday attack 7,739 257 C High
130 VeraCrypt 7,713 257 C Mid
131 Elliptic-curve Diffie–Hellman 7,621 254 Start Mid
132 Cryptographically secure pseudorandom number generator 7,581 252 C Top
133 Babington Plot 7,518 250 C Low
134 3-D Secure 7,327 244 Start Low
135 Lorenz cipher 7,297 243 C Top
136 Curve25519 7,277 242 C High
137 Citizenfour 7,218 240 C Low
138 Proof of stake 7,189 239 Start Low
139 Decentralized finance 7,140 238 Start Low
140 Password manager 7,114 237 C Low
141 Matrix (protocol) 7,090 236 Start Unknown
142 Discrete logarithm 7,030 234 C Mid
143 Side-channel attack 7,019 233 C High
144 Argon2 7,007 233 C Mid
145 PKCS 12 6,761 225 Start Unknown
146 Triple DES 6,740 224 Start Unknown
147 Password strength 6,739 224 C High
148 Digital Signature Algorithm 6,701 223 C Top
149 Certificate signing request 6,553 218 C Low
150 Cryptogram 6,549 218 C Mid
151 KeePass 6,463 215 C Low
152 Quantum cryptography 6,445 214 C High
153 IMSI-catcher 6,371 212 Start Mid
154 RC4 6,363 212 B Top
155 Cipher suite 6,274 209 C Top
156 Playfair cipher 6,255 208 Unknown Unknown
157 Confidentiality 6,161 205 C Low
158 Password cracking 6,138 204 C Mid
159 FIPS 140-2 6,120 204 C Mid
160 Bitcoin Cash 6,119 203 Start Low
161 RSA Security 6,111 203 C Unknown
162 Blockchain game 6,095 203 Start Low
163 Digest access authentication 6,093 203 B Low
164 Hyphanet 6,084 202 B Mid
165 Key derivation function 6,034 201 C Low
166 Secure multi-party computation 5,987 199 Start High
167 Self-signed certificate 5,879 195 Start Unknown
168 Qubes OS 5,872 195 C Mid
169 Marian Rejewski 5,870 195 FA Mid
170 GNU Privacy Guard 5,834 194 C Unknown
171 Kerckhoffs's principle 5,780 192 Start Mid
172 Utah Data Center 5,747 191 C Mid
173 Litecoin 5,731 191 Start Low
174 Block cipher 5,690 189 C Top
175 Units of information 5,625 187 C Unknown
176 Transposition cipher 5,609 186 Unknown Unknown
177 Wired Equivalent Privacy 5,600 186 C Mid
178 Root certificate 5,546 184 Start Low
179 Richard Teng 5,544 184 Start Low
180 Signal Protocol 5,522 184 C High
181 Bitconnect 5,482 182 C Low
182 Dual EC DRBG 5,468 182 C High
183 Deniable encryption 5,467 182 Start High
184 Lavarand 5,461 182 Start Mid
185 Automatic Certificate Management Environment 5,432 181 Start Low
186 Salsa20 5,428 180 C Top
187 Tap code 5,421 180 Start Low
188 ElGamal encryption 5,375 179 Start Top
189 Mutual authentication 5,345 178 Stub Low
190 Datagram Transport Layer Security 5,200 173 Start Mid
191 Rijndael S-box 5,162 172 Start Low
192 OpenSSH 5,124 170 C High
193 11B-X-1371 5,120 170 GA Low
194 Key (cryptography) 5,116 170 Start Unknown
195 Electronic signature 5,116 170 C Low
196 Illegal number 5,102 170 C Low
197 Blowfish (cipher) 5,086 169 B High
198 Entrust 4,976 165 Start Low
199 Stream cipher 4,951 165 Start Top
200 Initialization vector 4,866 162 C High
201 AES instruction set 4,850 161 C Low
202 KeePassXC 4,818 160 Start Low
203 Padding (cryptography) 4,747 158 Start Unknown
204 Bitcoin Core 4,741 158 Start Low
205 BLAKE (hash function) 4,718 157 C Mid
206 Lattice-based cryptography 4,717 157 Start Low
207 Boolean function 4,597 153 Start Mid
208 Commitment scheme 4,544 151 C High
209 Directory service 4,527 150 Start Mid
210 Bomba (cryptography) 4,480 149 Start Low
211 Adi Shamir 4,448 148 Start Unknown
212 XOR cipher 4,442 148 Stub Mid
213 The Doughnut 4,408 146 GA High
214 Replay attack 4,359 145 C Top
215 Certificate revocation list 4,307 143 C Low
216 Known-plaintext attack 4,286 142 Start High
217 Ciphertext 4,279 142 Start High
218 PKCS 4,216 140 List High
219 Supply chain attack 4,209 140 C Low
220 RSA SecurID 4,139 137 Unknown Unknown
221 History of cryptography 4,139 137 Start High
222 Challenge–response authentication 4,127 137 Start Mid
223 Privacy-Enhanced Mail 4,036 134 Start Low
224 Non-repudiation 4,031 134 Start Mid
225 Plaintext 4,029 134 Start High
226 Diplomatic bag 4,010 133 Start Low
227 Special Collection Service 3,999 133 C Low
228 AES key schedule 3,995 133 Start Low
229 Key size 3,961 132 C High
230 Communications Security Establishment 3,952 131 C Mid
231 One-way function 3,943 131 Start Top
232 Web of trust 3,901 130 C High
233 Session (software) 3,898 129 Start Low
234 DNS-based Authentication of Named Entities 3,895 129 C Mid
235 Cryptographic protocol 3,849 128 Start High
236 Polkadot (cryptocurrency) 3,786 126 Start Low
237 Alastair Denniston 3,717 123 Start Unknown
238 TrueCrypt 3,703 123 C Mid
239 Fork (blockchain) 3,688 122 Start Mid
240 Cold boot attack 3,670 122 C Low
241 Frequency analysis 3,609 120 C High
242 Disk encryption 3,604 120 C High
243 Criticism of Dropbox 3,545 118 B Low
244 NIST Post-Quantum Cryptography Standardization 3,440 114 C Mid
245 Ricky McCormick's encrypted notes 3,436 114 B Low
246 Feistel cipher 3,428 114 Start Unknown
247 K-anonymity 3,417 113 Start Mid
248 Padding oracle attack 3,408 113 Stub Unknown
249 Bruce Schneier 3,390 113 Start High
250 Polybius square 3,389 112 Start Mid
251 Avalanche effect 3,383 112 Start High
252 Whitfield Diffie 3,377 112 B High
253 PKCS 11 3,362 112 Unknown Unknown
254 WebTorrent 3,355 111 Start Unknown
255 Harvest now, decrypt later 3,343 111 Start Low
256 PKCS 1 3,320 110 C Mid
257 Type B Cipher Machine 3,301 110 Start Low
258 PKCS 7 3,295 109 Start Low
259 Digital watermarking 3,285 109 B Mid
260 Bacon's cipher 3,282 109 Start Low
261 Australian Signals Directorate 3,261 108 C Low
262 SipHash 3,228 107 Start Low
263 Dilly Knox 3,219 107 B Unknown
264 Threema 3,190 106 C Unknown
265 Rail fence cipher 3,188 106 Start Low
266 Timing attack 3,163 105 C High
267 Subject Alternative Name 3,158 105 Stub Mid
268 List of ciphertexts 3,153 105 List Low
269 Adam Back 3,126 104 Start Low
270 Optimal asymmetric encryption padding 3,081 102 Start High
271 Merkle–Damgård construction 3,069 102 C Unknown
272 Elizebeth Smith Friedman 3,060 102 C Mid
273 Whonix 3,059 101 Start Mid
274 Non-interactive zero-knowledge proof 3,055 101 Start Low
275 Cryptocurrency tumbler 3,052 101 Start Unknown
276 Elliptic curve point multiplication 3,046 101 C Mid
277 Polyalphabetic cipher 3,003 100 Start Unknown
278 Scrambler 3,001 100 C Unknown
279 Book cipher 2,983 99 C Low
280 Daniel J. Bernstein 2,973 99 C Mid
281 Key exchange 2,961 98 Start Unknown
282 Length extension attack 2,957 98 Start Unknown
283 Dictionary attack 2,899 96 C Unknown
284 Bitcoin scalability problem 2,882 96 C Low
285 Communications security 2,874 95 Start Mid
286 S-box 2,871 95 Start Top
287 Collision attack 2,857 95 Start High
288 Atbash 2,852 95 Stub Low
289 Digital renminbi 2,840 94 B High
290 Crypto-anarchy 2,837 94 Start High
291 Clipper chip 2,832 94 C High
292 Disk encryption theory 2,822 94 C Unknown
293 Hill cipher 2,806 93 Unknown Unknown
294 William Binney (intelligence official) 2,790 93 Start Mid
295 IEEE 802.11i-2004 2,774 92 C Mid
296 Certificate Transparency 2,768 92 C High
297 I. J. Good 2,744 91 C Low
298 Crypto AG 2,744 91 C High
299 Copiale cipher 2,734 91 Start Low
300 Data at rest 2,708 90 C Mid
301 Schnorr signature 2,695 89 C High
302 Code signing 2,692 89 C Low
303 Affine cipher 2,680 89 C Low
304 Hashcash 2,675 89 Start Unknown
305 PKCS 8 2,637 87 Stub Unknown
306 Encrypting File System 2,620 87 B Unknown
307 Authenticator 2,619 87 Start Unknown
308 Preimage attack 2,615 87 Stub Unknown
309 Quantum network 2,614 87 C Low
310 HKDF 2,611 87 Start Unknown
311 Wildcard certificate 2,607 86 Start Unknown
312 BB84 2,605 86 Start Low
313 David Chaum 2,604 86 C Low
314 Magic (cryptography) 2,585 86 Start Unknown
315 Comparison of SSH clients 2,533 84 List Low
316 HTTP Public Key Pinning 2,504 83 C Mid
317 Pre-shared key 2,494 83 Start Mid
318 Len Sassaman 2,489 82 Start Unknown
319 Trapdoor function 2,479 82 Start High
320 Comparison of disk encryption software 2,477 82 List High
321 Export of cryptography from the United States 2,455 81 C Unknown
322 Enigma rotor details 2,437 81 Start Mid
323 Data anonymization 2,434 81 Start Mid
324 Reception and criticism of WhatsApp security and privacy features 2,375 79 C Low
325 DNS Certification Authority Authorization 2,348 78 GA Low
326 Twofish 2,342 78 Start High
327 Martin Hellman 2,338 77 Start High
328 Meet-in-the-middle attack 2,322 77 C High
329 Banburismus 2,320 77 C Low
330 Encryption software 2,317 77 Start Top
331 CCM mode 2,316 77 Start High
332 Keygen 2,308 76 C Low
333 RSA Factoring Challenge 2,305 76 Start Low
334 FIPS 140 2,300 76 Start Mid
335 Advanced Encryption Standard process 2,297 76 C Mid
336 Ralph Merkle 2,289 76 C High
337 Comparison of cryptographic hash functions 2,270 75 List Low
338 Secret sharing 2,260 75 B High
339 List of bitcoin forks 2,256 75 List Low
340 Trusted Computing 2,248 74 C Mid
341 Strong cryptography 2,237 74 Unknown Unknown
342 William F. Friedman 2,213 73 C Unknown
343 Phil Zimmermann 2,203 73 Start Mid
344 Algorand 2,200 73 B Low
345 Physical unclonable function 2,174 72 Start Unknown
346 Key management 2,173 72 Unknown Unknown
347 Off-the-record messaging 2,161 72 Start Unknown
348 Lenstra elliptic-curve factorization 2,143 71 C Low
349 Classical cipher 2,140 71 Start Top
350 Open Whisper Systems 2,136 71 B Unknown
351 AES implementations 2,120 70 List Low
352 Cryptanalysis of the Lorenz cipher 2,119 70 C High
353 Bouncy Castle (cryptography) 2,118 70 Start Unknown
354 Bullrun (decryption program) 2,108 70 B Low
355 Hash chain 2,088 69 Start Unknown
356 Pepper (cryptography) 2,074 69 Start Low
357 Filecoin 2,068 68 Stub Low
358 Comparison of cryptography libraries 2,066 68 List Unknown
359 Paillier cryptosystem 2,055 68 Start High
360 Opportunistic TLS 2,054 68 Start Mid
361 Key disclosure law 2,051 68 C Low
362 Confusion and diffusion 2,038 67 Start Mid
363 CBC-MAC 2,000 66 C High
364 Chosen-plaintext attack 1,995 66 Stub Unknown
365 MD4 1,986 66 Start Low
366 W. T. Tutte 1,972 65 C Mid
367 Zcash 1,960 65 Start Low
368 Autokey cipher 1,954 65 C Mid
369 Cryptovirology 1,948 64 Start Mid
370 Blind signature 1,947 64 C Mid
371 RSA problem 1,932 64 Start Top
372 Arthur Scherbius 1,909 63 Start Mid
373 Leo Marks 1,904 63 B Unknown
374 Dm-crypt 1,902 63 Start Low
375 Baby-step giant-step 1,901 63 C Unknown
376 FIPS 140-3 1,900 63 C Low
377 Clock drift 1,888 62 C Low
378 Privacy and blockchain 1,869 62 C Low
379 Security level 1,867 62 Stub Mid
380 Tox (protocol) 1,866 62 C Low
381 Mumble (software) 1,837 61 C Unknown
382 Double Ratchet Algorithm 1,831 61 Start Low
383 Hybrid cryptosystem 1,822 60 Start High
384 Tor2web 1,798 59 Start Low
385 Coppersmith's attack 1,793 59 B High
386 Simultaneous Authentication of Equals 1,782 59 Start High
387 Trusted timestamping 1,780 59 Start Unknown
388 Temporal Key Integrity Protocol 1,777 59 C Low
389 Orbot 1,768 58 Stub Low
390 Rijndael MixColumns 1,742 58 Start Low
391 McEliece cryptosystem 1,728 57 C High
392 Charlie Lee (computer scientist) 1,728 57 Start Low
393 Key encapsulation mechanism 1,722 57 Start High
394 Key stretching 1,717 57 Start Unknown
395 Crypto Wars 1,716 57 Start High
396 Poly1305 1,710 57 Start Top
397 Dorabella Cipher 1,706 56 Unknown Unknown
398 International Data Encryption Algorithm 1,705 56 C Unknown
399 Comparison of TLS implementations 1,700 56 List High
400 Anonymous P2P 1,697 56 C Low
401 FileVault 1,696 56 C Mid
402 One-key MAC 1,688 56 Start Low
403 Ciphertext indistinguishability 1,671 55 C High
404 Differential cryptanalysis 1,664 55 B High
405 Briar (software) 1,660 55 Start Low
406 David Wheeler (computer scientist) 1,653 55 Start Low
407 Crypt (C) 1,647 54 C High
408 Typex 1,642 54 Start Unknown
409 SecureDrop 1,642 54 Start Mid
410 Cryptographic primitive 1,618 53 Start Top
411 Advanced Access Content System 1,613 53 C Mid
412 List of things named after Alan Turing 1,611 53 List Low
413 Giovan Battista Bellaso 1,606 53 Start Low
414 Code (cryptography) 1,603 53 Start Top
415 Government Communications Security Bureau 1,594 53 B Low
416 Sichere Inter-Netzwerk Architektur 1,589 52 Stub Unknown
417 Generic Security Services Application Program Interface 1,588 52 Start Low
418 Power analysis 1,585 52 Unknown Unknown
419 ElGamal signature scheme 1,578 52 Start Top
420 ADFGVX cipher 1,566 52 Unknown Unknown
421 BLS digital signature 1,554 51 Start Mid
422 MD6 1,552 51 Start High
423 Key-agreement protocol 1,547 51 Start Top
424 Tiny Encryption Algorithm 1,522 50 Unknown Unknown
425 Challenge-Handshake Authentication Protocol 1,513 50 Start Low
426 Secure cryptoprocessor 1,511 50 C Mid
427 SIGABA 1,511 50 C High
428 Always-on DRM 1,511 50 Start Low
429 UltraViolet (website) 1,493 49 C Low
430 FreeOTP 1,491 49 Start Low
431 Information-theoretic security 1,489 49 Start Top
432 National Cryptologic Museum 1,484 49 C Mid
433 Jami (software) 1,482 49 Start Unknown
434 Roger Dingledine 1,470 49 Start Unknown
435 Multiple encryption 1,469 48 Unknown Unknown
436 Friend-to-friend 1,456 48 Start Low
437 Downgrade attack 1,453 48 Start Mid
438 Red/black concept 1,445 48 Stub Unknown
439 Integrated Encryption Scheme 1,440 48 Start Low
440 Digital signature forgery 1,430 47 Start High
441 Interactive proof system 1,428 47 Start High
442 Word square 1,428 47 C Low
443 Shugborough inscription 1,424 47 Start Low
444 Rotor machine 1,419 47 Unknown Unknown
445 Opportunistic Wireless Encryption 1,407 46 Stub Low
446 Content Authenticity Initiative 1,406 46 C Low
447 DeCSS 1,405 46 C Mid
448 PGP word list 1,405 46 Start Low
449 Proof of authority 1,401 46 Start Low
450 Null cipher 1,398 46 Stub Low
451 Secret decoder ring 1,393 46 Start Low
452 Ross J. Anderson 1,390 46 C Mid
453 ZeroNet 1,390 46 Start Low
454 Public key fingerprint 1,389 46 Start Mid
455 Random oracle 1,387 46 Start Low
456 Black Chamber 1,382 46 Unknown Unknown
457 Collision resistance 1,380 46 Start High
458 Berlekamp–Massey algorithm 1,369 45 Start Unknown
459 Codebook 1,365 45 Stub Unknown
460 Nothing-up-my-sleeve number 1,365 45 C Low
461 Hidden message 1,359 45 Start Low
462 Serpent (cipher) 1,354 45 C Low
463 Tabula recta 1,345 44 Unknown Unknown
464 SYN cookies 1,343 44 Start Unknown
465 Blum Blum Shub 1,330 44 Start High
466 SIGSALY 1,327 44 C Low
467 List of cryptographers 1,324 44 List Low
468 Operations Support Branch 1,318 43 Start Mid
469 Blaise de Vigenère 1,317 43 Start Unknown
470 LibreSSL 1,316 43 Start High
471 Two-square cipher 1,312 43 Unknown Unknown
472 Cryptome 1,310 43 C Low
473 NSAKEY 1,310 43 C High
474 One-way compression function 1,304 43 C Top
475 A5/1 1,297 43 B High
476 Key server (cryptographic) 1,297 43 Start Mid
477 Max Newman 1,289 42 B Low
478 Wiener's attack 1,283 42 B High
479 NTRUEncrypt 1,277 42 C Mid
480 RIPEMD 1,275 42 C Unknown
481 Overview of news media phone hacking scandals 1,269 42 B Low
482 Format-preserving encryption 1,268 42 Start High
483 Oblivious transfer 1,267 42 Start Unknown
484 SegWit 1,265 42 Start Low
485 Station HYPO 1,259 41 Start Low
486 Snowflake (software) 1,257 41 Start Low
487 Content Scramble System 1,250 41 Start Mid
488 Keybase 1,246 41 Start Low
489 Perfect Dark (P2P) 1,239 41 C Low
490 AES-GCM-SIV 1,222 40 Start Unknown
491 Four-square cipher 1,215 40 C Unknown
492 Proof of space 1,197 39 Start Low
493 Chosen-ciphertext attack 1,195 39 Start High
494 Fuzzy hashing 1,195 39 C Low
495 Ring signature 1,189 39 Start Mid
496 Kasiski examination 1,188 39 Unknown Unknown
497 Hash-based cryptography 1,186 39 Start Low
498 GOST (block cipher) 1,181 39 Start Mid
499 Visual cryptography 1,175 39 Unknown Unknown
500 Verifiable random function 1,174 39 Start Low
From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

Period: 2024-06-01 to 2024-06-30

Total views: 5,874,384

Updated: 03:24, 6 July 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 563,737 18,791 B High
2 Telegram (software) 369,042 12,301 B Mid
3 WikiLeaks 281,653 9,388 B Low
4 Alan Turing 274,874 9,162 GA Top
5 Bitcoin 155,526 5,184 B High
6 The Imitation Game 107,601 3,586 C Mid
7 Tor (network) 88,716 2,957 B Mid
8 Cryptocurrency 83,537 2,784 C High
9 Blockchain 79,796 2,659 B High
10 Enigma machine 69,780 2,326 C High
11 Transport Layer Security 66,528 2,217 B Top
12 National Security Agency 61,696 2,056 C High
13 Voynich manuscript 59,796 1,993 B Low
14 HTTPS 54,284 1,809 C High
15 Diffie–Hellman key exchange 51,953 1,731 C Top
16 Joan Clarke 48,818 1,627 C Mid
17 RSA (cryptosystem) 46,886 1,562 C Top
18 Virtual private network 43,607 1,453 C Mid
19 Advanced Encryption Standard 42,788 1,426 B Top
20 HTTP Strict Transport Security 39,597 1,319 C Low
21 Cryptography 37,937 1,264 C Top
22 MD5 36,223 1,207 C Top
23 SHA-2 35,745 1,191 C Top
24 Signal (messaging app) 35,330 1,177 C Mid
25 Darknet market 35,057 1,168 B Mid
26 Secure Shell 34,316 1,143 C High
27 Public-key cryptography 31,313 1,043 C Top
28 Changpeng Zhao 30,898 1,029 Start Low
29 Vault 7 30,741 1,024 C Mid
30 Block cipher mode of operation 30,610 1,020 C Top
31 Man-in-the-middle attack 28,010 933 C Mid
32 Bletchley Park 27,008 900 B High
33 Dogecoin 26,482 882 C Low
34 GCHQ 26,296 876 B Low
35 History of bitcoin 26,256 875 C Low
36 Digital signature 25,358 845 C Top
37 Kryptos 24,260 808 C Low
38 Caesar cipher 23,841 794 FA High
39 HMAC 23,621 787 C High
40 Vitalik Buterin 23,163 772 C Low
41 Vigenère cipher 23,153 771 B Low
42 Keychain (software) 22,864 762 Start Unknown
43 Information theory 22,678 755 B Top
44 Zimmermann Telegram 22,646 754 B High
45 Password 22,294 743 C Top
46 Cryptographic hash function 22,271 742 C Top
47 Steganography 21,562 718 B High
48 Cryptanalysis of the Enigma 21,538 717 C Mid
49 Proton Mail 21,298 709 C Low
50 Knapsack problem 20,692 689 C Mid
51 Claude Shannon 20,266 675 C Top
52 SHA-1 20,134 671 C Top
53 Active Directory 20,079 669 C Low
54 Pretty Good Privacy 19,979 665 B High
55 Sator Square 19,685 656 B Low
56 Zero-knowledge proof 19,379 645 C Top
57 Rainbow table 19,169 638 C High
58 Trusted Platform Module 18,758 625 C Mid
59 Encryption 18,655 621 C Top
60 Certificate authority 18,052 601 C High
61 Merkle tree 18,008 600 C Mid
62 Information security 17,778 592 B Top
63 Letter frequency 17,757 591 B Low
64 Wi-Fi Protected Access 17,363 578 C Mid
65 NordVPN 17,360 578 C Mid
66 Elliptic-curve cryptography 17,183 572 C High
67 Cipher 17,041 568 C Top
68 Gordon Welchman 16,717 557 C Low
69 Post-quantum cryptography 16,691 556 C High
70 ROT13 16,343 544 C Mid
71 Bombe 15,746 524 B Mid
72 Code talker 15,407 513 B Low
73 Kerberos (protocol) 15,099 503 C High
74 Public key infrastructure 15,067 502 C Top
75 One-time pad 14,909 496 C Top
76 Digital rights management 14,615 487 B High
77 One-time password 14,558 485 C Mid
78 Homomorphic encryption 14,129 470 C High
79 Phone hacking 13,674 455 Start Mid
80 Ultra (cryptography) 13,308 443 C High
81 Secure Hash Algorithms 13,217 440 Start High
82 Elliptic Curve Digital Signature Algorithm 12,878 429 C High
83 Salt (cryptography) 12,776 425 Start High
84 Bcrypt 12,697 423 C Mid
85 Galois/Counter Mode 12,260 408 C Mid
86 SHA-3 12,136 404 Start Mid
87 Data Encryption Standard 11,988 399 C Top
88 Public key certificate 11,519 383 C Top
89 SSH File Transfer Protocol 11,516 383 Start Unknown
90 OpenVPN 11,402 380 C Mid
91 Symmetric-key algorithm 11,197 373 Start Top
92 .onion 11,166 372 C Low
93 Alice and Bob 10,972 365 Start Low
94 Colossus computer 10,861 362 B Mid
95 Brute-force attack 10,753 358 C High
96 Shiba Inu (cryptocurrency) 10,731 357 Start Low
97 Authentication 10,503 350 C High
98 Grover's algorithm 10,286 342 C Mid
99 OpenSSL 10,219 340 B High
100 Integer factorization 10,073 335 B Mid
101 Link 16 9,949 331 Start Low
102 Mullvad 9,904 330 Start Low
103 Theoretical computer science 9,883 329 B Low
104 Conel Hugh O'Donel Alexander 9,851 328 Start Low
105 Forward secrecy 9,702 323 C High
106 PBKDF2 9,676 322 C Low
107 InterPlanetary File System 9,561 318 C Low
108 Substitution cipher 9,481 316 Unknown Unknown
109 Pay television 9,445 314 Start Unknown
110 Cypherpunk 9,351 311 C Mid
111 Comparison of BitTorrent clients 9,162 305 List Low
112 Differential privacy 9,079 302 C Unknown
113 Cryptanalysis 9,074 302 C High
114 Authenticated encryption 8,900 296 C Mid
115 Cryptonomicon 8,802 293 C Low
116 Fort Meade 8,745 291 C Low
117 Cryptographic nonce 8,583 286 Start High
118 The Tor Project 8,525 284 C Mid
119 Message authentication code 8,418 280 C Top
120 Shamir's secret sharing 8,367 278 C High
121 Beale ciphers 8,327 277 B Low
122 Quantum key distribution 8,317 277 B Mid
123 Tails (operating system) 8,219 273 Start Low
124 EdDSA 8,143 271 C High
125 I2P 8,139 271 B Low
126 Bitwarden 8,028 267 C Low
127 Apple–FBI encryption dispute 7,996 266 C Low
128 ChaCha20-Poly1305 7,863 262 C Low
129 Birthday attack 7,739 257 C High
130 VeraCrypt 7,713 257 C Mid
131 Elliptic-curve Diffie–Hellman 7,621 254 Start Mid
132 Cryptographically secure pseudorandom number generator 7,581 252 C Top
133 Babington Plot 7,518 250 C Low
134 3-D Secure 7,327 244 Start Low
135 Lorenz cipher 7,297 243 C Top
136 Curve25519 7,277 242 C High
137 Citizenfour 7,218 240 C Low
138 Proof of stake 7,189 239 Start Low
139 Decentralized finance 7,140 238 Start Low
140 Password manager 7,114 237 C Low
141 Matrix (protocol) 7,090 236 Start Unknown
142 Discrete logarithm 7,030 234 C Mid
143 Side-channel attack 7,019 233 C High
144 Argon2 7,007 233 C Mid
145 PKCS 12 6,761 225 Start Unknown
146 Triple DES 6,740 224 Start Unknown
147 Password strength 6,739 224 C High
148 Digital Signature Algorithm 6,701 223 C Top
149 Certificate signing request 6,553 218 C Low
150 Cryptogram 6,549 218 C Mid
151 KeePass 6,463 215 C Low
152 Quantum cryptography 6,445 214 C High
153 IMSI-catcher 6,371 212 Start Mid
154 RC4 6,363 212 B Top
155 Cipher suite 6,274 209 C Top
156 Playfair cipher 6,255 208 Unknown Unknown
157 Confidentiality 6,161 205 C Low
158 Password cracking 6,138 204 C Mid
159 FIPS 140-2 6,120 204 C Mid
160 Bitcoin Cash 6,119 203 Start Low
161 RSA Security 6,111 203 C Unknown
162 Blockchain game 6,095 203 Start Low
163 Digest access authentication 6,093 203 B Low
164 Hyphanet 6,084 202 B Mid
165 Key derivation function 6,034 201 C Low
166 Secure multi-party computation 5,987 199 Start High
167 Self-signed certificate 5,879 195 Start Unknown
168 Qubes OS 5,872 195 C Mid
169 Marian Rejewski 5,870 195 FA Mid
170 GNU Privacy Guard 5,834 194 C Unknown
171 Kerckhoffs's principle 5,780 192 Start Mid
172 Utah Data Center 5,747 191 C Mid
173 Litecoin 5,731 191 Start Low
174 Block cipher 5,690 189 C Top
175 Units of information 5,625 187 C Unknown
176 Transposition cipher 5,609 186 Unknown Unknown
177 Wired Equivalent Privacy 5,600 186 C Mid
178 Root certificate 5,546 184 Start Low
179 Richard Teng 5,544 184 Start Low
180 Signal Protocol 5,522 184 C High
181 Bitconnect 5,482 182 C Low
182 Dual EC DRBG 5,468 182 C High
183 Deniable encryption 5,467 182 Start High
184 Lavarand 5,461 182 Start Mid
185 Automatic Certificate Management Environment 5,432 181 Start Low
186 Salsa20 5,428 180 C Top
187 Tap code 5,421 180 Start Low
188 ElGamal encryption 5,375 179 Start Top
189 Mutual authentication 5,345 178 Stub Low
190 Datagram Transport Layer Security 5,200 173 Start Mid
191 Rijndael S-box 5,162 172 Start Low
192 OpenSSH 5,124 170 C High
193 11B-X-1371 5,120 170 GA Low
194 Key (cryptography) 5,116 170 Start Unknown
195 Electronic signature 5,116 170 C Low
196 Illegal number 5,102 170 C Low
197 Blowfish (cipher) 5,086 169 B High
198 Entrust 4,976 165 Start Low
199 Stream cipher 4,951 165 Start Top
200 Initialization vector 4,866 162 C High
201 AES instruction set 4,850 161 C Low
202 KeePassXC 4,818 160 Start Low
203 Padding (cryptography) 4,747 158 Start Unknown
204 Bitcoin Core 4,741 158 Start Low
205 BLAKE (hash function) 4,718 157 C Mid
206 Lattice-based cryptography 4,717 157 Start Low
207 Boolean function 4,597 153 Start Mid
208 Commitment scheme 4,544 151 C High
209 Directory service 4,527 150 Start Mid
210 Bomba (cryptography) 4,480 149 Start Low
211 Adi Shamir 4,448 148 Start Unknown
212 XOR cipher 4,442 148 Stub Mid
213 The Doughnut 4,408 146 GA High
214 Replay attack 4,359 145 C Top
215 Certificate revocation list 4,307 143 C Low
216 Known-plaintext attack 4,286 142 Start High
217 Ciphertext 4,279 142 Start High
218 PKCS 4,216 140 List High
219 Supply chain attack 4,209 140 C Low
220 RSA SecurID 4,139 137 Unknown Unknown
221 History of cryptography 4,139 137 Start High
222 Challenge–response authentication 4,127 137 Start Mid
223 Privacy-Enhanced Mail 4,036 134 Start Low
224 Non-repudiation 4,031 134 Start Mid
225 Plaintext 4,029 134 Start High
226 Diplomatic bag 4,010 133 Start Low
227 Special Collection Service 3,999 133 C Low
228 AES key schedule 3,995 133 Start Low
229 Key size 3,961 132 C High
230 Communications Security Establishment 3,952 131 C Mid
231 One-way function 3,943 131 Start Top
232 Web of trust 3,901 130 C High
233 Session (software) 3,898 129 Start Low
234 DNS-based Authentication of Named Entities 3,895 129 C Mid
235 Cryptographic protocol 3,849 128 Start High
236 Polkadot (cryptocurrency) 3,786 126 Start Low
237 Alastair Denniston 3,717 123 Start Unknown
238 TrueCrypt 3,703 123 C Mid
239 Fork (blockchain) 3,688 122 Start Mid
240 Cold boot attack 3,670 122 C Low
241 Frequency analysis 3,609 120 C High
242 Disk encryption 3,604 120 C High
243 Criticism of Dropbox 3,545 118 B Low
244 NIST Post-Quantum Cryptography Standardization 3,440 114 C Mid
245 Ricky McCormick's encrypted notes 3,436 114 B Low
246 Feistel cipher 3,428 114 Start Unknown
247 K-anonymity 3,417 113 Start Mid
248 Padding oracle attack 3,408 113 Stub Unknown
249 Bruce Schneier 3,390 113 Start High
250 Polybius square 3,389 112 Start Mid
251 Avalanche effect 3,383 112 Start High
252 Whitfield Diffie 3,377 112 B High
253 PKCS 11 3,362 112 Unknown Unknown
254 WebTorrent 3,355 111 Start Unknown
255 Harvest now, decrypt later 3,343 111 Start Low
256 PKCS 1 3,320 110 C Mid
257 Type B Cipher Machine 3,301 110 Start Low
258 PKCS 7 3,295 109 Start Low
259 Digital watermarking 3,285 109 B Mid
260 Bacon's cipher 3,282 109 Start Low
261 Australian Signals Directorate 3,261 108 C Low
262 SipHash 3,228 107 Start Low
263 Dilly Knox 3,219 107 B Unknown
264 Threema 3,190 106 C Unknown
265 Rail fence cipher 3,188 106 Start Low
266 Timing attack 3,163 105 C High
267 Subject Alternative Name 3,158 105 Stub Mid
268 List of ciphertexts 3,153 105 List Low
269 Adam Back 3,126 104 Start Low
270 Optimal asymmetric encryption padding 3,081 102 Start High
271 Merkle–Damgård construction 3,069 102 C Unknown
272 Elizebeth Smith Friedman 3,060 102 C Mid
273 Whonix 3,059 101 Start Mid
274 Non-interactive zero-knowledge proof 3,055 101 Start Low
275 Cryptocurrency tumbler 3,052 101 Start Unknown
276 Elliptic curve point multiplication 3,046 101 C Mid
277 Polyalphabetic cipher 3,003 100 Start Unknown
278 Scrambler 3,001 100 C Unknown
279 Book cipher 2,983 99 C Low
280 Daniel J. Bernstein 2,973 99 C Mid
281 Key exchange 2,961 98 Start Unknown
282 Length extension attack 2,957 98 Start Unknown
283 Dictionary attack 2,899 96 C Unknown
284 Bitcoin scalability problem 2,882 96 C Low
285 Communications security 2,874 95 Start Mid
286 S-box 2,871 95 Start Top
287 Collision attack 2,857 95 Start High
288 Atbash 2,852 95 Stub Low
289 Digital renminbi 2,840 94 B High
290 Crypto-anarchy 2,837 94 Start High
291 Clipper chip 2,832 94 C High
292 Disk encryption theory 2,822 94 C Unknown
293 Hill cipher 2,806 93 Unknown Unknown
294 William Binney (intelligence official) 2,790 93 Start Mid
295 IEEE 802.11i-2004 2,774 92 C Mid
296 Certificate Transparency 2,768 92 C High
297 I. J. Good 2,744 91 C Low
298 Crypto AG 2,744 91 C High
299 Copiale cipher 2,734 91 Start Low
300 Data at rest 2,708 90 C Mid
301 Schnorr signature 2,695 89 C High
302 Code signing 2,692 89 C Low
303 Affine cipher 2,680 89 C Low
304 Hashcash 2,675 89 Start Unknown
305 PKCS 8 2,637 87 Stub Unknown
306 Encrypting File System 2,620 87 B Unknown
307 Authenticator 2,619 87 Start Unknown
308 Preimage attack 2,615 87 Stub Unknown
309 Quantum network 2,614 87 C Low
310 HKDF 2,611 87 Start Unknown
311 Wildcard certificate 2,607 86 Start Unknown
312 BB84 2,605 86 Start Low
313 David Chaum 2,604 86 C Low
314 Magic (cryptography) 2,585 86 Start Unknown
315 Comparison of SSH clients 2,533 84 List Low
316 HTTP Public Key Pinning 2,504 83 C Mid
317 Pre-shared key 2,494 83 Start Mid
318 Len Sassaman 2,489 82 Start Unknown
319 Trapdoor function 2,479 82 Start High
320 Comparison of disk encryption software 2,477 82 List High
321 Export of cryptography from the United States 2,455 81 C Unknown
322 Enigma rotor details 2,437 81 Start Mid
323 Data anonymization 2,434 81 Start Mid
324 Reception and criticism of WhatsApp security and privacy features 2,375 79 C Low
325 DNS Certification Authority Authorization 2,348 78 GA Low
326 Twofish 2,342 78 Start High
327 Martin Hellman 2,338 77 Start High
328 Meet-in-the-middle attack 2,322 77 C High
329 Banburismus 2,320 77 C Low
330 Encryption software 2,317 77 Start Top
331 CCM mode 2,316 77 Start High
332 Keygen 2,308 76 C Low
333 RSA Factoring Challenge 2,305 76 Start Low
334 FIPS 140 2,300 76 Start Mid
335 Advanced Encryption Standard process 2,297 76 C Mid
336 Ralph Merkle 2,289 76 C High
337 Comparison of cryptographic hash functions 2,270 75 List Low
338 Secret sharing 2,260 75 B High
339 List of bitcoin forks 2,256 75 List Low
340 Trusted Computing 2,248 74 C Mid
341 Strong cryptography 2,237 74 Unknown Unknown
342 William F. Friedman 2,213 73 C Unknown
343 Phil Zimmermann 2,203 73 Start Mid
344 Algorand 2,200 73 B Low
345 Physical unclonable function 2,174 72 Start Unknown
346 Key management 2,173 72 Unknown Unknown
347 Off-the-record messaging 2,161 72 Start Unknown
348 Lenstra elliptic-curve factorization 2,143 71 C Low
349 Classical cipher 2,140 71 Start Top
350 Open Whisper Systems 2,136 71 B Unknown
351 AES implementations 2,120 70 List Low
352 Cryptanalysis of the Lorenz cipher 2,119 70 C High
353 Bouncy Castle (cryptography) 2,118 70 Start Unknown
354 Bullrun (decryption program) 2,108 70 B Low
355 Hash chain 2,088 69 Start Unknown
356 Pepper (cryptography) 2,074 69 Start Low
357 Filecoin 2,068 68 Stub Low
358 Comparison of cryptography libraries 2,066 68 List Unknown
359 Paillier cryptosystem 2,055 68 Start High
360 Opportunistic TLS 2,054 68 Start Mid
361 Key disclosure law 2,051 68 C Low
362 Confusion and diffusion 2,038 67 Start Mid
363 CBC-MAC 2,000 66 C High
364 Chosen-plaintext attack 1,995 66 Stub Unknown
365 MD4 1,986 66 Start Low
366 W. T. Tutte 1,972 65 C Mid
367 Zcash 1,960 65 Start Low
368 Autokey cipher 1,954 65 C Mid
369 Cryptovirology 1,948 64 Start Mid
370 Blind signature 1,947 64 C Mid
371 RSA problem 1,932 64 Start Top
372 Arthur Scherbius 1,909 63 Start Mid
373 Leo Marks 1,904 63 B Unknown
374 Dm-crypt 1,902 63 Start Low
375 Baby-step giant-step 1,901 63 C Unknown
376 FIPS 140-3 1,900 63 C Low
377 Clock drift 1,888 62 C Low
378 Privacy and blockchain 1,869 62 C Low
379 Security level 1,867 62 Stub Mid
380 Tox (protocol) 1,866 62 C Low
381 Mumble (software) 1,837 61 C Unknown
382 Double Ratchet Algorithm 1,831 61 Start Low
383 Hybrid cryptosystem 1,822 60 Start High
384 Tor2web 1,798 59 Start Low
385 Coppersmith's attack 1,793 59 B High
386 Simultaneous Authentication of Equals 1,782 59 Start High
387 Trusted timestamping 1,780 59 Start Unknown
388 Temporal Key Integrity Protocol 1,777 59 C Low
389 Orbot 1,768 58 Stub Low
390 Rijndael MixColumns 1,742 58 Start Low
391 McEliece cryptosystem 1,728 57 C High
392 Charlie Lee (computer scientist) 1,728 57 Start Low
393 Key encapsulation mechanism 1,722 57 Start High
394 Key stretching 1,717 57 Start Unknown
395 Crypto Wars 1,716 57 Start High
396 Poly1305 1,710 57 Start Top
397 Dorabella Cipher 1,706 56 Unknown Unknown
398 International Data Encryption Algorithm 1,705 56 C Unknown
399 Comparison of TLS implementations 1,700 56 List High
400 Anonymous P2P 1,697 56 C Low
401 FileVault 1,696 56 C Mid
402 One-key MAC 1,688 56 Start Low
403 Ciphertext indistinguishability 1,671 55 C High
404 Differential cryptanalysis 1,664 55 B High
405 Briar (software) 1,660 55 Start Low
406 David Wheeler (computer scientist) 1,653 55 Start Low
407 Crypt (C) 1,647 54 C High
408 Typex 1,642 54 Start Unknown
409 SecureDrop 1,642 54 Start Mid
410 Cryptographic primitive 1,618 53 Start Top
411 Advanced Access Content System 1,613 53 C Mid
412 List of things named after Alan Turing 1,611 53 List Low
413 Giovan Battista Bellaso 1,606 53 Start Low
414 Code (cryptography) 1,603 53 Start Top
415 Government Communications Security Bureau 1,594 53 B Low
416 Sichere Inter-Netzwerk Architektur 1,589 52 Stub Unknown
417 Generic Security Services Application Program Interface 1,588 52 Start Low
418 Power analysis 1,585 52 Unknown Unknown
419 ElGamal signature scheme 1,578 52 Start Top
420 ADFGVX cipher 1,566 52 Unknown Unknown
421 BLS digital signature 1,554 51 Start Mid
422 MD6 1,552 51 Start High
423 Key-agreement protocol 1,547 51 Start Top
424 Tiny Encryption Algorithm 1,522 50 Unknown Unknown
425 Challenge-Handshake Authentication Protocol 1,513 50 Start Low
426 Secure cryptoprocessor 1,511 50 C Mid
427 SIGABA 1,511 50 C High
428 Always-on DRM 1,511 50 Start Low
429 UltraViolet (website) 1,493 49 C Low
430 FreeOTP 1,491 49 Start Low
431 Information-theoretic security 1,489 49 Start Top
432 National Cryptologic Museum 1,484 49 C Mid
433 Jami (software) 1,482 49 Start Unknown
434 Roger Dingledine 1,470 49 Start Unknown
435 Multiple encryption 1,469 48 Unknown Unknown
436 Friend-to-friend 1,456 48 Start Low
437 Downgrade attack 1,453 48 Start Mid
438 Red/black concept 1,445 48 Stub Unknown
439 Integrated Encryption Scheme 1,440 48 Start Low
440 Digital signature forgery 1,430 47 Start High
441 Interactive proof system 1,428 47 Start High
442 Word square 1,428 47 C Low
443 Shugborough inscription 1,424 47 Start Low
444 Rotor machine 1,419 47 Unknown Unknown
445 Opportunistic Wireless Encryption 1,407 46 Stub Low
446 Content Authenticity Initiative 1,406 46 C Low
447 DeCSS 1,405 46 C Mid
448 PGP word list 1,405 46 Start Low
449 Proof of authority 1,401 46 Start Low
450 Null cipher 1,398 46 Stub Low
451 Secret decoder ring 1,393 46 Start Low
452 Ross J. Anderson 1,390 46 C Mid
453 ZeroNet 1,390 46 Start Low
454 Public key fingerprint 1,389 46 Start Mid
455 Random oracle 1,387 46 Start Low
456 Black Chamber 1,382 46 Unknown Unknown
457 Collision resistance 1,380 46 Start High
458 Berlekamp–Massey algorithm 1,369 45 Start Unknown
459 Codebook 1,365 45 Stub Unknown
460 Nothing-up-my-sleeve number 1,365 45 C Low
461 Hidden message 1,359 45 Start Low
462 Serpent (cipher) 1,354 45 C Low
463 Tabula recta 1,345 44 Unknown Unknown
464 SYN cookies 1,343 44 Start Unknown
465 Blum Blum Shub 1,330 44 Start High
466 SIGSALY 1,327 44 C Low
467 List of cryptographers 1,324 44 List Low
468 Operations Support Branch 1,318 43 Start Mid
469 Blaise de Vigenère 1,317 43 Start Unknown
470 LibreSSL 1,316 43 Start High
471 Two-square cipher 1,312 43 Unknown Unknown
472 Cryptome 1,310 43 C Low
473 NSAKEY 1,310 43 C High
474 One-way compression function 1,304 43 C Top
475 A5/1 1,297 43 B High
476 Key server (cryptographic) 1,297 43 Start Mid
477 Max Newman 1,289 42 B Low
478 Wiener's attack 1,283 42 B High
479 NTRUEncrypt 1,277 42 C Mid
480 RIPEMD 1,275 42 C Unknown
481 Overview of news media phone hacking scandals 1,269 42 B Low
482 Format-preserving encryption 1,268 42 Start High
483 Oblivious transfer 1,267 42 Start Unknown
484 SegWit 1,265 42 Start Low
485 Station HYPO 1,259 41 Start Low
486 Snowflake (software) 1,257 41 Start Low
487 Content Scramble System 1,250 41 Start Mid
488 Keybase 1,246 41 Start Low
489 Perfect Dark (P2P) 1,239 41 C Low
490 AES-GCM-SIV 1,222 40 Start Unknown
491 Four-square cipher 1,215 40 C Unknown
492 Proof of space 1,197 39 Start Low
493 Chosen-ciphertext attack 1,195 39 Start High
494 Fuzzy hashing 1,195 39 C Low
495 Ring signature 1,189 39 Start Mid
496 Kasiski examination 1,188 39 Unknown Unknown
497 Hash-based cryptography 1,186 39 Start Low
498 GOST (block cipher) 1,181 39 Start Mid
499 Visual cryptography 1,175 39 Unknown Unknown
500 Verifiable random function 1,174 39 Start Low

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook