From Wikipedia, the free encyclopedia
This is a list of pages in the scope of
Wikipedia:WikiProject Cryptography along with pageviews.
To report bugs, please write on the
Community tech bot talk page on Meta.
Period: 2024-06-01 to 2024-06-30
Total views: 5,874,384
Updated: 03:24, 6 July 2024 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
563,737
|
18,791
|
B
|
High
|
2
|
Telegram (software)
|
369,042
|
12,301
|
B
|
Mid
|
3
|
WikiLeaks
|
281,653
|
9,388
|
B
|
Low
|
4
|
Alan Turing
|
274,874
|
9,162
|
GA
|
Top
|
5
|
Bitcoin
|
155,526
|
5,184
|
B
|
High
|
6
|
The Imitation Game
|
107,601
|
3,586
|
C
|
Mid
|
7
|
Tor (network)
|
88,716
|
2,957
|
B
|
Mid
|
8
|
Cryptocurrency
|
83,537
|
2,784
|
C
|
High
|
9
|
Blockchain
|
79,796
|
2,659
|
B
|
High
|
10
|
Enigma machine
|
69,780
|
2,326
|
C
|
High
|
11
|
Transport Layer Security
|
66,528
|
2,217
|
B
|
Top
|
12
|
National Security Agency
|
61,696
|
2,056
|
C
|
High
|
13
|
Voynich manuscript
|
59,796
|
1,993
|
B
|
Low
|
14
|
HTTPS
|
54,284
|
1,809
|
C
|
High
|
15
|
Diffie–Hellman key exchange
|
51,953
|
1,731
|
C
|
Top
|
16
|
Joan Clarke
|
48,818
|
1,627
|
C
|
Mid
|
17
|
RSA (cryptosystem)
|
46,886
|
1,562
|
C
|
Top
|
18
|
Virtual private network
|
43,607
|
1,453
|
C
|
Mid
|
19
|
Advanced Encryption Standard
|
42,788
|
1,426
|
B
|
Top
|
20
|
HTTP Strict Transport Security
|
39,597
|
1,319
|
C
|
Low
|
21
|
Cryptography
|
37,937
|
1,264
|
C
|
Top
|
22
|
MD5
|
36,223
|
1,207
|
C
|
Top
|
23
|
SHA-2
|
35,745
|
1,191
|
C
|
Top
|
24
|
Signal (messaging app)
|
35,330
|
1,177
|
C
|
Mid
|
25
|
Darknet market
|
35,057
|
1,168
|
B
|
Mid
|
26
|
Secure Shell
|
34,316
|
1,143
|
C
|
High
|
27
|
Public-key cryptography
|
31,313
|
1,043
|
C
|
Top
|
28
|
Changpeng Zhao
|
30,898
|
1,029
|
Start
|
Low
|
29
|
Vault 7
|
30,741
|
1,024
|
C
|
Mid
|
30
|
Block cipher mode of operation
|
30,610
|
1,020
|
C
|
Top
|
31
|
Man-in-the-middle attack
|
28,010
|
933
|
C
|
Mid
|
32
|
Bletchley Park
|
27,008
|
900
|
B
|
High
|
33
|
Dogecoin
|
26,482
|
882
|
C
|
Low
|
34
|
GCHQ
|
26,296
|
876
|
B
|
Low
|
35
|
History of bitcoin
|
26,256
|
875
|
C
|
Low
|
36
|
Digital signature
|
25,358
|
845
|
C
|
Top
|
37
|
Kryptos
|
24,260
|
808
|
C
|
Low
|
38
|
Caesar cipher
|
23,841
|
794
|
FA
|
High
|
39
|
HMAC
|
23,621
|
787
|
C
|
High
|
40
|
Vitalik Buterin
|
23,163
|
772
|
C
|
Low
|
41
|
Vigenère cipher
|
23,153
|
771
|
B
|
Low
|
42
|
Keychain (software)
|
22,864
|
762
|
Start
|
Unknown
|
43
|
Information theory
|
22,678
|
755
|
B
|
Top
|
44
|
Zimmermann Telegram
|
22,646
|
754
|
B
|
High
|
45
|
Password
|
22,294
|
743
|
C
|
Top
|
46
|
Cryptographic hash function
|
22,271
|
742
|
C
|
Top
|
47
|
Steganography
|
21,562
|
718
|
B
|
High
|
48
|
Cryptanalysis of the Enigma
|
21,538
|
717
|
C
|
Mid
|
49
|
Proton Mail
|
21,298
|
709
|
C
|
Low
|
50
|
Knapsack problem
|
20,692
|
689
|
C
|
Mid
|
51
|
Claude Shannon
|
20,266
|
675
|
C
|
Top
|
52
|
SHA-1
|
20,134
|
671
|
C
|
Top
|
53
|
Active Directory
|
20,079
|
669
|
C
|
Low
|
54
|
Pretty Good Privacy
|
19,979
|
665
|
B
|
High
|
55
|
Sator Square
|
19,685
|
656
|
B
|
Low
|
56
|
Zero-knowledge proof
|
19,379
|
645
|
C
|
Top
|
57
|
Rainbow table
|
19,169
|
638
|
C
|
High
|
58
|
Trusted Platform Module
|
18,758
|
625
|
C
|
Mid
|
59
|
Encryption
|
18,655
|
621
|
C
|
Top
|
60
|
Certificate authority
|
18,052
|
601
|
C
|
High
|
61
|
Merkle tree
|
18,008
|
600
|
C
|
Mid
|
62
|
Information security
|
17,778
|
592
|
B
|
Top
|
63
|
Letter frequency
|
17,757
|
591
|
B
|
Low
|
64
|
Wi-Fi Protected Access
|
17,363
|
578
|
C
|
Mid
|
65
|
NordVPN
|
17,360
|
578
|
C
|
Mid
|
66
|
Elliptic-curve cryptography
|
17,183
|
572
|
C
|
High
|
67
|
Cipher
|
17,041
|
568
|
C
|
Top
|
68
|
Gordon Welchman
|
16,717
|
557
|
C
|
Low
|
69
|
Post-quantum cryptography
|
16,691
|
556
|
C
|
High
|
70
|
ROT13
|
16,343
|
544
|
C
|
Mid
|
71
|
Bombe
|
15,746
|
524
|
B
|
Mid
|
72
|
Code talker
|
15,407
|
513
|
B
|
Low
|
73
|
Kerberos (protocol)
|
15,099
|
503
|
C
|
High
|
74
|
Public key infrastructure
|
15,067
|
502
|
C
|
Top
|
75
|
One-time pad
|
14,909
|
496
|
C
|
Top
|
76
|
Digital rights management
|
14,615
|
487
|
B
|
High
|
77
|
One-time password
|
14,558
|
485
|
C
|
Mid
|
78
|
Homomorphic encryption
|
14,129
|
470
|
C
|
High
|
79
|
Phone hacking
|
13,674
|
455
|
Start
|
Mid
|
80
|
Ultra (cryptography)
|
13,308
|
443
|
C
|
High
|
81
|
Secure Hash Algorithms
|
13,217
|
440
|
Start
|
High
|
82
|
Elliptic Curve Digital Signature Algorithm
|
12,878
|
429
|
C
|
High
|
83
|
Salt (cryptography)
|
12,776
|
425
|
Start
|
High
|
84
|
Bcrypt
|
12,697
|
423
|
C
|
Mid
|
85
|
Galois/Counter Mode
|
12,260
|
408
|
C
|
Mid
|
86
|
SHA-3
|
12,136
|
404
|
Start
|
Mid
|
87
|
Data Encryption Standard
|
11,988
|
399
|
C
|
Top
|
88
|
Public key certificate
|
11,519
|
383
|
C
|
Top
|
89
|
SSH File Transfer Protocol
|
11,516
|
383
|
Start
|
Unknown
|
90
|
OpenVPN
|
11,402
|
380
|
C
|
Mid
|
91
|
Symmetric-key algorithm
|
11,197
|
373
|
Start
|
Top
|
92
|
.onion
|
11,166
|
372
|
C
|
Low
|
93
|
Alice and Bob
|
10,972
|
365
|
Start
|
Low
|
94
|
Colossus computer
|
10,861
|
362
|
B
|
Mid
|
95
|
Brute-force attack
|
10,753
|
358
|
C
|
High
|
96
|
Shiba Inu (cryptocurrency)
|
10,731
|
357
|
Start
|
Low
|
97
|
Authentication
|
10,503
|
350
|
C
|
High
|
98
|
Grover's algorithm
|
10,286
|
342
|
C
|
Mid
|
99
|
OpenSSL
|
10,219
|
340
|
B
|
High
|
100
|
Integer factorization
|
10,073
|
335
|
B
|
Mid
|
101
|
Link 16
|
9,949
|
331
|
Start
|
Low
|
102
|
Mullvad
|
9,904
|
330
|
Start
|
Low
|
103
|
Theoretical computer science
|
9,883
|
329
|
B
|
Low
|
104
|
Conel Hugh O'Donel Alexander
|
9,851
|
328
|
Start
|
Low
|
105
|
Forward secrecy
|
9,702
|
323
|
C
|
High
|
106
|
PBKDF2
|
9,676
|
322
|
C
|
Low
|
107
|
InterPlanetary File System
|
9,561
|
318
|
C
|
Low
|
108
|
Substitution cipher
|
9,481
|
316
|
Unknown
|
Unknown
|
109
|
Pay television
|
9,445
|
314
|
Start
|
Unknown
|
110
|
Cypherpunk
|
9,351
|
311
|
C
|
Mid
|
111
|
Comparison of BitTorrent clients
|
9,162
|
305
|
List
|
Low
|
112
|
Differential privacy
|
9,079
|
302
|
C
|
Unknown
|
113
|
Cryptanalysis
|
9,074
|
302
|
C
|
High
|
114
|
Authenticated encryption
|
8,900
|
296
|
C
|
Mid
|
115
|
Cryptonomicon
|
8,802
|
293
|
C
|
Low
|
116
|
Fort Meade
|
8,745
|
291
|
C
|
Low
|
117
|
Cryptographic nonce
|
8,583
|
286
|
Start
|
High
|
118
|
The Tor Project
|
8,525
|
284
|
C
|
Mid
|
119
|
Message authentication code
|
8,418
|
280
|
C
|
Top
|
120
|
Shamir's secret sharing
|
8,367
|
278
|
C
|
High
|
121
|
Beale ciphers
|
8,327
|
277
|
B
|
Low
|
122
|
Quantum key distribution
|
8,317
|
277
|
B
|
Mid
|
123
|
Tails (operating system)
|
8,219
|
273
|
Start
|
Low
|
124
|
EdDSA
|
8,143
|
271
|
C
|
High
|
125
|
I2P
|
8,139
|
271
|
B
|
Low
|
126
|
Bitwarden
|
8,028
|
267
|
C
|
Low
|
127
|
Apple–FBI encryption dispute
|
7,996
|
266
|
C
|
Low
|
128
|
ChaCha20-Poly1305
|
7,863
|
262
|
C
|
Low
|
129
|
Birthday attack
|
7,739
|
257
|
C
|
High
|
130
|
VeraCrypt
|
7,713
|
257
|
C
|
Mid
|
131
|
Elliptic-curve Diffie–Hellman
|
7,621
|
254
|
Start
|
Mid
|
132
|
Cryptographically secure pseudorandom number generator
|
7,581
|
252
|
C
|
Top
|
133
|
Babington Plot
|
7,518
|
250
|
C
|
Low
|
134
|
3-D Secure
|
7,327
|
244
|
Start
|
Low
|
135
|
Lorenz cipher
|
7,297
|
243
|
C
|
Top
|
136
|
Curve25519
|
7,277
|
242
|
C
|
High
|
137
|
Citizenfour
|
7,218
|
240
|
C
|
Low
|
138
|
Proof of stake
|
7,189
|
239
|
Start
|
Low
|
139
|
Decentralized finance
|
7,140
|
238
|
Start
|
Low
|
140
|
Password manager
|
7,114
|
237
|
C
|
Low
|
141
|
Matrix (protocol)
|
7,090
|
236
|
Start
|
Unknown
|
142
|
Discrete logarithm
|
7,030
|
234
|
C
|
Mid
|
143
|
Side-channel attack
|
7,019
|
233
|
C
|
High
|
144
|
Argon2
|
7,007
|
233
|
C
|
Mid
|
145
|
PKCS 12
|
6,761
|
225
|
Start
|
Unknown
|
146
|
Triple DES
|
6,740
|
224
|
Start
|
Unknown
|
147
|
Password strength
|
6,739
|
224
|
C
|
High
|
148
|
Digital Signature Algorithm
|
6,701
|
223
|
C
|
Top
|
149
|
Certificate signing request
|
6,553
|
218
|
C
|
Low
|
150
|
Cryptogram
|
6,549
|
218
|
C
|
Mid
|
151
|
KeePass
|
6,463
|
215
|
C
|
Low
|
152
|
Quantum cryptography
|
6,445
|
214
|
C
|
High
|
153
|
IMSI-catcher
|
6,371
|
212
|
Start
|
Mid
|
154
|
RC4
|
6,363
|
212
|
B
|
Top
|
155
|
Cipher suite
|
6,274
|
209
|
C
|
Top
|
156
|
Playfair cipher
|
6,255
|
208
|
Unknown
|
Unknown
|
157
|
Confidentiality
|
6,161
|
205
|
C
|
Low
|
158
|
Password cracking
|
6,138
|
204
|
C
|
Mid
|
159
|
FIPS 140-2
|
6,120
|
204
|
C
|
Mid
|
160
|
Bitcoin Cash
|
6,119
|
203
|
Start
|
Low
|
161
|
RSA Security
|
6,111
|
203
|
C
|
Unknown
|
162
|
Blockchain game
|
6,095
|
203
|
Start
|
Low
|
163
|
Digest access authentication
|
6,093
|
203
|
B
|
Low
|
164
|
Hyphanet
|
6,084
|
202
|
B
|
Mid
|
165
|
Key derivation function
|
6,034
|
201
|
C
|
Low
|
166
|
Secure multi-party computation
|
5,987
|
199
|
Start
|
High
|
167
|
Self-signed certificate
|
5,879
|
195
|
Start
|
Unknown
|
168
|
Qubes OS
|
5,872
|
195
|
C
|
Mid
|
169
|
Marian Rejewski
|
5,870
|
195
|
FA
|
Mid
|
170
|
GNU Privacy Guard
|
5,834
|
194
|
C
|
Unknown
|
171
|
Kerckhoffs's principle
|
5,780
|
192
|
Start
|
Mid
|
172
|
Utah Data Center
|
5,747
|
191
|
C
|
Mid
|
173
|
Litecoin
|
5,731
|
191
|
Start
|
Low
|
174
|
Block cipher
|
5,690
|
189
|
C
|
Top
|
175
|
Units of information
|
5,625
|
187
|
C
|
Unknown
|
176
|
Transposition cipher
|
5,609
|
186
|
Unknown
|
Unknown
|
177
|
Wired Equivalent Privacy
|
5,600
|
186
|
C
|
Mid
|
178
|
Root certificate
|
5,546
|
184
|
Start
|
Low
|
179
|
Richard Teng
|
5,544
|
184
|
Start
|
Low
|
180
|
Signal Protocol
|
5,522
|
184
|
C
|
High
|
181
|
Bitconnect
|
5,482
|
182
|
C
|
Low
|
182
|
Dual EC DRBG
|
5,468
|
182
|
C
|
High
|
183
|
Deniable encryption
|
5,467
|
182
|
Start
|
High
|
184
|
Lavarand
|
5,461
|
182
|
Start
|
Mid
|
185
|
Automatic Certificate Management Environment
|
5,432
|
181
|
Start
|
Low
|
186
|
Salsa20
|
5,428
|
180
|
C
|
Top
|
187
|
Tap code
|
5,421
|
180
|
Start
|
Low
|
188
|
ElGamal encryption
|
5,375
|
179
|
Start
|
Top
|
189
|
Mutual authentication
|
5,345
|
178
|
Stub
|
Low
|
190
|
Datagram Transport Layer Security
|
5,200
|
173
|
Start
|
Mid
|
191
|
Rijndael S-box
|
5,162
|
172
|
Start
|
Low
|
192
|
OpenSSH
|
5,124
|
170
|
C
|
High
|
193
|
11B-X-1371
|
5,120
|
170
|
GA
|
Low
|
194
|
Key (cryptography)
|
5,116
|
170
|
Start
|
Unknown
|
195
|
Electronic signature
|
5,116
|
170
|
C
|
Low
|
196
|
Illegal number
|
5,102
|
170
|
C
|
Low
|
197
|
Blowfish (cipher)
|
5,086
|
169
|
B
|
High
|
198
|
Entrust
|
4,976
|
165
|
Start
|
Low
|
199
|
Stream cipher
|
4,951
|
165
|
Start
|
Top
|
200
|
Initialization vector
|
4,866
|
162
|
C
|
High
|
201
|
AES instruction set
|
4,850
|
161
|
C
|
Low
|
202
|
KeePassXC
|
4,818
|
160
|
Start
|
Low
|
203
|
Padding (cryptography)
|
4,747
|
158
|
Start
|
Unknown
|
204
|
Bitcoin Core
|
4,741
|
158
|
Start
|
Low
|
205
|
BLAKE (hash function)
|
4,718
|
157
|
C
|
Mid
|
206
|
Lattice-based cryptography
|
4,717
|
157
|
Start
|
Low
|
207
|
Boolean function
|
4,597
|
153
|
Start
|
Mid
|
208
|
Commitment scheme
|
4,544
|
151
|
C
|
High
|
209
|
Directory service
|
4,527
|
150
|
Start
|
Mid
|
210
|
Bomba (cryptography)
|
4,480
|
149
|
Start
|
Low
|
211
|
Adi Shamir
|
4,448
|
148
|
Start
|
Unknown
|
212
|
XOR cipher
|
4,442
|
148
|
Stub
|
Mid
|
213
|
The Doughnut
|
4,408
|
146
|
GA
|
High
|
214
|
Replay attack
|
4,359
|
145
|
C
|
Top
|
215
|
Certificate revocation list
|
4,307
|
143
|
C
|
Low
|
216
|
Known-plaintext attack
|
4,286
|
142
|
Start
|
High
|
217
|
Ciphertext
|
4,279
|
142
|
Start
|
High
|
218
|
PKCS
|
4,216
|
140
|
List
|
High
|
219
|
Supply chain attack
|
4,209
|
140
|
C
|
Low
|
220
|
RSA SecurID
|
4,139
|
137
|
Unknown
|
Unknown
|
221
|
History of cryptography
|
4,139
|
137
|
Start
|
High
|
222
|
Challenge–response authentication
|
4,127
|
137
|
Start
|
Mid
|
223
|
Privacy-Enhanced Mail
|
4,036
|
134
|
Start
|
Low
|
224
|
Non-repudiation
|
4,031
|
134
|
Start
|
Mid
|
225
|
Plaintext
|
4,029
|
134
|
Start
|
High
|
226
|
Diplomatic bag
|
4,010
|
133
|
Start
|
Low
|
227
|
Special Collection Service
|
3,999
|
133
|
C
|
Low
|
228
|
AES key schedule
|
3,995
|
133
|
Start
|
Low
|
229
|
Key size
|
3,961
|
132
|
C
|
High
|
230
|
Communications Security Establishment
|
3,952
|
131
|
C
|
Mid
|
231
|
One-way function
|
3,943
|
131
|
Start
|
Top
|
232
|
Web of trust
|
3,901
|
130
|
C
|
High
|
233
|
Session (software)
|
3,898
|
129
|
Start
|
Low
|
234
|
DNS-based Authentication of Named Entities
|
3,895
|
129
|
C
|
Mid
|
235
|
Cryptographic protocol
|
3,849
|
128
|
Start
|
High
|
236
|
Polkadot (cryptocurrency)
|
3,786
|
126
|
Start
|
Low
|
237
|
Alastair Denniston
|
3,717
|
123
|
Start
|
Unknown
|
238
|
TrueCrypt
|
3,703
|
123
|
C
|
Mid
|
239
|
Fork (blockchain)
|
3,688
|
122
|
Start
|
Mid
|
240
|
Cold boot attack
|
3,670
|
122
|
C
|
Low
|
241
|
Frequency analysis
|
3,609
|
120
|
C
|
High
|
242
|
Disk encryption
|
3,604
|
120
|
C
|
High
|
243
|
Criticism of Dropbox
|
3,545
|
118
|
B
|
Low
|
244
|
NIST Post-Quantum Cryptography Standardization
|
3,440
|
114
|
C
|
Mid
|
245
|
Ricky McCormick's encrypted notes
|
3,436
|
114
|
B
|
Low
|
246
|
Feistel cipher
|
3,428
|
114
|
Start
|
Unknown
|
247
|
K-anonymity
|
3,417
|
113
|
Start
|
Mid
|
248
|
Padding oracle attack
|
3,408
|
113
|
Stub
|
Unknown
|
249
|
Bruce Schneier
|
3,390
|
113
|
Start
|
High
|
250
|
Polybius square
|
3,389
|
112
|
Start
|
Mid
|
251
|
Avalanche effect
|
3,383
|
112
|
Start
|
High
|
252
|
Whitfield Diffie
|
3,377
|
112
|
B
|
High
|
253
|
PKCS 11
|
3,362
|
112
|
Unknown
|
Unknown
|
254
|
WebTorrent
|
3,355
|
111
|
Start
|
Unknown
|
255
|
Harvest now, decrypt later
|
3,343
|
111
|
Start
|
Low
|
256
|
PKCS 1
|
3,320
|
110
|
C
|
Mid
|
257
|
Type B Cipher Machine
|
3,301
|
110
|
Start
|
Low
|
258
|
PKCS 7
|
3,295
|
109
|
Start
|
Low
|
259
|
Digital watermarking
|
3,285
|
109
|
B
|
Mid
|
260
|
Bacon's cipher
|
3,282
|
109
|
Start
|
Low
|
261
|
Australian Signals Directorate
|
3,261
|
108
|
C
|
Low
|
262
|
SipHash
|
3,228
|
107
|
Start
|
Low
|
263
|
Dilly Knox
|
3,219
|
107
|
B
|
Unknown
|
264
|
Threema
|
3,190
|
106
|
C
|
Unknown
|
265
|
Rail fence cipher
|
3,188
|
106
|
Start
|
Low
|
266
|
Timing attack
|
3,163
|
105
|
C
|
High
|
267
|
Subject Alternative Name
|
3,158
|
105
|
Stub
|
Mid
|
268
|
List of ciphertexts
|
3,153
|
105
|
List
|
Low
|
269
|
Adam Back
|
3,126
|
104
|
Start
|
Low
|
270
|
Optimal asymmetric encryption padding
|
3,081
|
102
|
Start
|
High
|
271
|
Merkle–Damgård construction
|
3,069
|
102
|
C
|
Unknown
|
272
|
Elizebeth Smith Friedman
|
3,060
|
102
|
C
|
Mid
|
273
|
Whonix
|
3,059
|
101
|
Start
|
Mid
|
274
|
Non-interactive zero-knowledge proof
|
3,055
|
101
|
Start
|
Low
|
275
|
Cryptocurrency tumbler
|
3,052
|
101
|
Start
|
Unknown
|
276
|
Elliptic curve point multiplication
|
3,046
|
101
|
C
|
Mid
|
277
|
Polyalphabetic cipher
|
3,003
|
100
|
Start
|
Unknown
|
278
|
Scrambler
|
3,001
|
100
|
C
|
Unknown
|
279
|
Book cipher
|
2,983
|
99
|
C
|
Low
|
280
|
Daniel J. Bernstein
|
2,973
|
99
|
C
|
Mid
|
281
|
Key exchange
|
2,961
|
98
|
Start
|
Unknown
|
282
|
Length extension attack
|
2,957
|
98
|
Start
|
Unknown
|
283
|
Dictionary attack
|
2,899
|
96
|
C
|
Unknown
|
284
|
Bitcoin scalability problem
|
2,882
|
96
|
C
|
Low
|
285
|
Communications security
|
2,874
|
95
|
Start
|
Mid
|
286
|
S-box
|
2,871
|
95
|
Start
|
Top
|
287
|
Collision attack
|
2,857
|
95
|
Start
|
High
|
288
|
Atbash
|
2,852
|
95
|
Stub
|
Low
|
289
|
Digital renminbi
|
2,840
|
94
|
B
|
High
|
290
|
Crypto-anarchy
|
2,837
|
94
|
Start
|
High
|
291
|
Clipper chip
|
2,832
|
94
|
C
|
High
|
292
|
Disk encryption theory
|
2,822
|
94
|
C
|
Unknown
|
293
|
Hill cipher
|
2,806
|
93
|
Unknown
|
Unknown
|
294
|
William Binney (intelligence official)
|
2,790
|
93
|
Start
|
Mid
|
295
|
IEEE 802.11i-2004
|
2,774
|
92
|
C
|
Mid
|
296
|
Certificate Transparency
|
2,768
|
92
|
C
|
High
|
297
|
I. J. Good
|
2,744
|
91
|
C
|
Low
|
298
|
Crypto AG
|
2,744
|
91
|
C
|
High
|
299
|
Copiale cipher
|
2,734
|
91
|
Start
|
Low
|
300
|
Data at rest
|
2,708
|
90
|
C
|
Mid
|
301
|
Schnorr signature
|
2,695
|
89
|
C
|
High
|
302
|
Code signing
|
2,692
|
89
|
C
|
Low
|
303
|
Affine cipher
|
2,680
|
89
|
C
|
Low
|
304
|
Hashcash
|
2,675
|
89
|
Start
|
Unknown
|
305
|
PKCS 8
|
2,637
|
87
|
Stub
|
Unknown
|
306
|
Encrypting File System
|
2,620
|
87
|
B
|
Unknown
|
307
|
Authenticator
|
2,619
|
87
|
Start
|
Unknown
|
308
|
Preimage attack
|
2,615
|
87
|
Stub
|
Unknown
|
309
|
Quantum network
|
2,614
|
87
|
C
|
Low
|
310
|
HKDF
|
2,611
|
87
|
Start
|
Unknown
|
311
|
Wildcard certificate
|
2,607
|
86
|
Start
|
Unknown
|
312
|
BB84
|
2,605
|
86
|
Start
|
Low
|
313
|
David Chaum
|
2,604
|
86
|
C
|
Low
|
314
|
Magic (cryptography)
|
2,585
|
86
|
Start
|
Unknown
|
315
|
Comparison of SSH clients
|
2,533
|
84
|
List
|
Low
|
316
|
HTTP Public Key Pinning
|
2,504
|
83
|
C
|
Mid
|
317
|
Pre-shared key
|
2,494
|
83
|
Start
|
Mid
|
318
|
Len Sassaman
|
2,489
|
82
|
Start
|
Unknown
|
319
|
Trapdoor function
|
2,479
|
82
|
Start
|
High
|
320
|
Comparison of disk encryption software
|
2,477
|
82
|
List
|
High
|
321
|
Export of cryptography from the United States
|
2,455
|
81
|
C
|
Unknown
|
322
|
Enigma rotor details
|
2,437
|
81
|
Start
|
Mid
|
323
|
Data anonymization
|
2,434
|
81
|
Start
|
Mid
|
324
|
Reception and criticism of WhatsApp security and privacy features
|
2,375
|
79
|
C
|
Low
|
325
|
DNS Certification Authority Authorization
|
2,348
|
78
|
GA
|
Low
|
326
|
Twofish
|
2,342
|
78
|
Start
|
High
|
327
|
Martin Hellman
|
2,338
|
77
|
Start
|
High
|
328
|
Meet-in-the-middle attack
|
2,322
|
77
|
C
|
High
|
329
|
Banburismus
|
2,320
|
77
|
C
|
Low
|
330
|
Encryption software
|
2,317
|
77
|
Start
|
Top
|
331
|
CCM mode
|
2,316
|
77
|
Start
|
High
|
332
|
Keygen
|
2,308
|
76
|
C
|
Low
|
333
|
RSA Factoring Challenge
|
2,305
|
76
|
Start
|
Low
|
334
|
FIPS 140
|
2,300
|
76
|
Start
|
Mid
|
335
|
Advanced Encryption Standard process
|
2,297
|
76
|
C
|
Mid
|
336
|
Ralph Merkle
|
2,289
|
76
|
C
|
High
|
337
|
Comparison of cryptographic hash functions
|
2,270
|
75
|
List
|
Low
|
338
|
Secret sharing
|
2,260
|
75
|
B
|
High
|
339
|
List of bitcoin forks
|
2,256
|
75
|
List
|
Low
|
340
|
Trusted Computing
|
2,248
|
74
|
C
|
Mid
|
341
|
Strong cryptography
|
2,237
|
74
|
Unknown
|
Unknown
|
342
|
William F. Friedman
|
2,213
|
73
|
C
|
Unknown
|
343
|
Phil Zimmermann
|
2,203
|
73
|
Start
|
Mid
|
344
|
Algorand
|
2,200
|
73
|
B
|
Low
|
345
|
Physical unclonable function
|
2,174
|
72
|
Start
|
Unknown
|
346
|
Key management
|
2,173
|
72
|
Unknown
|
Unknown
|
347
|
Off-the-record messaging
|
2,161
|
72
|
Start
|
Unknown
|
348
|
Lenstra elliptic-curve factorization
|
2,143
|
71
|
C
|
Low
|
349
|
Classical cipher
|
2,140
|
71
|
Start
|
Top
|
350
|
Open Whisper Systems
|
2,136
|
71
|
B
|
Unknown
|
351
|
AES implementations
|
2,120
|
70
|
List
|
Low
|
352
|
Cryptanalysis of the Lorenz cipher
|
2,119
|
70
|
C
|
High
|
353
|
Bouncy Castle (cryptography)
|
2,118
|
70
|
Start
|
Unknown
|
354
|
Bullrun (decryption program)
|
2,108
|
70
|
B
|
Low
|
355
|
Hash chain
|
2,088
|
69
|
Start
|
Unknown
|
356
|
Pepper (cryptography)
|
2,074
|
69
|
Start
|
Low
|
357
|
Filecoin
|
2,068
|
68
|
Stub
|
Low
|
358
|
Comparison of cryptography libraries
|
2,066
|
68
|
List
|
Unknown
|
359
|
Paillier cryptosystem
|
2,055
|
68
|
Start
|
High
|
360
|
Opportunistic TLS
|
2,054
|
68
|
Start
|
Mid
|
361
|
Key disclosure law
|
2,051
|
68
|
C
|
Low
|
362
|
Confusion and diffusion
|
2,038
|
67
|
Start
|
Mid
|
363
|
CBC-MAC
|
2,000
|
66
|
C
|
High
|
364
|
Chosen-plaintext attack
|
1,995
|
66
|
Stub
|
Unknown
|
365
|
MD4
|
1,986
|
66
|
Start
|
Low
|
366
|
W. T. Tutte
|
1,972
|
65
|
C
|
Mid
|
367
|
Zcash
|
1,960
|
65
|
Start
|
Low
|
368
|
Autokey cipher
|
1,954
|
65
|
C
|
Mid
|
369
|
Cryptovirology
|
1,948
|
64
|
Start
|
Mid
|
370
|
Blind signature
|
1,947
|
64
|
C
|
Mid
|
371
|
RSA problem
|
1,932
|
64
|
Start
|
Top
|
372
|
Arthur Scherbius
|
1,909
|
63
|
Start
|
Mid
|
373
|
Leo Marks
|
1,904
|
63
|
B
|
Unknown
|
374
|
Dm-crypt
|
1,902
|
63
|
Start
|
Low
|
375
|
Baby-step giant-step
|
1,901
|
63
|
C
|
Unknown
|
376
|
FIPS 140-3
|
1,900
|
63
|
C
|
Low
|
377
|
Clock drift
|
1,888
|
62
|
C
|
Low
|
378
|
Privacy and blockchain
|
1,869
|
62
|
C
|
Low
|
379
|
Security level
|
1,867
|
62
|
Stub
|
Mid
|
380
|
Tox (protocol)
|
1,866
|
62
|
C
|
Low
|
381
|
Mumble (software)
|
1,837
|
61
|
C
|
Unknown
|
382
|
Double Ratchet Algorithm
|
1,831
|
61
|
Start
|
Low
|
383
|
Hybrid cryptosystem
|
1,822
|
60
|
Start
|
High
|
384
|
Tor2web
|
1,798
|
59
|
Start
|
Low
|
385
|
Coppersmith's attack
|
1,793
|
59
|
B
|
High
|
386
|
Simultaneous Authentication of Equals
|
1,782
|
59
|
Start
|
High
|
387
|
Trusted timestamping
|
1,780
|
59
|
Start
|
Unknown
|
388
|
Temporal Key Integrity Protocol
|
1,777
|
59
|
C
|
Low
|
389
|
Orbot
|
1,768
|
58
|
Stub
|
Low
|
390
|
Rijndael MixColumns
|
1,742
|
58
|
Start
|
Low
|
391
|
McEliece cryptosystem
|
1,728
|
57
|
C
|
High
|
392
|
Charlie Lee (computer scientist)
|
1,728
|
57
|
Start
|
Low
|
393
|
Key encapsulation mechanism
|
1,722
|
57
|
Start
|
High
|
394
|
Key stretching
|
1,717
|
57
|
Start
|
Unknown
|
395
|
Crypto Wars
|
1,716
|
57
|
Start
|
High
|
396
|
Poly1305
|
1,710
|
57
|
Start
|
Top
|
397
|
Dorabella Cipher
|
1,706
|
56
|
Unknown
|
Unknown
|
398
|
International Data Encryption Algorithm
|
1,705
|
56
|
C
|
Unknown
|
399
|
Comparison of TLS implementations
|
1,700
|
56
|
List
|
High
|
400
|
Anonymous P2P
|
1,697
|
56
|
C
|
Low
|
401
|
FileVault
|
1,696
|
56
|
C
|
Mid
|
402
|
One-key MAC
|
1,688
|
56
|
Start
|
Low
|
403
|
Ciphertext indistinguishability
|
1,671
|
55
|
C
|
High
|
404
|
Differential cryptanalysis
|
1,664
|
55
|
B
|
High
|
405
|
Briar (software)
|
1,660
|
55
|
Start
|
Low
|
406
|
David Wheeler (computer scientist)
|
1,653
|
55
|
Start
|
Low
|
407
|
Crypt (C)
|
1,647
|
54
|
C
|
High
|
408
|
Typex
|
1,642
|
54
|
Start
|
Unknown
|
409
|
SecureDrop
|
1,642
|
54
|
Start
|
Mid
|
410
|
Cryptographic primitive
|
1,618
|
53
|
Start
|
Top
|
411
|
Advanced Access Content System
|
1,613
|
53
|
C
|
Mid
|
412
|
List of things named after Alan Turing
|
1,611
|
53
|
List
|
Low
|
413
|
Giovan Battista Bellaso
|
1,606
|
53
|
Start
|
Low
|
414
|
Code (cryptography)
|
1,603
|
53
|
Start
|
Top
|
415
|
Government Communications Security Bureau
|
1,594
|
53
|
B
|
Low
|
416
|
Sichere Inter-Netzwerk Architektur
|
1,589
|
52
|
Stub
|
Unknown
|
417
|
Generic Security Services Application Program Interface
|
1,588
|
52
|
Start
|
Low
|
418
|
Power analysis
|
1,585
|
52
|
Unknown
|
Unknown
|
419
|
ElGamal signature scheme
|
1,578
|
52
|
Start
|
Top
|
420
|
ADFGVX cipher
|
1,566
|
52
|
Unknown
|
Unknown
|
421
|
BLS digital signature
|
1,554
|
51
|
Start
|
Mid
|
422
|
MD6
|
1,552
|
51
|
Start
|
High
|
423
|
Key-agreement protocol
|
1,547
|
51
|
Start
|
Top
|
424
|
Tiny Encryption Algorithm
|
1,522
|
50
|
Unknown
|
Unknown
|
425
|
Challenge-Handshake Authentication Protocol
|
1,513
|
50
|
Start
|
Low
|
426
|
Secure cryptoprocessor
|
1,511
|
50
|
C
|
Mid
|
427
|
SIGABA
|
1,511
|
50
|
C
|
High
|
428
|
Always-on DRM
|
1,511
|
50
|
Start
|
Low
|
429
|
UltraViolet (website)
|
1,493
|
49
|
C
|
Low
|
430
|
FreeOTP
|
1,491
|
49
|
Start
|
Low
|
431
|
Information-theoretic security
|
1,489
|
49
|
Start
|
Top
|
432
|
National Cryptologic Museum
|
1,484
|
49
|
C
|
Mid
|
433
|
Jami (software)
|
1,482
|
49
|
Start
|
Unknown
|
434
|
Roger Dingledine
|
1,470
|
49
|
Start
|
Unknown
|
435
|
Multiple encryption
|
1,469
|
48
|
Unknown
|
Unknown
|
436
|
Friend-to-friend
|
1,456
|
48
|
Start
|
Low
|
437
|
Downgrade attack
|
1,453
|
48
|
Start
|
Mid
|
438
|
Red/black concept
|
1,445
|
48
|
Stub
|
Unknown
|
439
|
Integrated Encryption Scheme
|
1,440
|
48
|
Start
|
Low
|
440
|
Digital signature forgery
|
1,430
|
47
|
Start
|
High
|
441
|
Interactive proof system
|
1,428
|
47
|
Start
|
High
|
442
|
Word square
|
1,428
|
47
|
C
|
Low
|
443
|
Shugborough inscription
|
1,424
|
47
|
Start
|
Low
|
444
|
Rotor machine
|
1,419
|
47
|
Unknown
|
Unknown
|
445
|
Opportunistic Wireless Encryption
|
1,407
|
46
|
Stub
|
Low
|
446
|
Content Authenticity Initiative
|
1,406
|
46
|
C
|
Low
|
447
|
DeCSS
|
1,405
|
46
|
C
|
Mid
|
448
|
PGP word list
|
1,405
|
46
|
Start
|
Low
|
449
|
Proof of authority
|
1,401
|
46
|
Start
|
Low
|
450
|
Null cipher
|
1,398
|
46
|
Stub
|
Low
|
451
|
Secret decoder ring
|
1,393
|
46
|
Start
|
Low
|
452
|
Ross J. Anderson
|
1,390
|
46
|
C
|
Mid
|
453
|
ZeroNet
|
1,390
|
46
|
Start
|
Low
|
454
|
Public key fingerprint
|
1,389
|
46
|
Start
|
Mid
|
455
|
Random oracle
|
1,387
|
46
|
Start
|
Low
|
456
|
Black Chamber
|
1,382
|
46
|
Unknown
|
Unknown
|
457
|
Collision resistance
|
1,380
|
46
|
Start
|
High
|
458
|
Berlekamp–Massey algorithm
|
1,369
|
45
|
Start
|
Unknown
|
459
|
Codebook
|
1,365
|
45
|
Stub
|
Unknown
|
460
|
Nothing-up-my-sleeve number
|
1,365
|
45
|
C
|
Low
|
461
|
Hidden message
|
1,359
|
45
|
Start
|
Low
|
462
|
Serpent (cipher)
|
1,354
|
45
|
C
|
Low
|
463
|
Tabula recta
|
1,345
|
44
|
Unknown
|
Unknown
|
464
|
SYN cookies
|
1,343
|
44
|
Start
|
Unknown
|
465
|
Blum Blum Shub
|
1,330
|
44
|
Start
|
High
|
466
|
SIGSALY
|
1,327
|
44
|
C
|
Low
|
467
|
List of cryptographers
|
1,324
|
44
|
List
|
Low
|
468
|
Operations Support Branch
|
1,318
|
43
|
Start
|
Mid
|
469
|
Blaise de Vigenère
|
1,317
|
43
|
Start
|
Unknown
|
470
|
LibreSSL
|
1,316
|
43
|
Start
|
High
|
471
|
Two-square cipher
|
1,312
|
43
|
Unknown
|
Unknown
|
472
|
Cryptome
|
1,310
|
43
|
C
|
Low
|
473
|
NSAKEY
|
1,310
|
43
|
C
|
High
|
474
|
One-way compression function
|
1,304
|
43
|
C
|
Top
|
475
|
A5/1
|
1,297
|
43
|
B
|
High
|
476
|
Key server (cryptographic)
|
1,297
|
43
|
Start
|
Mid
|
477
|
Max Newman
|
1,289
|
42
|
B
|
Low
|
478
|
Wiener's attack
|
1,283
|
42
|
B
|
High
|
479
|
NTRUEncrypt
|
1,277
|
42
|
C
|
Mid
|
480
|
RIPEMD
|
1,275
|
42
|
C
|
Unknown
|
481
|
Overview of news media phone hacking scandals
|
1,269
|
42
|
B
|
Low
|
482
|
Format-preserving encryption
|
1,268
|
42
|
Start
|
High
|
483
|
Oblivious transfer
|
1,267
|
42
|
Start
|
Unknown
|
484
|
SegWit
|
1,265
|
42
|
Start
|
Low
|
485
|
Station HYPO
|
1,259
|
41
|
Start
|
Low
|
486
|
Snowflake (software)
|
1,257
|
41
|
Start
|
Low
|
487
|
Content Scramble System
|
1,250
|
41
|
Start
|
Mid
|
488
|
Keybase
|
1,246
|
41
|
Start
|
Low
|
489
|
Perfect Dark (P2P)
|
1,239
|
41
|
C
|
Low
|
490
|
AES-GCM-SIV
|
1,222
|
40
|
Start
|
Unknown
|
491
|
Four-square cipher
|
1,215
|
40
|
C
|
Unknown
|
492
|
Proof of space
|
1,197
|
39
|
Start
|
Low
|
493
|
Chosen-ciphertext attack
|
1,195
|
39
|
Start
|
High
|
494
|
Fuzzy hashing
|
1,195
|
39
|
C
|
Low
|
495
|
Ring signature
|
1,189
|
39
|
Start
|
Mid
|
496
|
Kasiski examination
|
1,188
|
39
|
Unknown
|
Unknown
|
497
|
Hash-based cryptography
|
1,186
|
39
|
Start
|
Low
|
498
|
GOST (block cipher)
|
1,181
|
39
|
Start
|
Mid
|
499
|
Visual cryptography
|
1,175
|
39
|
Unknown
|
Unknown
|
500
|
Verifiable random function
|
1,174
|
39
|
Start
|
Low
|