Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List[edit]

Period: 2024-05-01 to 2024-05-31

Total views: 7,105,588

Updated: 02:56, 6 June 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 877,063 28,292 B High
2 Telegram (software) 437,155 14,101 B Mid
3 Alan Turing 307,349 9,914 GA Top
4 Bitcoin 165,049 5,324 B High
5 The Imitation Game 142,962 4,611 C Mid
6 WikiLeaks 131,930 4,255 B Low
7 Cryptocurrency 113,186 3,651 C High
8 Kryptos 109,344 3,527 C Low
9 Tor (network) 107,450 3,466 B Mid
10 Enigma machine 96,787 3,122 C High
11 Transport Layer Security 74,240 2,394 B Top
12 HTTPS 73,738 2,378 C High
13 Voynich manuscript 66,827 2,155 B Low
14 Blockchain 66,057 2,130 B High
15 Virtual private network 66,014 2,129 C Mid
16 Joan Clarke 64,650 2,085 C Mid
17 WhatsApp University 63,200 2,038 Start Low
18 National Security Agency 62,376 2,012 C High
19 RSA (cryptosystem) 61,056 1,969 C Top
20 Diffie–Hellman key exchange 55,159 1,779 C Top
21 Changpeng Zhao 53,814 1,735 Start Low
22 Dogecoin 53,148 1,714 C Low
23 Advanced Encryption Standard 51,673 1,666 B Top
24 HTTP Strict Transport Security 44,551 1,437 C Low
25 Cryptography 44,192 1,425 C Top
26 Signal (messaging app) 41,718 1,345 C Mid
27 SHA-2 41,216 1,329 C Top
28 Darknet market 40,903 1,319 B Mid
29 Secure Shell 40,832 1,317 C High
30 Public-key cryptography 39,466 1,273 C Top
31 MD5 38,163 1,231 C Top
32 Password 37,823 1,220 C Top
33 Block cipher mode of operation 36,521 1,178 C Top
34 Sator Square 34,115 1,100 B Low
35 Vigenère cipher 33,739 1,088 B Low
36 Digital signature 32,450 1,046 C Top
37 Caesar cipher 32,394 1,044 FA High
38 Bletchley Park 31,650 1,020 B High
39 Vitalik Buterin 31,019 1,000 C Low
40 Man-in-the-middle attack 30,889 996 C Mid
41 Zimmermann Telegram 30,796 993 B High
42 History of bitcoin 29,993 967 C Low
43 Cryptanalysis of the Enigma 29,030 936 C Mid
44 Information theory 26,513 855 B Top
45 Knapsack problem 26,426 852 C Mid
46 Cryptographic hash function 26,215 845 C Top
47 HMAC 26,025 839 C High
48 Encryption 25,961 837 C Top
49 Pretty Good Privacy 25,432 820 B High
50 GCHQ 25,362 818 B Low
51 Claude Shannon 24,579 792 C Top
52 Proton Mail 24,385 786 C Low
53 SHA-1 23,851 769 C Top
54 Active Directory 23,727 765 C Low
55 Trusted Platform Module 22,793 735 C Mid
56 Steganography 22,168 715 B High
57 Information security 21,915 706 B Top
58 Zero-knowledge proof 20,956 676 C Top
59 I2P 20,874 673 B Low
60 NordVPN 20,862 672 C Mid
61 Bombe 20,222 652 B Mid
62 Elliptic-curve cryptography 20,175 650 C High
63 Merkle tree 19,930 642 C Mid
64 Letter frequency 19,789 638 B Low
65 Wi-Fi Protected Access 19,785 638 C Mid
66 Keychain (software) 19,662 634 Start Unknown
67 Cipher 19,555 630 C Top
68 Certificate authority 19,061 614 C High
69 Public key infrastructure 18,959 611 C Top
70 Vault 7 18,587 599 C Mid
71 Post-quantum cryptography 18,490 596 C High
72 One-time pad 18,230 588 C Top
73 Digital rights management 17,567 566 B High
74 Kerberos (protocol) 17,555 566 C High
75 Rainbow table 17,499 564 C High
76 ROT13 16,754 540 C Mid
77 Homomorphic encryption 16,691 538 C High
78 One-time password 15,810 510 C Mid
79 Secure Hash Algorithms 15,656 505 Start High
80 Ultra (cryptography) 15,593 503 C High
81 Bcrypt 15,276 492 C Mid
82 OpenVPN 15,103 487 C Mid
83 Diplomatic bag 14,859 479 Start Low
84 Code talker 14,642 472 B Low
85 Phone hacking 14,583 470 Start Mid
86 Symmetric-key algorithm 14,540 469 Start Top
87 Data Encryption Standard 14,478 467 C Top
88 Elliptic Curve Digital Signature Algorithm 14,448 466 C High
89 Salt (cryptography) 14,448 466 Start High
90 Conel Hugh O'Donel Alexander 14,127 455 Start Low
91 .onion 13,964 450 C Low
92 SHA-3 13,767 444 Start Mid
93 Shiba Inu (cryptocurrency) 13,673 441 Start Low
94 Hyphanet 13,534 436 B Mid
95 Authentication 13,406 432 C High
96 Public key certificate 13,290 428 C Top
97 SSH File Transfer Protocol 13,278 428 Start Unknown
98 Colossus computer 12,977 418 B Mid
99 Galois/Counter Mode 12,865 415 C Mid
100 Brute-force attack 12,847 414 C High
101 Grover's algorithm 12,206 393 C Mid
102 OpenSSL 11,767 379 B High
103 Mullvad 11,648 375 Start Low
104 Alice and Bob 11,590 373 Start Low
105 Integer factorization 11,505 371 B Mid
106 Substitution cipher 11,304 364 Unknown Unknown
107 Cryptanalysis 11,160 360 C High
108 Link 16 10,911 351 Start Low
109 Forward secrecy 10,876 350 C High
110 PBKDF2 10,854 350 C Low
111 Theoretical computer science 10,613 342 B Low
112 Tails (operating system) 10,411 335 Start Low
113 Shamir's secret sharing 10,354 334 C High
114 Message authentication code 10,200 329 C Top
115 Beale ciphers 10,128 326 B Low
116 Cryptographic nonce 10,125 326 Start High
117 Cypherpunk 9,774 315 C Mid
118 Cryptonomicon 9,773 315 C Low
119 InterPlanetary File System 9,665 311 C Low
120 Comparison of BitTorrent clients 9,659 311 List Low
121 Differential privacy 9,642 311 C Unknown
122 Transposition cipher 9,602 309 Unknown Unknown
123 Fort Meade 9,526 307 C Low
124 Bitwarden 9,428 304 C Low
125 Pay television 9,385 302 Start Unknown
126 Authenticated encryption 9,291 299 C Mid
127 Lorenz cipher 9,247 298 C Top
128 EdDSA 9,219 297 C High
129 Quantum key distribution 9,190 296 B Mid
130 ChaCha20-Poly1305 9,067 292 C Low
131 RSA Security 8,965 289 C Unknown
132 Side-channel attack 8,940 288 C High
133 Playfair cipher 8,922 287 Unknown Unknown
134 VeraCrypt 8,888 286 C Mid
135 Birthday attack 8,879 286 C High
136 Babington Plot 8,877 286 C Low
137 The Tor Project 8,767 282 C Mid
138 Elliptic-curve Diffie–Hellman 8,695 280 Start Mid
139 3-D Secure 8,434 272 Start Low
140 Curve25519 8,336 268 C High
141 Password manager 8,291 267 C Low
142 Argon2 8,270 266 C Mid
143 Triple DES 8,260 266 Start Unknown
144 Self-signed certificate 8,225 265 Start Unknown
145 Apple–FBI encryption dispute 8,121 261 C Low
146 Digital Signature Algorithm 8,079 260 C Top
147 Proof of stake 8,063 260 Start Low
148 Confidentiality 7,943 256 C Low
149 Certificate signing request 7,933 255 C Low
150 Marian Rejewski 7,886 254 FA Mid
151 Bitcoin Cash 7,690 248 Start Low
152 Matrix (protocol) 7,653 246 Start Unknown
153 RC4 7,647 246 B Top
154 Discrete logarithm 7,605 245 C Mid
155 PKCS 12 7,542 243 Start Unknown
156 Quantum cryptography 7,540 243 C High
157 Password strength 7,433 239 C High
158 FIPS 140-2 7,373 237 C Mid
159 Block cipher 7,358 237 C Top
160 WebTorrent 7,325 236 Start Unknown
161 Cipher suite 7,305 235 C Top
162 Decentralized finance 7,190 231 Start Low
163 KeePass 7,155 230 C Low
164 Citizenfour 7,146 230 C Low
165 Signal Protocol 7,125 229 C High
166 ElGamal encryption 7,119 229 Start Top
167 TrueCrypt 6,970 224 C Mid
168 Datagram Transport Layer Security 6,763 218 Start Mid
169 Digest access authentication 6,740 217 B Low
170 Kerckhoffs's principle 6,699 216 Start Mid
171 GNU Privacy Guard 6,683 215 C Unknown
172 Wired Equivalent Privacy 6,675 215 C Mid
173 Lavarand 6,671 215 Start Mid
174 Key derivation function 6,655 214 C Low
175 Qubes OS 6,649 214 C Mid
176 IMSI-catcher 6,631 213 Start Mid
177 Electronic signature 6,615 213 C Low
178 Units of information 6,574 212 C Unknown
179 Password cracking 6,550 211 C Mid
180 Salsa20 6,544 211 C Top
181 Utah Data Center 6,534 210 C Mid
182 OpenSSH 6,514 210 C High
183 Litecoin 6,484 209 Start Low
184 Cryptographically secure pseudorandom number generator 6,322 203 C Top
185 Cryptogram 6,248 201 C Mid
186 Bomba (cryptography) 6,187 199 Start Low
187 Stream cipher 6,116 197 Start Top
188 Adi Shamir 6,110 197 Start Unknown
189 Secure multi-party computation 6,097 196 Start High
190 Richard Teng 6,076 196 Start Low
191 Root certificate 6,045 195 Start Low
192 Alastair Denniston 6,036 194 Start Unknown
193 Bitcoin Core 6,021 194 Start Low
194 Blowfish (cipher) 6,005 193 B High
195 Tap code 5,901 190 Start Low
196 Dual EC DRBG 5,889 189 C High
197 Key (cryptography) 5,866 189 Start Unknown
198 Mutual authentication 5,831 188 Stub Low
199 11B-X-1371 5,805 187 GA Low
200 Known-plaintext attack 5,648 182 Start High
201 Hill cipher 5,641 181 Unknown Unknown
202 Lattice-based cryptography 5,626 181 Start Low
203 Deniable encryption 5,615 181 Start High
204 Bitconnect 5,604 180 C Low
205 Rijndael S-box 5,574 179 Start Low
206 Magic (cryptography) 5,554 179 Start Unknown
207 Ciphertext 5,553 179 Start High
208 Illegal number 5,493 177 C Low
209 Padding (cryptography) 5,487 177 Start Unknown
210 KeePassXC 5,328 171 Start Low
211 Boolean function 5,326 171 Start Mid
212 History of cryptography 5,243 169 Start High
213 BLAKE (hash function) 5,241 169 C Mid
214 Initialization vector 5,221 168 C High
215 RSA SecurID 5,179 167 Unknown Unknown
216 Replay attack 5,060 163 C Top
217 Ricky McCormick's encrypted notes 5,032 162 B Low
218 Blockchain game 5,013 161 Start Low
219 Certificate revocation list 4,957 159 C Low
220 Polybius square 4,893 157 Start Mid
221 Automatic Certificate Management Environment 4,891 157 Start Low
222 Frequency analysis 4,847 156 C High
223 AES instruction set 4,836 156 C Low
224 List of ciphertexts 4,831 155 List Low
225 XOR cipher 4,826 155 Stub Mid
226 Polkadot (cryptocurrency) 4,736 152 Start Low
227 Directory service 4,680 150 Start Mid
228 Privacy-Enhanced Mail 4,633 149 Start Low
229 Feistel cipher 4,589 148 Start Unknown
230 Bacon's cipher 4,548 146 Start Low
231 PKCS 4,535 146 List High
232 Session (software) 4,402 142 Start Low
233 Gordon Welchman 4,389 141 C Low
234 I. J. Good 4,385 141 C Low
235 Copiale cipher 4,349 140 Start Low
236 Fork (blockchain) 4,333 139 Start Mid
237 Type B Cipher Machine 4,307 138 Start Low
238 Web of trust 4,268 137 C High
239 AES key schedule 4,249 137 Start Low
240 Avalanche effect 4,214 135 Start High
241 Non-repudiation 4,212 135 Start Mid
242 One-way function 4,207 135 Start Top
243 The Doughnut 4,181 134 GA High
244 Challenge–response authentication 4,169 134 Start Mid
245 Rail fence cipher 4,123 133 Start Low
246 Adam Back 4,071 131 Start Low
247 Bruce Schneier 4,063 131 Start High
248 Padding oracle attack 4,039 130 Stub Unknown
249 Communications Security Establishment 4,024 129 C Mid
250 Cold boot attack 4,024 129 C Low
251 Commitment scheme 4,009 129 C High
252 Key size 4,007 129 C High
253 Plaintext 3,975 128 Start High
254 Special Collection Service 3,970 128 C Low
255 Supply chain attack 3,969 128 C Low
256 Harvest now, decrypt later 3,958 127 Start Low
257 Cryptocurrency tumbler 3,947 127 Start Unknown
258 NIST Post-Quantum Cryptography Standardization 3,923 126 C Mid
259 Digital watermarking 3,906 126 B Mid
260 Disk encryption 3,895 125 C High
261 S-box 3,882 125 Start Top
262 Schnorr signature 3,858 124 C High
263 Cryptographic protocol 3,841 123 Start High
264 PKCS 1 3,834 123 C Mid
265 Australian Signals Directorate 3,817 123 C Low
266 Polyalphabetic cipher 3,783 122 Start Unknown
267 Dilly Knox 3,775 121 B Unknown
268 Elliptic curve point multiplication 3,742 120 C Mid
269 PKCS 11 3,730 120 Unknown Unknown
270 Digital renminbi 3,729 120 B High
271 K-anonymity 3,690 119 Start Mid
272 Book cipher 3,677 118 C Low
273 PKCS 7 3,645 117 Start Low
274 SipHash 3,631 117 Start Low
275 Crypto Wars 3,614 116 Start High
276 Atbash 3,605 116 Stub Low
277 Key exchange 3,562 114 Start Unknown
278 Bitcoin scalability problem 3,559 114 C Low
279 Merkle–Damgård construction 3,555 114 C Unknown
280 Subject Alternative Name 3,506 113 Stub Mid
281 Len Sassaman 3,503 113 Start Unknown
282 Collision attack 3,459 111 Start High
283 Elizebeth Smith Friedman 3,431 110 C Mid
284 Communications security 3,386 109 Start Mid
285 Daniel J. Bernstein 3,381 109 C Mid
286 David Chaum 3,343 107 C Low
287 Timing attack 3,319 107 C High
288 Whitfield Diffie 3,298 106 B High
289 Data anonymization 3,272 105 Start Mid
290 Threema 3,272 105 C Unknown
291 Non-interactive zero-knowledge proof 3,269 105 Start Low
292 Quantum network 3,263 105 C Low
293 Optimal asymmetric encryption padding 3,249 104 Start High
294 Length extension attack 3,248 104 Start Unknown
295 Encrypting File System 3,246 104 B Unknown
296 Whonix 3,222 103 Start Mid
297 Disk encryption theory 3,221 103 C Unknown
298 List of bitcoin forks 3,221 103 List Low
299 Crypto-anarchy 3,216 103 Start High
300 Code signing 3,164 102 C Low
301 Crypto AG 3,154 101 C High
302 Comparison of SSH clients 3,147 101 List Low
303 Dictionary attack 3,084 99 C Unknown
304 Hashcash 3,046 98 Start Unknown
305 Scrambler 3,044 98 C Unknown
306 IEEE 802.11i-2004 3,035 97 C Mid
307 Twofish 3,007 97 Start High
308 Pre-shared key 2,998 96 Start Mid
309 Enigma rotor details 2,996 96 Start Mid
310 BB84 2,966 95 Start Low
311 RSA Factoring Challenge 2,965 95 Start Low
312 Wildcard certificate 2,936 94 Start Unknown
313 PKCS 8 2,887 93 Stub Unknown
314 Paillier cryptosystem 2,879 92 Start High
315 Affine cipher 2,860 92 C Low
316 Banburismus 2,854 92 C Low
317 Classical cipher 2,845 91 Start Top
318 Arthur Scherbius 2,844 91 Start Mid
319 Data at rest 2,837 91 C Mid
320 Comparison of disk encryption software 2,817 90 List High
321 Phil Zimmermann 2,776 89 Start Mid
322 HKDF 2,776 89 Start Unknown
323 Keygen 2,773 89 C Low
324 Tox (protocol) 2,733 88 C Low
325 Encryption software 2,720 87 Start Top
326 Authenticator 2,717 87 Start Unknown
327 Preimage attack 2,697 87 Stub Unknown
328 FIPS 140 2,684 86 Start Mid
329 Physical unclonable function 2,683 86 Start Unknown
330 Autokey cipher 2,675 86 C Mid
331 CCM mode 2,670 86 Start High
332 Certificate Transparency 2,656 85 C High
333 Off-the-record messaging 2,647 85 Start Unknown
334 Clipper chip 2,644 85 C High
335 Algorand 2,638 85 B Low
336 Meet-in-the-middle attack 2,624 84 C High
337 Cryptanalysis of the Lorenz cipher 2,602 83 C High
338 Reception and criticism of WhatsApp security and privacy features 2,602 83 C Low
339 Confusion and diffusion 2,596 83 Start Mid
340 Pepper (cryptography) 2,596 83 Start Low
341 Zcash 2,589 83 Start Low
342 DNS Certification Authority Authorization 2,577 83 GA Low
343 DNS-based Authentication of Named Entities 2,569 82 C Mid
344 Open Whisper Systems 2,566 82 B Unknown
345 Key management 2,558 82 Unknown Unknown
346 Charlie Lee (computer scientist) 2,553 82 Start Low
347 William Binney (intelligence official) 2,531 81 Start Mid
348 Martin Hellman 2,507 80 Start High
349 Cyrillic Projector 2,491 80 Start Low
350 Comparison of cryptographic hash functions 2,486 80 List Low
351 Strong cryptography 2,459 79 Unknown Unknown
352 Ralph Merkle 2,458 79 C High
353 Trapdoor function 2,458 79 Start High
354 Dm-crypt 2,453 79 Start Low
355 Dorabella Cipher 2,447 78 Unknown Unknown
356 Hash chain 2,440 78 Start Unknown
357 Baby-step giant-step 2,439 78 C Unknown
358 AES implementations 2,438 78 List Low
359 Entrust 2,434 78 Start Low
360 W. T. Tutte 2,427 78 C Mid
361 Advanced Encryption Standard process 2,424 78 C Mid
362 Secret sharing 2,418 78 B High
363 NSAKEY 2,415 77 C High
364 Export of cryptography from the United States 2,394 77 C Unknown
365 Bullrun (decryption program) 2,392 77 B Low
366 Filecoin 2,391 77 Stub Low
367 FIPS 140-3 2,389 77 C Low
368 HTTP Public Key Pinning 2,387 77 C Mid
369 Bouncy Castle (cryptography) 2,360 76 Start Unknown
370 Rijndael MixColumns 2,332 75 Start Low
371 Trusted Computing 2,326 75 C Mid
372 William F. Friedman 2,301 74 C Unknown
373 RSA problem 2,297 74 Start Top
374 Comparison of cryptography libraries 2,286 73 List Unknown
375 Lenstra elliptic-curve factorization 2,275 73 C Low
376 Mumble (software) 2,269 73 C Unknown
377 Opportunistic TLS 2,258 72 Start Mid
378 Shugborough inscription 2,244 72 Start Low
379 Clock drift 2,241 72 C Low
380 Security level 2,239 72 Stub Mid
381 Privacy and blockchain 2,237 72 C Low
382 Double Ratchet Algorithm 2,128 68 Start Low
383 Anonymous P2P 2,127 68 C Low
384 Edward Scheidt 2,123 68 Start Low
385 Key disclosure law 2,121 68 C Low
386 Chosen-plaintext attack 2,108 68 Stub Unknown
387 CBC-MAC 2,096 67 C High
388 ElGamal signature scheme 2,094 67 Start Top
389 Ciphertext indistinguishability 2,083 67 C High
390 Coppersmith's attack 2,082 67 B High
391 Key stretching 2,064 66 Start Unknown
392 Rabin cryptosystem 2,058 66 Start Low
393 Comparison of TLS implementations 2,051 66 List High
394 Leo Marks 2,050 66 B Unknown
395 FileVault 2,034 65 C Mid
396 Lucifer (cipher) 2,032 65 Start Unknown
397 Ross J. Anderson 2,012 64 C Mid
398 Key encapsulation mechanism 1,991 64 Start High
399 Red/black concept 1,985 64 Stub Unknown
400 Temporal Key Integrity Protocol 1,983 63 C Low
401 Tor2web 1,982 63 Start Low
402 Content Authenticity Initiative 1,981 63 C Low
403 MD4 1,972 63 Start Low
404 Jami (software) 1,957 63 Start Unknown
405 ADFGVX cipher 1,948 62 Unknown Unknown
406 Needham–Schroeder protocol 1,947 62 Start Mid
407 Overview of news media phone hacking scandals 1,947 62 B Low
408 Orbot 1,933 62 Stub Low
409 Tabula recta 1,932 62 Unknown Unknown
410 Differential cryptanalysis 1,914 61 B High
411 Rotor machine 1,907 61 Unknown Unknown
412 Crypt (C) 1,905 61 C High
413 Trusted timestamping 1,893 61 Start Unknown
414 Blind signature 1,889 60 C Mid
415 Digital signature forgery 1,881 60 Start High
416 Cryptographic primitive 1,873 60 Start Top
417 Briar (software) 1,868 60 Start Low
418 Government Communications Security Bureau 1,851 59 B Low
419 Poly1305 1,849 59 Start Top
420 Hybrid cryptosystem 1,843 59 Start High
421 Typex 1,838 59 Start Unknown
422 SIGABA 1,836 59 C High
423 One-key MAC 1,819 58 Start Low
424 Cipher Bureau (Poland) 1,786 57 GA Low
425 Power analysis 1,775 57 Unknown Unknown
426 Generic Security Services Application Program Interface 1,770 57 Start Low
427 List of things named after Alan Turing 1,766 56 List Low
428 UltraViolet (website) 1,764 56 C Low
429 SegWit 1,762 56 Start Low
430 Papyrus Oxyrhynchus 90 1,759 56 Start Low
431 Advanced Access Content System 1,748 56 C Mid
432 BLS digital signature 1,747 56 Start Mid
433 DES supplementary material 1,742 56 C Low
434 Wiener's attack 1,740 56 B High
435 Simultaneous Authentication of Equals 1,732 55 Start High
436 SecureDrop 1,729 55 Start Mid
437 Proof of authority 1,728 55 Start Low
438 List of cryptographers 1,721 55 List Low
439 Blaise de Vigenère 1,715 55 Start Unknown
440 FreeOTP 1,714 55 Start Low
441 Null cipher 1,709 55 Stub Low
442 Tiny Encryption Algorithm 1,702 54 Unknown Unknown
443 Multiple encryption 1,701 54 Unknown Unknown
444 Cryptovirology 1,693 54 Start Mid
445 Word square 1,692 54 C Low
446 Antipodes (sculpture) 1,685 54 Start Low
447 Black Chamber 1,684 54 Unknown Unknown
448 McEliece cryptosystem 1,680 54 C High
449 Collision resistance 1,667 53 Start High
450 D'Agapeyeff cipher 1,659 53 Start Low
451 Roger Dingledine 1,647 53 Start Unknown
452 GNUnet 1,642 52 B Low
453 Information-theoretic security 1,635 52 Start Top
454 Always-on DRM 1,634 52 Start Low
455 Public key fingerprint 1,632 52 Start Mid
456 Code (cryptography) 1,631 52 Start Top
457 Downgrade attack 1,630 52 Start Mid
458 Blum Blum Shub 1,626 52 Start High
459 Challenge-Handshake Authentication Protocol 1,615 52 Start Low
460 Hidden message 1,615 52 Start Low
461 Friend-to-friend 1,615 52 Start Low
462 Max Newman 1,613 52 B Low
463 International Data Encryption Algorithm 1,607 51 C Unknown
464 DeCSS 1,607 51 C Mid
465 Ring signature 1,596 51 Start Mid
466 Visual cryptography 1,594 51 Unknown Unknown
467 Integrated Encryption Scheme 1,592 51 Start Low
468 ZeroNet 1,592 51 Start Low
469 Format-preserving encryption 1,569 50 Start High
470 Key-agreement protocol 1,568 50 Start Top
471 LibreSSL 1,565 50 Start High
472 Berlekamp–Massey algorithm 1,564 50 Start Unknown
473 Serpent (cipher) 1,561 50 C Low
474 Lamport signature 1,546 49 Start High
475 Codebook 1,542 49 Stub Unknown
476 Garlic routing 1,541 49 Stub Unknown
477 Four-square cipher 1,534 49 C Unknown
478 Secret decoder ring 1,530 49 Start Low
479 Random oracle 1,529 49 Start Low
480 A5/1 1,528 49 B High
481 National Cryptologic Museum 1,528 49 C Mid
482 David Wheeler (computer scientist) 1,524 49 Start Low
483 Secure cryptoprocessor 1,516 48 C Mid
484 Two-square cipher 1,509 48 Unknown Unknown
485 Kasiski examination 1,504 48 Unknown Unknown
486 SYN cookies 1,502 48 Start Unknown
487 Nothing-up-my-sleeve number 1,497 48 C Low
488 SIGSALY 1,494 48 C Low
489 NTRUEncrypt 1,492 48 C Mid
490 Snowflake (software) 1,485 47 Start Low
491 Genevieve Grotjan Feinstein 1,484 47 Start Mid
492 RIPEMD 1,482 47 C Unknown
493 Keybase 1,474 47 Start Low
494 Chosen-ciphertext attack 1,473 47 Start High
495 Interactive proof system 1,463 47 Start High
496 Perfect Dark (P2P) 1,456 46 C Low
497 MD6 1,451 46 Start High
498 Oblivious transfer 1,443 46 Start Unknown
499 Nihilist cipher 1,443 46 Unknown Unknown
500 Taher Elgamal 1,427 46 C Unknown