From Wikipedia, the free encyclopedia
This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
Period: 2024-05-01 to 2024-05-31
Total views: 7,105,588
Updated: 02:56, 6 June 2024 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
877,063
|
28,292
|
B
|
High
|
2
|
Telegram (software)
|
437,155
|
14,101
|
B
|
Mid
|
3
|
Alan Turing
|
307,349
|
9,914
|
GA
|
Top
|
4
|
Bitcoin
|
165,049
|
5,324
|
B
|
High
|
5
|
The Imitation Game
|
142,962
|
4,611
|
C
|
Mid
|
6
|
WikiLeaks
|
131,930
|
4,255
|
B
|
Low
|
7
|
Cryptocurrency
|
113,186
|
3,651
|
C
|
High
|
8
|
Kryptos
|
109,344
|
3,527
|
C
|
Low
|
9
|
Tor (network)
|
107,450
|
3,466
|
B
|
Mid
|
10
|
Enigma machine
|
96,787
|
3,122
|
C
|
High
|
11
|
Transport Layer Security
|
74,240
|
2,394
|
B
|
Top
|
12
|
HTTPS
|
73,738
|
2,378
|
C
|
High
|
13
|
Voynich manuscript
|
66,827
|
2,155
|
B
|
Low
|
14
|
Blockchain
|
66,057
|
2,130
|
B
|
High
|
15
|
Virtual private network
|
66,014
|
2,129
|
C
|
Mid
|
16
|
Joan Clarke
|
64,650
|
2,085
|
C
|
Mid
|
17
|
WhatsApp University
|
63,200
|
2,038
|
Start
|
Low
|
18
|
National Security Agency
|
62,376
|
2,012
|
C
|
High
|
19
|
RSA (cryptosystem)
|
61,056
|
1,969
|
C
|
Top
|
20
|
Diffie–Hellman key exchange
|
55,159
|
1,779
|
C
|
Top
|
21
|
Changpeng Zhao
|
53,814
|
1,735
|
Start
|
Low
|
22
|
Dogecoin
|
53,148
|
1,714
|
C
|
Low
|
23
|
Advanced Encryption Standard
|
51,673
|
1,666
|
B
|
Top
|
24
|
HTTP Strict Transport Security
|
44,551
|
1,437
|
C
|
Low
|
25
|
Cryptography
|
44,192
|
1,425
|
C
|
Top
|
26
|
Signal (messaging app)
|
41,718
|
1,345
|
C
|
Mid
|
27
|
SHA-2
|
41,216
|
1,329
|
C
|
Top
|
28
|
Darknet market
|
40,903
|
1,319
|
B
|
Mid
|
29
|
Secure Shell
|
40,832
|
1,317
|
C
|
High
|
30
|
Public-key cryptography
|
39,466
|
1,273
|
C
|
Top
|
31
|
MD5
|
38,163
|
1,231
|
C
|
Top
|
32
|
Password
|
37,823
|
1,220
|
C
|
Top
|
33
|
Block cipher mode of operation
|
36,521
|
1,178
|
C
|
Top
|
34
|
Sator Square
|
34,115
|
1,100
|
B
|
Low
|
35
|
Vigenère cipher
|
33,739
|
1,088
|
B
|
Low
|
36
|
Digital signature
|
32,450
|
1,046
|
C
|
Top
|
37
|
Caesar cipher
|
32,394
|
1,044
|
FA
|
High
|
38
|
Bletchley Park
|
31,650
|
1,020
|
B
|
High
|
39
|
Vitalik Buterin
|
31,019
|
1,000
|
C
|
Low
|
40
|
Man-in-the-middle attack
|
30,889
|
996
|
C
|
Mid
|
41
|
Zimmermann Telegram
|
30,796
|
993
|
B
|
High
|
42
|
History of bitcoin
|
29,993
|
967
|
C
|
Low
|
43
|
Cryptanalysis of the Enigma
|
29,030
|
936
|
C
|
Mid
|
44
|
Information theory
|
26,513
|
855
|
B
|
Top
|
45
|
Knapsack problem
|
26,426
|
852
|
C
|
Mid
|
46
|
Cryptographic hash function
|
26,215
|
845
|
C
|
Top
|
47
|
HMAC
|
26,025
|
839
|
C
|
High
|
48
|
Encryption
|
25,961
|
837
|
C
|
Top
|
49
|
Pretty Good Privacy
|
25,432
|
820
|
B
|
High
|
50
|
GCHQ
|
25,362
|
818
|
B
|
Low
|
51
|
Claude Shannon
|
24,579
|
792
|
C
|
Top
|
52
|
Proton Mail
|
24,385
|
786
|
C
|
Low
|
53
|
SHA-1
|
23,851
|
769
|
C
|
Top
|
54
|
Active Directory
|
23,727
|
765
|
C
|
Low
|
55
|
Trusted Platform Module
|
22,793
|
735
|
C
|
Mid
|
56
|
Steganography
|
22,168
|
715
|
B
|
High
|
57
|
Information security
|
21,915
|
706
|
B
|
Top
|
58
|
Zero-knowledge proof
|
20,956
|
676
|
C
|
Top
|
59
|
I2P
|
20,874
|
673
|
B
|
Low
|
60
|
NordVPN
|
20,862
|
672
|
C
|
Mid
|
61
|
Bombe
|
20,222
|
652
|
B
|
Mid
|
62
|
Elliptic-curve cryptography
|
20,175
|
650
|
C
|
High
|
63
|
Merkle tree
|
19,930
|
642
|
C
|
Mid
|
64
|
Letter frequency
|
19,789
|
638
|
B
|
Low
|
65
|
Wi-Fi Protected Access
|
19,785
|
638
|
C
|
Mid
|
66
|
Keychain (software)
|
19,662
|
634
|
Start
|
Unknown
|
67
|
Cipher
|
19,555
|
630
|
C
|
Top
|
68
|
Certificate authority
|
19,061
|
614
|
C
|
High
|
69
|
Public key infrastructure
|
18,959
|
611
|
C
|
Top
|
70
|
Vault 7
|
18,587
|
599
|
C
|
Mid
|
71
|
Post-quantum cryptography
|
18,490
|
596
|
C
|
High
|
72
|
One-time pad
|
18,230
|
588
|
C
|
Top
|
73
|
Digital rights management
|
17,567
|
566
|
B
|
High
|
74
|
Kerberos (protocol)
|
17,555
|
566
|
C
|
High
|
75
|
Rainbow table
|
17,499
|
564
|
C
|
High
|
76
|
ROT13
|
16,754
|
540
|
C
|
Mid
|
77
|
Homomorphic encryption
|
16,691
|
538
|
C
|
High
|
78
|
One-time password
|
15,810
|
510
|
C
|
Mid
|
79
|
Secure Hash Algorithms
|
15,656
|
505
|
Start
|
High
|
80
|
Ultra (cryptography)
|
15,593
|
503
|
C
|
High
|
81
|
Bcrypt
|
15,276
|
492
|
C
|
Mid
|
82
|
OpenVPN
|
15,103
|
487
|
C
|
Mid
|
83
|
Diplomatic bag
|
14,859
|
479
|
Start
|
Low
|
84
|
Code talker
|
14,642
|
472
|
B
|
Low
|
85
|
Phone hacking
|
14,583
|
470
|
Start
|
Mid
|
86
|
Symmetric-key algorithm
|
14,540
|
469
|
Start
|
Top
|
87
|
Data Encryption Standard
|
14,478
|
467
|
C
|
Top
|
88
|
Elliptic Curve Digital Signature Algorithm
|
14,448
|
466
|
C
|
High
|
89
|
Salt (cryptography)
|
14,448
|
466
|
Start
|
High
|
90
|
Conel Hugh O'Donel Alexander
|
14,127
|
455
|
Start
|
Low
|
91
|
.onion
|
13,964
|
450
|
C
|
Low
|
92
|
SHA-3
|
13,767
|
444
|
Start
|
Mid
|
93
|
Shiba Inu (cryptocurrency)
|
13,673
|
441
|
Start
|
Low
|
94
|
Hyphanet
|
13,534
|
436
|
B
|
Mid
|
95
|
Authentication
|
13,406
|
432
|
C
|
High
|
96
|
Public key certificate
|
13,290
|
428
|
C
|
Top
|
97
|
SSH File Transfer Protocol
|
13,278
|
428
|
Start
|
Unknown
|
98
|
Colossus computer
|
12,977
|
418
|
B
|
Mid
|
99
|
Galois/Counter Mode
|
12,865
|
415
|
C
|
Mid
|
100
|
Brute-force attack
|
12,847
|
414
|
C
|
High
|
101
|
Grover's algorithm
|
12,206
|
393
|
C
|
Mid
|
102
|
OpenSSL
|
11,767
|
379
|
B
|
High
|
103
|
Mullvad
|
11,648
|
375
|
Start
|
Low
|
104
|
Alice and Bob
|
11,590
|
373
|
Start
|
Low
|
105
|
Integer factorization
|
11,505
|
371
|
B
|
Mid
|
106
|
Substitution cipher
|
11,304
|
364
|
Unknown
|
Unknown
|
107
|
Cryptanalysis
|
11,160
|
360
|
C
|
High
|
108
|
Link 16
|
10,911
|
351
|
Start
|
Low
|
109
|
Forward secrecy
|
10,876
|
350
|
C
|
High
|
110
|
PBKDF2
|
10,854
|
350
|
C
|
Low
|
111
|
Theoretical computer science
|
10,613
|
342
|
B
|
Low
|
112
|
Tails (operating system)
|
10,411
|
335
|
Start
|
Low
|
113
|
Shamir's secret sharing
|
10,354
|
334
|
C
|
High
|
114
|
Message authentication code
|
10,200
|
329
|
C
|
Top
|
115
|
Beale ciphers
|
10,128
|
326
|
B
|
Low
|
116
|
Cryptographic nonce
|
10,125
|
326
|
Start
|
High
|
117
|
Cypherpunk
|
9,774
|
315
|
C
|
Mid
|
118
|
Cryptonomicon
|
9,773
|
315
|
C
|
Low
|
119
|
InterPlanetary File System
|
9,665
|
311
|
C
|
Low
|
120
|
Comparison of BitTorrent clients
|
9,659
|
311
|
List
|
Low
|
121
|
Differential privacy
|
9,642
|
311
|
C
|
Unknown
|
122
|
Transposition cipher
|
9,602
|
309
|
Unknown
|
Unknown
|
123
|
Fort Meade
|
9,526
|
307
|
C
|
Low
|
124
|
Bitwarden
|
9,428
|
304
|
C
|
Low
|
125
|
Pay television
|
9,385
|
302
|
Start
|
Unknown
|
126
|
Authenticated encryption
|
9,291
|
299
|
C
|
Mid
|
127
|
Lorenz cipher
|
9,247
|
298
|
C
|
Top
|
128
|
EdDSA
|
9,219
|
297
|
C
|
High
|
129
|
Quantum key distribution
|
9,190
|
296
|
B
|
Mid
|
130
|
ChaCha20-Poly1305
|
9,067
|
292
|
C
|
Low
|
131
|
RSA Security
|
8,965
|
289
|
C
|
Unknown
|
132
|
Side-channel attack
|
8,940
|
288
|
C
|
High
|
133
|
Playfair cipher
|
8,922
|
287
|
Unknown
|
Unknown
|
134
|
VeraCrypt
|
8,888
|
286
|
C
|
Mid
|
135
|
Birthday attack
|
8,879
|
286
|
C
|
High
|
136
|
Babington Plot
|
8,877
|
286
|
C
|
Low
|
137
|
The Tor Project
|
8,767
|
282
|
C
|
Mid
|
138
|
Elliptic-curve Diffie–Hellman
|
8,695
|
280
|
Start
|
Mid
|
139
|
3-D Secure
|
8,434
|
272
|
Start
|
Low
|
140
|
Curve25519
|
8,336
|
268
|
C
|
High
|
141
|
Password manager
|
8,291
|
267
|
C
|
Low
|
142
|
Argon2
|
8,270
|
266
|
C
|
Mid
|
143
|
Triple DES
|
8,260
|
266
|
Start
|
Unknown
|
144
|
Self-signed certificate
|
8,225
|
265
|
Start
|
Unknown
|
145
|
Apple–FBI encryption dispute
|
8,121
|
261
|
C
|
Low
|
146
|
Digital Signature Algorithm
|
8,079
|
260
|
C
|
Top
|
147
|
Proof of stake
|
8,063
|
260
|
Start
|
Low
|
148
|
Confidentiality
|
7,943
|
256
|
C
|
Low
|
149
|
Certificate signing request
|
7,933
|
255
|
C
|
Low
|
150
|
Marian Rejewski
|
7,886
|
254
|
FA
|
Mid
|
151
|
Bitcoin Cash
|
7,690
|
248
|
Start
|
Low
|
152
|
Matrix (protocol)
|
7,653
|
246
|
Start
|
Unknown
|
153
|
RC4
|
7,647
|
246
|
B
|
Top
|
154
|
Discrete logarithm
|
7,605
|
245
|
C
|
Mid
|
155
|
PKCS 12
|
7,542
|
243
|
Start
|
Unknown
|
156
|
Quantum cryptography
|
7,540
|
243
|
C
|
High
|
157
|
Password strength
|
7,433
|
239
|
C
|
High
|
158
|
FIPS 140-2
|
7,373
|
237
|
C
|
Mid
|
159
|
Block cipher
|
7,358
|
237
|
C
|
Top
|
160
|
WebTorrent
|
7,325
|
236
|
Start
|
Unknown
|
161
|
Cipher suite
|
7,305
|
235
|
C
|
Top
|
162
|
Decentralized finance
|
7,190
|
231
|
Start
|
Low
|
163
|
KeePass
|
7,155
|
230
|
C
|
Low
|
164
|
Citizenfour
|
7,146
|
230
|
C
|
Low
|
165
|
Signal Protocol
|
7,125
|
229
|
C
|
High
|
166
|
ElGamal encryption
|
7,119
|
229
|
Start
|
Top
|
167
|
TrueCrypt
|
6,970
|
224
|
C
|
Mid
|
168
|
Datagram Transport Layer Security
|
6,763
|
218
|
Start
|
Mid
|
169
|
Digest access authentication
|
6,740
|
217
|
B
|
Low
|
170
|
Kerckhoffs's principle
|
6,699
|
216
|
Start
|
Mid
|
171
|
GNU Privacy Guard
|
6,683
|
215
|
C
|
Unknown
|
172
|
Wired Equivalent Privacy
|
6,675
|
215
|
C
|
Mid
|
173
|
Lavarand
|
6,671
|
215
|
Start
|
Mid
|
174
|
Key derivation function
|
6,655
|
214
|
C
|
Low
|
175
|
Qubes OS
|
6,649
|
214
|
C
|
Mid
|
176
|
IMSI-catcher
|
6,631
|
213
|
Start
|
Mid
|
177
|
Electronic signature
|
6,615
|
213
|
C
|
Low
|
178
|
Units of information
|
6,574
|
212
|
C
|
Unknown
|
179
|
Password cracking
|
6,550
|
211
|
C
|
Mid
|
180
|
Salsa20
|
6,544
|
211
|
C
|
Top
|
181
|
Utah Data Center
|
6,534
|
210
|
C
|
Mid
|
182
|
OpenSSH
|
6,514
|
210
|
C
|
High
|
183
|
Litecoin
|
6,484
|
209
|
Start
|
Low
|
184
|
Cryptographically secure pseudorandom number generator
|
6,322
|
203
|
C
|
Top
|
185
|
Cryptogram
|
6,248
|
201
|
C
|
Mid
|
186
|
Bomba (cryptography)
|
6,187
|
199
|
Start
|
Low
|
187
|
Stream cipher
|
6,116
|
197
|
Start
|
Top
|
188
|
Adi Shamir
|
6,110
|
197
|
Start
|
Unknown
|
189
|
Secure multi-party computation
|
6,097
|
196
|
Start
|
High
|
190
|
Richard Teng
|
6,076
|
196
|
Start
|
Low
|
191
|
Root certificate
|
6,045
|
195
|
Start
|
Low
|
192
|
Alastair Denniston
|
6,036
|
194
|
Start
|
Unknown
|
193
|
Bitcoin Core
|
6,021
|
194
|
Start
|
Low
|
194
|
Blowfish (cipher)
|
6,005
|
193
|
B
|
High
|
195
|
Tap code
|
5,901
|
190
|
Start
|
Low
|
196
|
Dual EC DRBG
|
5,889
|
189
|
C
|
High
|
197
|
Key (cryptography)
|
5,866
|
189
|
Start
|
Unknown
|
198
|
Mutual authentication
|
5,831
|
188
|
Stub
|
Low
|
199
|
11B-X-1371
|
5,805
|
187
|
GA
|
Low
|
200
|
Known-plaintext attack
|
5,648
|
182
|
Start
|
High
|
201
|
Hill cipher
|
5,641
|
181
|
Unknown
|
Unknown
|
202
|
Lattice-based cryptography
|
5,626
|
181
|
Start
|
Low
|
203
|
Deniable encryption
|
5,615
|
181
|
Start
|
High
|
204
|
Bitconnect
|
5,604
|
180
|
C
|
Low
|
205
|
Rijndael S-box
|
5,574
|
179
|
Start
|
Low
|
206
|
Magic (cryptography)
|
5,554
|
179
|
Start
|
Unknown
|
207
|
Ciphertext
|
5,553
|
179
|
Start
|
High
|
208
|
Illegal number
|
5,493
|
177
|
C
|
Low
|
209
|
Padding (cryptography)
|
5,487
|
177
|
Start
|
Unknown
|
210
|
KeePassXC
|
5,328
|
171
|
Start
|
Low
|
211
|
Boolean function
|
5,326
|
171
|
Start
|
Mid
|
212
|
History of cryptography
|
5,243
|
169
|
Start
|
High
|
213
|
BLAKE (hash function)
|
5,241
|
169
|
C
|
Mid
|
214
|
Initialization vector
|
5,221
|
168
|
C
|
High
|
215
|
RSA SecurID
|
5,179
|
167
|
Unknown
|
Unknown
|
216
|
Replay attack
|
5,060
|
163
|
C
|
Top
|
217
|
Ricky McCormick's encrypted notes
|
5,032
|
162
|
B
|
Low
|
218
|
Blockchain game
|
5,013
|
161
|
Start
|
Low
|
219
|
Certificate revocation list
|
4,957
|
159
|
C
|
Low
|
220
|
Polybius square
|
4,893
|
157
|
Start
|
Mid
|
221
|
Automatic Certificate Management Environment
|
4,891
|
157
|
Start
|
Low
|
222
|
Frequency analysis
|
4,847
|
156
|
C
|
High
|
223
|
AES instruction set
|
4,836
|
156
|
C
|
Low
|
224
|
List of ciphertexts
|
4,831
|
155
|
List
|
Low
|
225
|
XOR cipher
|
4,826
|
155
|
Stub
|
Mid
|
226
|
Polkadot (cryptocurrency)
|
4,736
|
152
|
Start
|
Low
|
227
|
Directory service
|
4,680
|
150
|
Start
|
Mid
|
228
|
Privacy-Enhanced Mail
|
4,633
|
149
|
Start
|
Low
|
229
|
Feistel cipher
|
4,589
|
148
|
Start
|
Unknown
|
230
|
Bacon's cipher
|
4,548
|
146
|
Start
|
Low
|
231
|
PKCS
|
4,535
|
146
|
List
|
High
|
232
|
Session (software)
|
4,402
|
142
|
Start
|
Low
|
233
|
Gordon Welchman
|
4,389
|
141
|
C
|
Low
|
234
|
I. J. Good
|
4,385
|
141
|
C
|
Low
|
235
|
Copiale cipher
|
4,349
|
140
|
Start
|
Low
|
236
|
Fork (blockchain)
|
4,333
|
139
|
Start
|
Mid
|
237
|
Type B Cipher Machine
|
4,307
|
138
|
Start
|
Low
|
238
|
Web of trust
|
4,268
|
137
|
C
|
High
|
239
|
AES key schedule
|
4,249
|
137
|
Start
|
Low
|
240
|
Avalanche effect
|
4,214
|
135
|
Start
|
High
|
241
|
Non-repudiation
|
4,212
|
135
|
Start
|
Mid
|
242
|
One-way function
|
4,207
|
135
|
Start
|
Top
|
243
|
The Doughnut
|
4,181
|
134
|
GA
|
High
|
244
|
Challenge–response authentication
|
4,169
|
134
|
Start
|
Mid
|
245
|
Rail fence cipher
|
4,123
|
133
|
Start
|
Low
|
246
|
Adam Back
|
4,071
|
131
|
Start
|
Low
|
247
|
Bruce Schneier
|
4,063
|
131
|
Start
|
High
|
248
|
Padding oracle attack
|
4,039
|
130
|
Stub
|
Unknown
|
249
|
Communications Security Establishment
|
4,024
|
129
|
C
|
Mid
|
250
|
Cold boot attack
|
4,024
|
129
|
C
|
Low
|
251
|
Commitment scheme
|
4,009
|
129
|
C
|
High
|
252
|
Key size
|
4,007
|
129
|
C
|
High
|
253
|
Plaintext
|
3,975
|
128
|
Start
|
High
|
254
|
Special Collection Service
|
3,970
|
128
|
C
|
Low
|
255
|
Supply chain attack
|
3,969
|
128
|
C
|
Low
|
256
|
Harvest now, decrypt later
|
3,958
|
127
|
Start
|
Low
|
257
|
Cryptocurrency tumbler
|
3,947
|
127
|
Start
|
Unknown
|
258
|
NIST Post-Quantum Cryptography Standardization
|
3,923
|
126
|
C
|
Mid
|
259
|
Digital watermarking
|
3,906
|
126
|
B
|
Mid
|
260
|
Disk encryption
|
3,895
|
125
|
C
|
High
|
261
|
S-box
|
3,882
|
125
|
Start
|
Top
|
262
|
Schnorr signature
|
3,858
|
124
|
C
|
High
|
263
|
Cryptographic protocol
|
3,841
|
123
|
Start
|
High
|
264
|
PKCS 1
|
3,834
|
123
|
C
|
Mid
|
265
|
Australian Signals Directorate
|
3,817
|
123
|
C
|
Low
|
266
|
Polyalphabetic cipher
|
3,783
|
122
|
Start
|
Unknown
|
267
|
Dilly Knox
|
3,775
|
121
|
B
|
Unknown
|
268
|
Elliptic curve point multiplication
|
3,742
|
120
|
C
|
Mid
|
269
|
PKCS 11
|
3,730
|
120
|
Unknown
|
Unknown
|
270
|
Digital renminbi
|
3,729
|
120
|
B
|
High
|
271
|
K-anonymity
|
3,690
|
119
|
Start
|
Mid
|
272
|
Book cipher
|
3,677
|
118
|
C
|
Low
|
273
|
PKCS 7
|
3,645
|
117
|
Start
|
Low
|
274
|
SipHash
|
3,631
|
117
|
Start
|
Low
|
275
|
Crypto Wars
|
3,614
|
116
|
Start
|
High
|
276
|
Atbash
|
3,605
|
116
|
Stub
|
Low
|
277
|
Key exchange
|
3,562
|
114
|
Start
|
Unknown
|
278
|
Bitcoin scalability problem
|
3,559
|
114
|
C
|
Low
|
279
|
Merkle–Damgård construction
|
3,555
|
114
|
C
|
Unknown
|
280
|
Subject Alternative Name
|
3,506
|
113
|
Stub
|
Mid
|
281
|
Len Sassaman
|
3,503
|
113
|
Start
|
Unknown
|
282
|
Collision attack
|
3,459
|
111
|
Start
|
High
|
283
|
Elizebeth Smith Friedman
|
3,431
|
110
|
C
|
Mid
|
284
|
Communications security
|
3,386
|
109
|
Start
|
Mid
|
285
|
Daniel J. Bernstein
|
3,381
|
109
|
C
|
Mid
|
286
|
David Chaum
|
3,343
|
107
|
C
|
Low
|
287
|
Timing attack
|
3,319
|
107
|
C
|
High
|
288
|
Whitfield Diffie
|
3,298
|
106
|
B
|
High
|
289
|
Data anonymization
|
3,272
|
105
|
Start
|
Mid
|
290
|
Threema
|
3,272
|
105
|
C
|
Unknown
|
291
|
Non-interactive zero-knowledge proof
|
3,269
|
105
|
Start
|
Low
|
292
|
Quantum network
|
3,263
|
105
|
C
|
Low
|
293
|
Optimal asymmetric encryption padding
|
3,249
|
104
|
Start
|
High
|
294
|
Length extension attack
|
3,248
|
104
|
Start
|
Unknown
|
295
|
Encrypting File System
|
3,246
|
104
|
B
|
Unknown
|
296
|
Whonix
|
3,222
|
103
|
Start
|
Mid
|
297
|
Disk encryption theory
|
3,221
|
103
|
C
|
Unknown
|
298
|
List of bitcoin forks
|
3,221
|
103
|
List
|
Low
|
299
|
Crypto-anarchy
|
3,216
|
103
|
Start
|
High
|
300
|
Code signing
|
3,164
|
102
|
C
|
Low
|
301
|
Crypto AG
|
3,154
|
101
|
C
|
High
|
302
|
Comparison of SSH clients
|
3,147
|
101
|
List
|
Low
|
303
|
Dictionary attack
|
3,084
|
99
|
C
|
Unknown
|
304
|
Hashcash
|
3,046
|
98
|
Start
|
Unknown
|
305
|
Scrambler
|
3,044
|
98
|
C
|
Unknown
|
306
|
IEEE 802.11i-2004
|
3,035
|
97
|
C
|
Mid
|
307
|
Twofish
|
3,007
|
97
|
Start
|
High
|
308
|
Pre-shared key
|
2,998
|
96
|
Start
|
Mid
|
309
|
Enigma rotor details
|
2,996
|
96
|
Start
|
Mid
|
310
|
BB84
|
2,966
|
95
|
Start
|
Low
|
311
|
RSA Factoring Challenge
|
2,965
|
95
|
Start
|
Low
|
312
|
Wildcard certificate
|
2,936
|
94
|
Start
|
Unknown
|
313
|
PKCS 8
|
2,887
|
93
|
Stub
|
Unknown
|
314
|
Paillier cryptosystem
|
2,879
|
92
|
Start
|
High
|
315
|
Affine cipher
|
2,860
|
92
|
C
|
Low
|
316
|
Banburismus
|
2,854
|
92
|
C
|
Low
|
317
|
Classical cipher
|
2,845
|
91
|
Start
|
Top
|
318
|
Arthur Scherbius
|
2,844
|
91
|
Start
|
Mid
|
319
|
Data at rest
|
2,837
|
91
|
C
|
Mid
|
320
|
Comparison of disk encryption software
|
2,817
|
90
|
List
|
High
|
321
|
Phil Zimmermann
|
2,776
|
89
|
Start
|
Mid
|
322
|
HKDF
|
2,776
|
89
|
Start
|
Unknown
|
323
|
Keygen
|
2,773
|
89
|
C
|
Low
|
324
|
Tox (protocol)
|
2,733
|
88
|
C
|
Low
|
325
|
Encryption software
|
2,720
|
87
|
Start
|
Top
|
326
|
Authenticator
|
2,717
|
87
|
Start
|
Unknown
|
327
|
Preimage attack
|
2,697
|
87
|
Stub
|
Unknown
|
328
|
FIPS 140
|
2,684
|
86
|
Start
|
Mid
|
329
|
Physical unclonable function
|
2,683
|
86
|
Start
|
Unknown
|
330
|
Autokey cipher
|
2,675
|
86
|
C
|
Mid
|
331
|
CCM mode
|
2,670
|
86
|
Start
|
High
|
332
|
Certificate Transparency
|
2,656
|
85
|
C
|
High
|
333
|
Off-the-record messaging
|
2,647
|
85
|
Start
|
Unknown
|
334
|
Clipper chip
|
2,644
|
85
|
C
|
High
|
335
|
Algorand
|
2,638
|
85
|
B
|
Low
|
336
|
Meet-in-the-middle attack
|
2,624
|
84
|
C
|
High
|
337
|
Cryptanalysis of the Lorenz cipher
|
2,602
|
83
|
C
|
High
|
338
|
Reception and criticism of WhatsApp security and privacy features
|
2,602
|
83
|
C
|
Low
|
339
|
Confusion and diffusion
|
2,596
|
83
|
Start
|
Mid
|
340
|
Pepper (cryptography)
|
2,596
|
83
|
Start
|
Low
|
341
|
Zcash
|
2,589
|
83
|
Start
|
Low
|
342
|
DNS Certification Authority Authorization
|
2,577
|
83
|
GA
|
Low
|
343
|
DNS-based Authentication of Named Entities
|
2,569
|
82
|
C
|
Mid
|
344
|
Open Whisper Systems
|
2,566
|
82
|
B
|
Unknown
|
345
|
Key management
|
2,558
|
82
|
Unknown
|
Unknown
|
346
|
Charlie Lee (computer scientist)
|
2,553
|
82
|
Start
|
Low
|
347
|
William Binney (intelligence official)
|
2,531
|
81
|
Start
|
Mid
|
348
|
Martin Hellman
|
2,507
|
80
|
Start
|
High
|
349
|
Cyrillic Projector
|
2,491
|
80
|
Start
|
Low
|
350
|
Comparison of cryptographic hash functions
|
2,486
|
80
|
List
|
Low
|
351
|
Strong cryptography
|
2,459
|
79
|
Unknown
|
Unknown
|
352
|
Ralph Merkle
|
2,458
|
79
|
C
|
High
|
353
|
Trapdoor function
|
2,458
|
79
|
Start
|
High
|
354
|
Dm-crypt
|
2,453
|
79
|
Start
|
Low
|
355
|
Dorabella Cipher
|
2,447
|
78
|
Unknown
|
Unknown
|
356
|
Hash chain
|
2,440
|
78
|
Start
|
Unknown
|
357
|
Baby-step giant-step
|
2,439
|
78
|
C
|
Unknown
|
358
|
AES implementations
|
2,438
|
78
|
List
|
Low
|
359
|
Entrust
|
2,434
|
78
|
Start
|
Low
|
360
|
W. T. Tutte
|
2,427
|
78
|
C
|
Mid
|
361
|
Advanced Encryption Standard process
|
2,424
|
78
|
C
|
Mid
|
362
|
Secret sharing
|
2,418
|
78
|
B
|
High
|
363
|
NSAKEY
|
2,415
|
77
|
C
|
High
|
364
|
Export of cryptography from the United States
|
2,394
|
77
|
C
|
Unknown
|
365
|
Bullrun (decryption program)
|
2,392
|
77
|
B
|
Low
|
366
|
Filecoin
|
2,391
|
77
|
Stub
|
Low
|
367
|
FIPS 140-3
|
2,389
|
77
|
C
|
Low
|
368
|
HTTP Public Key Pinning
|
2,387
|
77
|
C
|
Mid
|
369
|
Bouncy Castle (cryptography)
|
2,360
|
76
|
Start
|
Unknown
|
370
|
Rijndael MixColumns
|
2,332
|
75
|
Start
|
Low
|
371
|
Trusted Computing
|
2,326
|
75
|
C
|
Mid
|
372
|
William F. Friedman
|
2,301
|
74
|
C
|
Unknown
|
373
|
RSA problem
|
2,297
|
74
|
Start
|
Top
|
374
|
Comparison of cryptography libraries
|
2,286
|
73
|
List
|
Unknown
|
375
|
Lenstra elliptic-curve factorization
|
2,275
|
73
|
C
|
Low
|
376
|
Mumble (software)
|
2,269
|
73
|
C
|
Unknown
|
377
|
Opportunistic TLS
|
2,258
|
72
|
Start
|
Mid
|
378
|
Shugborough inscription
|
2,244
|
72
|
Start
|
Low
|
379
|
Clock drift
|
2,241
|
72
|
C
|
Low
|
380
|
Security level
|
2,239
|
72
|
Stub
|
Mid
|
381
|
Privacy and blockchain
|
2,237
|
72
|
C
|
Low
|
382
|
Double Ratchet Algorithm
|
2,128
|
68
|
Start
|
Low
|
383
|
Anonymous P2P
|
2,127
|
68
|
C
|
Low
|
384
|
Edward Scheidt
|
2,123
|
68
|
Start
|
Low
|
385
|
Key disclosure law
|
2,121
|
68
|
C
|
Low
|
386
|
Chosen-plaintext attack
|
2,108
|
68
|
Stub
|
Unknown
|
387
|
CBC-MAC
|
2,096
|
67
|
C
|
High
|
388
|
ElGamal signature scheme
|
2,094
|
67
|
Start
|
Top
|
389
|
Ciphertext indistinguishability
|
2,083
|
67
|
C
|
High
|
390
|
Coppersmith's attack
|
2,082
|
67
|
B
|
High
|
391
|
Key stretching
|
2,064
|
66
|
Start
|
Unknown
|
392
|
Rabin cryptosystem
|
2,058
|
66
|
Start
|
Low
|
393
|
Comparison of TLS implementations
|
2,051
|
66
|
List
|
High
|
394
|
Leo Marks
|
2,050
|
66
|
B
|
Unknown
|
395
|
FileVault
|
2,034
|
65
|
C
|
Mid
|
396
|
Lucifer (cipher)
|
2,032
|
65
|
Start
|
Unknown
|
397
|
Ross J. Anderson
|
2,012
|
64
|
C
|
Mid
|
398
|
Key encapsulation mechanism
|
1,991
|
64
|
Start
|
High
|
399
|
Red/black concept
|
1,985
|
64
|
Stub
|
Unknown
|
400
|
Temporal Key Integrity Protocol
|
1,983
|
63
|
C
|
Low
|
401
|
Tor2web
|
1,982
|
63
|
Start
|
Low
|
402
|
Content Authenticity Initiative
|
1,981
|
63
|
C
|
Low
|
403
|
MD4
|
1,972
|
63
|
Start
|
Low
|
404
|
Jami (software)
|
1,957
|
63
|
Start
|
Unknown
|
405
|
ADFGVX cipher
|
1,948
|
62
|
Unknown
|
Unknown
|
406
|
Needham–Schroeder protocol
|
1,947
|
62
|
Start
|
Mid
|
407
|
Overview of news media phone hacking scandals
|
1,947
|
62
|
B
|
Low
|
408
|
Orbot
|
1,933
|
62
|
Stub
|
Low
|
409
|
Tabula recta
|
1,932
|
62
|
Unknown
|
Unknown
|
410
|
Differential cryptanalysis
|
1,914
|
61
|
B
|
High
|
411
|
Rotor machine
|
1,907
|
61
|
Unknown
|
Unknown
|
412
|
Crypt (C)
|
1,905
|
61
|
C
|
High
|
413
|
Trusted timestamping
|
1,893
|
61
|
Start
|
Unknown
|
414
|
Blind signature
|
1,889
|
60
|
C
|
Mid
|
415
|
Digital signature forgery
|
1,881
|
60
|
Start
|
High
|
416
|
Cryptographic primitive
|
1,873
|
60
|
Start
|
Top
|
417
|
Briar (software)
|
1,868
|
60
|
Start
|
Low
|
418
|
Government Communications Security Bureau
|
1,851
|
59
|
B
|
Low
|
419
|
Poly1305
|
1,849
|
59
|
Start
|
Top
|
420
|
Hybrid cryptosystem
|
1,843
|
59
|
Start
|
High
|
421
|
Typex
|
1,838
|
59
|
Start
|
Unknown
|
422
|
SIGABA
|
1,836
|
59
|
C
|
High
|
423
|
One-key MAC
|
1,819
|
58
|
Start
|
Low
|
424
|
Cipher Bureau (Poland)
|
1,786
|
57
|
GA
|
Low
|
425
|
Power analysis
|
1,775
|
57
|
Unknown
|
Unknown
|
426
|
Generic Security Services Application Program Interface
|
1,770
|
57
|
Start
|
Low
|
427
|
List of things named after Alan Turing
|
1,766
|
56
|
List
|
Low
|
428
|
UltraViolet (website)
|
1,764
|
56
|
C
|
Low
|
429
|
SegWit
|
1,762
|
56
|
Start
|
Low
|
430
|
Papyrus Oxyrhynchus 90
|
1,759
|
56
|
Start
|
Low
|
431
|
Advanced Access Content System
|
1,748
|
56
|
C
|
Mid
|
432
|
BLS digital signature
|
1,747
|
56
|
Start
|
Mid
|
433
|
DES supplementary material
|
1,742
|
56
|
C
|
Low
|
434
|
Wiener's attack
|
1,740
|
56
|
B
|
High
|
435
|
Simultaneous Authentication of Equals
|
1,732
|
55
|
Start
|
High
|
436
|
SecureDrop
|
1,729
|
55
|
Start
|
Mid
|
437
|
Proof of authority
|
1,728
|
55
|
Start
|
Low
|
438
|
List of cryptographers
|
1,721
|
55
|
List
|
Low
|
439
|
Blaise de Vigenère
|
1,715
|
55
|
Start
|
Unknown
|
440
|
FreeOTP
|
1,714
|
55
|
Start
|
Low
|
441
|
Null cipher
|
1,709
|
55
|
Stub
|
Low
|
442
|
Tiny Encryption Algorithm
|
1,702
|
54
|
Unknown
|
Unknown
|
443
|
Multiple encryption
|
1,701
|
54
|
Unknown
|
Unknown
|
444
|
Cryptovirology
|
1,693
|
54
|
Start
|
Mid
|
445
|
Word square
|
1,692
|
54
|
C
|
Low
|
446
|
Antipodes (sculpture)
|
1,685
|
54
|
Start
|
Low
|
447
|
Black Chamber
|
1,684
|
54
|
Unknown
|
Unknown
|
448
|
McEliece cryptosystem
|
1,680
|
54
|
C
|
High
|
449
|
Collision resistance
|
1,667
|
53
|
Start
|
High
|
450
|
D'Agapeyeff cipher
|
1,659
|
53
|
Start
|
Low
|
451
|
Roger Dingledine
|
1,647
|
53
|
Start
|
Unknown
|
452
|
GNUnet
|
1,642
|
52
|
B
|
Low
|
453
|
Information-theoretic security
|
1,635
|
52
|
Start
|
Top
|
454
|
Always-on DRM
|
1,634
|
52
|
Start
|
Low
|
455
|
Public key fingerprint
|
1,632
|
52
|
Start
|
Mid
|
456
|
Code (cryptography)
|
1,631
|
52
|
Start
|
Top
|
457
|
Downgrade attack
|
1,630
|
52
|
Start
|
Mid
|
458
|
Blum Blum Shub
|
1,626
|
52
|
Start
|
High
|
459
|
Challenge-Handshake Authentication Protocol
|
1,615
|
52
|
Start
|
Low
|
460
|
Hidden message
|
1,615
|
52
|
Start
|
Low
|
461
|
Friend-to-friend
|
1,615
|
52
|
Start
|
Low
|
462
|
Max Newman
|
1,613
|
52
|
B
|
Low
|
463
|
International Data Encryption Algorithm
|
1,607
|
51
|
C
|
Unknown
|
464
|
DeCSS
|
1,607
|
51
|
C
|
Mid
|
465
|
Ring signature
|
1,596
|
51
|
Start
|
Mid
|
466
|
Visual cryptography
|
1,594
|
51
|
Unknown
|
Unknown
|
467
|
Integrated Encryption Scheme
|
1,592
|
51
|
Start
|
Low
|
468
|
ZeroNet
|
1,592
|
51
|
Start
|
Low
|
469
|
Format-preserving encryption
|
1,569
|
50
|
Start
|
High
|
470
|
Key-agreement protocol
|
1,568
|
50
|
Start
|
Top
|
471
|
LibreSSL
|
1,565
|
50
|
Start
|
High
|
472
|
Berlekamp–Massey algorithm
|
1,564
|
50
|
Start
|
Unknown
|
473
|
Serpent (cipher)
|
1,561
|
50
|
C
|
Low
|
474
|
Lamport signature
|
1,546
|
49
|
Start
|
High
|
475
|
Codebook
|
1,542
|
49
|
Stub
|
Unknown
|
476
|
Garlic routing
|
1,541
|
49
|
Stub
|
Unknown
|
477
|
Four-square cipher
|
1,534
|
49
|
C
|
Unknown
|
478
|
Secret decoder ring
|
1,530
|
49
|
Start
|
Low
|
479
|
Random oracle
|
1,529
|
49
|
Start
|
Low
|
480
|
A5/1
|
1,528
|
49
|
B
|
High
|
481
|
National Cryptologic Museum
|
1,528
|
49
|
C
|
Mid
|
482
|
David Wheeler (computer scientist)
|
1,524
|
49
|
Start
|
Low
|
483
|
Secure cryptoprocessor
|
1,516
|
48
|
C
|
Mid
|
484
|
Two-square cipher
|
1,509
|
48
|
Unknown
|
Unknown
|
485
|
Kasiski examination
|
1,504
|
48
|
Unknown
|
Unknown
|
486
|
SYN cookies
|
1,502
|
48
|
Start
|
Unknown
|
487
|
Nothing-up-my-sleeve number
|
1,497
|
48
|
C
|
Low
|
488
|
SIGSALY
|
1,494
|
48
|
C
|
Low
|
489
|
NTRUEncrypt
|
1,492
|
48
|
C
|
Mid
|
490
|
Snowflake (software)
|
1,485
|
47
|
Start
|
Low
|
491
|
Genevieve Grotjan Feinstein
|
1,484
|
47
|
Start
|
Mid
|
492
|
RIPEMD
|
1,482
|
47
|
C
|
Unknown
|
493
|
Keybase
|
1,474
|
47
|
Start
|
Low
|
494
|
Chosen-ciphertext attack
|
1,473
|
47
|
Start
|
High
|
495
|
Interactive proof system
|
1,463
|
47
|
Start
|
High
|
496
|
Perfect Dark (P2P)
|
1,456
|
46
|
C
|
Low
|
497
|
MD6
|
1,451
|
46
|
Start
|
High
|
498
|
Oblivious transfer
|
1,443
|
46
|
Start
|
Unknown
|
499
|
Nihilist cipher
|
1,443
|
46
|
Unknown
|
Unknown
|
500
|
Taher Elgamal
|
1,427
|
46
|
C
|
Unknown
|