From Wikipedia, the free encyclopedia
This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
Period: 2024-03-01 to 2024-03-31
Total views: 7,329,810
Updated: 15:41, 5 April 2024 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
1,117,239
|
36,039
|
B
|
High
|
2
|
Bitcoin
|
363,297
|
11,719
|
B
|
High
|
3
|
Alan Turing
|
228,452
|
7,369
|
GA
|
Top
|
4
|
Cryptocurrency
|
175,582
|
5,663
|
C
|
High
|
5
|
WikiLeaks
|
137,631
|
4,439
|
B
|
Low
|
6
|
HTTPS
|
114,267
|
3,686
|
C
|
High
|
7
|
The Imitation Game
|
103,584
|
3,341
|
C
|
Mid
|
8
|
Tor (network)
|
103,046
|
3,324
|
B
|
Mid
|
9
|
Voynich manuscript
|
100,290
|
3,235
|
B
|
Low
|
10
|
Blockchain
|
87,468
|
2,821
|
B
|
High
|
11
|
Transport Layer Security
|
82,337
|
2,656
|
B
|
Top
|
12
|
Virtual private network
|
82,087
|
2,647
|
C
|
Mid
|
13
|
History of bitcoin
|
81,264
|
2,621
|
C
|
Low
|
14
|
National Security Agency
|
72,364
|
2,334
|
C
|
High
|
15
|
Enigma machine
|
71,189
|
2,296
|
C
|
High
|
16
|
Vitalik Buterin
|
69,519
|
2,242
|
C
|
Low
|
17
|
Password
|
68,754
|
2,217
|
C
|
Top
|
18
|
RSA (cryptosystem)
|
68,727
|
2,217
|
C
|
Top
|
19
|
Dogecoin
|
56,686
|
1,828
|
C
|
Low
|
20
|
Advanced Encryption Standard
|
56,509
|
1,822
|
B
|
Top
|
21
|
Diffie–Hellman key exchange
|
54,504
|
1,758
|
C
|
Top
|
22
|
SHA-2
|
49,501
|
1,596
|
C
|
Top
|
23
|
Secure Shell
|
48,305
|
1,558
|
C
|
High
|
24
|
Cryptography
|
48,122
|
1,552
|
C
|
Top
|
25
|
HTTP Strict Transport Security
|
45,008
|
1,451
|
C
|
Low
|
26
|
Shiba Inu (cryptocurrency)
|
42,395
|
1,367
|
Start
|
Low
|
27
|
Public-key cryptography
|
40,950
|
1,320
|
C
|
Top
|
28
|
Changpeng Zhao
|
40,507
|
1,306
|
Start
|
Low
|
29
|
Block cipher mode of operation
|
40,309
|
1,300
|
C
|
Top
|
30
|
Darknet market
|
39,668
|
1,279
|
B
|
Mid
|
31
|
Zimmermann Telegram
|
38,539
|
1,243
|
B
|
High
|
32
|
Caesar cipher
|
38,287
|
1,235
|
FA
|
High
|
33
|
Joan Clarke
|
36,028
|
1,162
|
C
|
Mid
|
34
|
MD5
|
35,133
|
1,133
|
C
|
Top
|
35
|
Man-in-the-middle attack
|
32,388
|
1,044
|
C
|
Mid
|
36
|
Digital signature
|
29,645
|
956
|
C
|
Top
|
37
|
Knapsack problem
|
29,618
|
955
|
B
|
Mid
|
38
|
GCHQ
|
29,272
|
944
|
B
|
Low
|
39
|
Vigenère cipher
|
29,187
|
941
|
B
|
Low
|
40
|
Proton Mail
|
28,926
|
933
|
C
|
Low
|
41
|
Claude Shannon
|
28,834
|
930
|
C
|
Top
|
42
|
Cryptographic hash function
|
28,811
|
929
|
C
|
Top
|
43
|
Encryption
|
28,000
|
903
|
C
|
Top
|
44
|
HMAC
|
27,590
|
890
|
C
|
High
|
45
|
Information theory
|
27,409
|
884
|
B
|
Top
|
46
|
Steganography
|
27,209
|
877
|
B
|
High
|
47
|
Active Directory
|
27,126
|
875
|
C
|
Low
|
48
|
Sator Square
|
26,952
|
869
|
B
|
Low
|
49
|
Post-quantum cryptography
|
26,360
|
850
|
C
|
High
|
50
|
SHA-1
|
25,766
|
831
|
C
|
Top
|
51
|
I2P
|
25,181
|
812
|
B
|
Low
|
52
|
Pretty Good Privacy
|
24,883
|
802
|
B
|
High
|
53
|
Bletchley Park
|
23,747
|
766
|
B
|
High
|
54
|
NordVPN
|
23,183
|
747
|
C
|
Mid
|
55
|
Elliptic-curve cryptography
|
22,767
|
734
|
C
|
High
|
56
|
Certificate authority
|
22,699
|
732
|
C
|
High
|
57
|
Signal (messaging app)
|
22,669
|
731
|
C
|
Mid
|
58
|
Digital rights management
|
22,541
|
727
|
B
|
High
|
59
|
Ross J. Anderson
|
22,332
|
720
|
C
|
Mid
|
60
|
Zero-knowledge proof
|
22,253
|
717
|
C
|
Top
|
61
|
Merkle tree
|
22,073
|
712
|
C
|
Mid
|
62
|
Wi-Fi Protected Access
|
21,868
|
705
|
C
|
Mid
|
63
|
Trusted Platform Module
|
21,712
|
700
|
C
|
Mid
|
64
|
Letter frequency
|
21,597
|
696
|
B
|
Low
|
65
|
Cipher
|
20,733
|
668
|
C
|
Top
|
66
|
Information security
|
20,674
|
666
|
B
|
Top
|
67
|
Data Encryption Standard
|
19,877
|
641
|
C
|
Top
|
68
|
Cryptanalysis of the Enigma
|
19,583
|
631
|
C
|
Mid
|
69
|
Kerberos (protocol)
|
19,466
|
627
|
C
|
High
|
70
|
Public key infrastructure
|
19,327
|
623
|
C
|
Top
|
71
|
One-time pad
|
18,801
|
606
|
C
|
Top
|
72
|
Homomorphic encryption
|
18,669
|
602
|
C
|
High
|
73
|
One-time password
|
18,459
|
595
|
C
|
Mid
|
74
|
ROT13
|
18,301
|
590
|
C
|
Mid
|
75
|
Vault 7
|
17,704
|
571
|
C
|
Mid
|
76
|
Authentication
|
17,503
|
564
|
C
|
High
|
77
|
Secure Hash Algorithms
|
17,237
|
556
|
Start
|
High
|
78
|
Bcrypt
|
16,853
|
543
|
C
|
Mid
|
79
|
Side-channel attack
|
16,763
|
540
|
C
|
High
|
80
|
.onion
|
16,248
|
524
|
C
|
Low
|
81
|
Hyphanet
|
16,199
|
522
|
B
|
Mid
|
82
|
Bitcoin Cash
|
16,089
|
519
|
Start
|
Low
|
83
|
Kryptos
|
16,024
|
516
|
C
|
Low
|
84
|
Code talker
|
15,946
|
514
|
B
|
Low
|
85
|
Salt (cryptography)
|
15,915
|
513
|
Start
|
High
|
86
|
Rainbow table
|
15,642
|
504
|
C
|
High
|
87
|
Bombe
|
15,439
|
498
|
B
|
Mid
|
88
|
Brute-force attack
|
15,242
|
491
|
C
|
High
|
89
|
Substitution cipher
|
15,111
|
487
|
Unknown
|
Unknown
|
90
|
OpenVPN
|
15,064
|
485
|
C
|
Mid
|
91
|
Public key certificate
|
14,702
|
474
|
C
|
Top
|
92
|
SHA-3
|
14,701
|
474
|
Start
|
Mid
|
93
|
Elliptic Curve Digital Signature Algorithm
|
14,419
|
465
|
C
|
High
|
94
|
SSH File Transfer Protocol
|
14,253
|
459
|
Start
|
Unknown
|
95
|
Phone hacking
|
14,200
|
458
|
Start
|
Mid
|
96
|
Keychain (software)
|
13,966
|
450
|
Start
|
Unknown
|
97
|
OpenSSL
|
13,873
|
447
|
B
|
High
|
98
|
Galois/Counter Mode
|
13,787
|
444
|
C
|
Mid
|
99
|
Utah Data Center
|
13,651
|
440
|
C
|
Mid
|
100
|
Symmetric-key algorithm
|
13,608
|
438
|
Start
|
Top
|
101
|
Grover's algorithm
|
13,474
|
434
|
C
|
Mid
|
102
|
InterPlanetary File System
|
12,786
|
412
|
C
|
Low
|
103
|
Colossus computer
|
12,596
|
406
|
B
|
Mid
|
104
|
Integer factorization
|
12,545
|
404
|
B
|
Mid
|
105
|
Alice and Bob
|
12,177
|
392
|
Start
|
Low
|
106
|
Tails (operating system)
|
12,153
|
392
|
Start
|
Low
|
107
|
Proof of stake
|
12,133
|
391
|
Start
|
Low
|
108
|
Ultra (cryptography)
|
11,978
|
386
|
C
|
High
|
109
|
Forward secrecy
|
11,924
|
384
|
C
|
High
|
110
|
PBKDF2
|
11,294
|
364
|
Start
|
Unknown
|
111
|
Differential privacy
|
10,918
|
352
|
C
|
Unknown
|
112
|
Playfair cipher
|
10,703
|
345
|
Unknown
|
Unknown
|
113
|
Pay television
|
10,648
|
343
|
Start
|
Unknown
|
114
|
Theoretical computer science
|
10,552
|
340
|
B
|
Low
|
115
|
VeraCrypt
|
10,512
|
339
|
C
|
Mid
|
116
|
Apple–FBI encryption dispute
|
10,482
|
338
|
C
|
Low
|
117
|
Fort Meade
|
10,424
|
336
|
C
|
Low
|
118
|
Shamir's secret sharing
|
10,374
|
334
|
C
|
High
|
119
|
Mullvad
|
10,369
|
334
|
Start
|
Low
|
120
|
Comparison of BitTorrent clients
|
10,357
|
334
|
List
|
Low
|
121
|
Cryptographic nonce
|
10,263
|
331
|
Start
|
High
|
122
|
Cryptonomicon
|
10,228
|
329
|
C
|
Low
|
123
|
Message authentication code
|
10,179
|
328
|
C
|
Top
|
124
|
Lavarand
|
9,913
|
319
|
Start
|
Mid
|
125
|
Cypherpunk
|
9,902
|
319
|
C
|
Mid
|
126
|
Link 16
|
9,893
|
319
|
Start
|
Low
|
127
|
Quantum key distribution
|
9,841
|
317
|
B
|
Mid
|
128
|
Self-signed certificate
|
9,792
|
315
|
Start
|
Unknown
|
129
|
3-D Secure
|
9,750
|
314
|
Start
|
Low
|
130
|
Bitwarden
|
9,555
|
308
|
C
|
Low
|
131
|
EdDSA
|
9,529
|
307
|
C
|
High
|
132
|
Authenticated encryption
|
9,506
|
306
|
C
|
Mid
|
133
|
Password manager
|
9,399
|
303
|
C
|
Low
|
134
|
Beale ciphers
|
9,396
|
303
|
B
|
Low
|
135
|
Cryptanalysis
|
9,384
|
302
|
C
|
High
|
136
|
Birthday attack
|
9,382
|
302
|
C
|
High
|
137
|
Transposition cipher
|
9,375
|
302
|
Unknown
|
Unknown
|
138
|
Litecoin
|
9,181
|
296
|
Start
|
Low
|
139
|
The Tor Project
|
9,092
|
293
|
C
|
Mid
|
140
|
Confidentiality
|
9,087
|
293
|
C
|
Low
|
141
|
ChaCha20-Poly1305
|
8,974
|
289
|
C
|
Low
|
142
|
Adam Back
|
8,868
|
286
|
Start
|
Low
|
143
|
Curve25519
|
8,829
|
284
|
C
|
High
|
144
|
RC4
|
8,720
|
281
|
B
|
Top
|
145
|
Triple DES
|
8,704
|
280
|
Start
|
Unknown
|
146
|
Elliptic-curve Diffie–Hellman
|
8,640
|
278
|
Start
|
Mid
|
147
|
Discrete logarithm
|
8,633
|
278
|
C
|
Mid
|
148
|
Block cipher
|
8,404
|
271
|
C
|
Top
|
149
|
FIPS 140-2
|
8,368
|
269
|
C
|
Mid
|
150
|
Len Sassaman
|
8,307
|
267
|
Start
|
Unknown
|
151
|
Babington Plot
|
8,246
|
266
|
C
|
Low
|
152
|
Decentralized finance
|
8,225
|
265
|
Start
|
Low
|
153
|
WebTorrent
|
8,215
|
265
|
Start
|
Unknown
|
154
|
Certificate signing request
|
8,210
|
264
|
C
|
Low
|
155
|
Illegal number
|
8,205
|
264
|
C
|
Low
|
156
|
Bitconnect
|
8,035
|
259
|
C
|
Low
|
157
|
Signal Protocol
|
8,011
|
258
|
C
|
High
|
158
|
Argon2
|
7,944
|
256
|
Start
|
Mid
|
159
|
GNU Privacy Guard
|
7,919
|
255
|
C
|
Unknown
|
160
|
PKCS 12
|
7,882
|
254
|
Start
|
Unknown
|
161
|
Digital Signature Algorithm
|
7,800
|
251
|
C
|
Top
|
162
|
Cipher suite
|
7,795
|
251
|
C
|
Top
|
163
|
Quantum cryptography
|
7,782
|
251
|
C
|
High
|
164
|
Password strength
|
7,704
|
248
|
C
|
High
|
165
|
Citizenfour
|
7,668
|
247
|
C
|
Low
|
166
|
ElGamal encryption
|
7,565
|
244
|
Start
|
Top
|
167
|
KeePass
|
7,490
|
241
|
C
|
Low
|
168
|
Stream cipher
|
7,466
|
240
|
Start
|
Top
|
169
|
Wired Equivalent Privacy
|
7,361
|
237
|
C
|
Mid
|
170
|
RSA Security
|
7,287
|
235
|
C
|
Unknown
|
171
|
Digest access authentication
|
7,278
|
234
|
B
|
Low
|
172
|
Matrix (protocol)
|
7,208
|
232
|
Start
|
Unknown
|
173
|
Richard Teng
|
7,120
|
229
|
Start
|
Low
|
174
|
Key derivation function
|
7,099
|
229
|
C
|
Low
|
175
|
IMSI-catcher
|
7,070
|
228
|
Start
|
Mid
|
176
|
Conel Hugh O'Donel Alexander
|
7,001
|
225
|
Start
|
Low
|
177
|
Cryptographically secure pseudorandom number generator
|
6,938
|
223
|
C
|
Top
|
178
|
Qubes OS
|
6,892
|
222
|
C
|
Mid
|
179
|
Dual EC DRBG
|
6,759
|
218
|
C
|
High
|
180
|
Lorenz cipher
|
6,747
|
217
|
C
|
Top
|
181
|
Tap code
|
6,738
|
217
|
Start
|
Low
|
182
|
DNS-based Authentication of Named Entities
|
6,738
|
217
|
C
|
Mid
|
183
|
Secure multi-party computation
|
6,711
|
216
|
Start
|
High
|
184
|
Boolean function
|
6,643
|
214
|
Start
|
Mid
|
185
|
Mutual authentication
|
6,499
|
209
|
Stub
|
Low
|
186
|
Electronic signature
|
6,499
|
209
|
C
|
Low
|
187
|
Deniable encryption
|
6,480
|
209
|
Start
|
High
|
188
|
Padding (cryptography)
|
6,446
|
207
|
Start
|
Unknown
|
189
|
Password cracking
|
6,425
|
207
|
C
|
Mid
|
190
|
Polkadot (cryptocurrency)
|
6,385
|
205
|
Start
|
Low
|
191
|
Root certificate
|
6,342
|
204
|
Start
|
Low
|
192
|
Salsa20
|
6,340
|
204
|
C
|
Top
|
193
|
Rijndael S-box
|
6,308
|
203
|
Start
|
Low
|
194
|
Elizebeth Smith Friedman
|
6,289
|
202
|
C
|
Mid
|
195
|
OpenSSH
|
6,242
|
201
|
C
|
High
|
196
|
Blowfish (cipher)
|
6,211
|
200
|
B
|
High
|
197
|
Bitcoin scalability problem
|
6,208
|
200
|
C
|
Low
|
198
|
Key (cryptography)
|
6,162
|
198
|
Start
|
Unknown
|
199
|
Kerckhoffs's principle
|
6,063
|
195
|
Start
|
Mid
|
200
|
XOR cipher
|
6,027
|
194
|
Stub
|
Mid
|
201
|
A5/1
|
5,996
|
193
|
B
|
High
|
202
|
Cryptogram
|
5,937
|
191
|
C
|
Mid
|
203
|
The Doughnut
|
5,924
|
191
|
GA
|
High
|
204
|
Lattice-based cryptography
|
5,917
|
190
|
Start
|
Low
|
205
|
Ciphertext
|
5,888
|
189
|
Start
|
High
|
206
|
Initialization vector
|
5,869
|
189
|
C
|
High
|
207
|
Polybius square
|
5,722
|
184
|
Start
|
Mid
|
208
|
AES instruction set
|
5,714
|
184
|
C
|
Low
|
209
|
BLAKE (hash function)
|
5,705
|
184
|
C
|
Mid
|
210
|
RSA SecurID
|
5,685
|
183
|
Unknown
|
Unknown
|
211
|
Units of information
|
5,676
|
183
|
C
|
Unknown
|
212
|
Adi Shamir
|
5,652
|
182
|
Start
|
Unknown
|
213
|
Web of trust
|
5,652
|
182
|
C
|
High
|
214
|
Gordon Welchman
|
5,631
|
181
|
C
|
Low
|
215
|
Datagram Transport Layer Security
|
5,620
|
181
|
Start
|
Mid
|
216
|
Feistel cipher
|
5,609
|
180
|
Start
|
Unknown
|
217
|
List of bitcoin forks
|
5,568
|
179
|
List
|
Low
|
218
|
Rail fence cipher
|
5,508
|
177
|
Start
|
Low
|
219
|
KeePassXC
|
5,454
|
175
|
Start
|
Low
|
220
|
TrueCrypt
|
5,418
|
174
|
C
|
Mid
|
221
|
History of cryptography
|
5,406
|
174
|
Start
|
High
|
222
|
Marian Rejewski
|
5,399
|
174
|
FA
|
Mid
|
223
|
Supply chain attack
|
5,374
|
173
|
C
|
Low
|
224
|
Frequency analysis
|
5,328
|
171
|
C
|
High
|
225
|
Replay attack
|
5,311
|
171
|
C
|
Top
|
226
|
Privacy-Enhanced Mail
|
5,262
|
169
|
Start
|
Low
|
227
|
Hill cipher
|
5,259
|
169
|
Unknown
|
Unknown
|
228
|
Padding oracle attack
|
5,102
|
164
|
Stub
|
Unknown
|
229
|
Certificate revocation list
|
5,014
|
161
|
C
|
Low
|
230
|
Bitcoin Core
|
5,008
|
161
|
Start
|
Low
|
231
|
Non-repudiation
|
4,959
|
159
|
Start
|
Mid
|
232
|
Bruce Schneier
|
4,893
|
157
|
Start
|
High
|
233
|
Automatic Certificate Management Environment
|
4,860
|
156
|
Start
|
Low
|
234
|
One-way function
|
4,810
|
155
|
Start
|
Top
|
235
|
Key size
|
4,807
|
155
|
C
|
High
|
236
|
Affine cipher
|
4,770
|
153
|
C
|
Low
|
237
|
Communications Security Establishment
|
4,768
|
153
|
C
|
Mid
|
238
|
Bacon's cipher
|
4,756
|
153
|
Start
|
Low
|
239
|
Blockchain game
|
4,748
|
153
|
Start
|
Low
|
240
|
Cold boot attack
|
4,714
|
152
|
C
|
Low
|
241
|
David Chaum
|
4,693
|
151
|
C
|
Low
|
242
|
AES key schedule
|
4,681
|
151
|
Start
|
Low
|
243
|
Ricky McCormick's encrypted notes
|
4,679
|
150
|
B
|
Unknown
|
244
|
11B-X-1371
|
4,676
|
150
|
GA
|
Low
|
245
|
Avalanche effect
|
4,668
|
150
|
Start
|
High
|
246
|
S-box
|
4,652
|
150
|
Start
|
Top
|
247
|
PKCS
|
4,573
|
147
|
List
|
High
|
248
|
Digital watermarking
|
4,535
|
146
|
B
|
Mid
|
249
|
Filecoin
|
4,481
|
144
|
Stub
|
Low
|
250
|
Commitment scheme
|
4,403
|
142
|
C
|
High
|
251
|
Timing attack
|
4,385
|
141
|
C
|
High
|
252
|
Harvest now, decrypt later
|
4,368
|
140
|
Start
|
Low
|
253
|
Cryptocurrency tumbler
|
4,368
|
140
|
Start
|
Unknown
|
254
|
Challenge–response authentication
|
4,325
|
139
|
Start
|
Mid
|
255
|
Known-plaintext attack
|
4,275
|
137
|
Start
|
High
|
256
|
NIST Post-Quantum Cryptography Standardization
|
4,219
|
136
|
C
|
Mid
|
257
|
Dictionary attack
|
4,170
|
134
|
C
|
Unknown
|
258
|
PKCS 7
|
4,159
|
134
|
Start
|
Low
|
259
|
Book cipher
|
4,131
|
133
|
C
|
Low
|
260
|
Hashcash
|
4,120
|
132
|
Start
|
Unknown
|
261
|
Session (software)
|
4,116
|
132
|
Start
|
Low
|
262
|
PKCS 1
|
4,073
|
131
|
C
|
Mid
|
263
|
Code signing
|
4,051
|
130
|
C
|
Low
|
264
|
Australian Signals Directorate
|
4,036
|
130
|
C
|
Low
|
265
|
Digital renminbi
|
3,949
|
127
|
B
|
High
|
266
|
Merkle–Damgård construction
|
3,929
|
126
|
C
|
Unknown
|
267
|
Elliptic curve point multiplication
|
3,922
|
126
|
C
|
Mid
|
268
|
Type B Cipher Machine
|
3,914
|
126
|
Start
|
Low
|
269
|
Comparison of TLS implementations
|
3,889
|
125
|
List
|
High
|
270
|
Disk encryption
|
3,837
|
123
|
C
|
High
|
271
|
IEEE 802.11i-2004
|
3,810
|
122
|
C
|
Mid
|
272
|
SipHash
|
3,797
|
122
|
Start
|
Low
|
273
|
Fork (blockchain)
|
3,791
|
122
|
Start
|
Mid
|
274
|
Pre-shared key
|
3,773
|
121
|
Start
|
Mid
|
275
|
Key exchange
|
3,772
|
121
|
Start
|
Unknown
|
276
|
Plaintext
|
3,742
|
120
|
Start
|
High
|
277
|
Daniel J. Bernstein
|
3,726
|
120
|
C
|
Mid
|
278
|
Polyalphabetic cipher
|
3,725
|
120
|
Start
|
Unknown
|
279
|
Chosen-plaintext attack
|
3,710
|
119
|
Stub
|
Unknown
|
280
|
List of ciphertexts
|
3,707
|
119
|
List
|
Low
|
281
|
Atbash
|
3,695
|
119
|
Stub
|
Low
|
282
|
Crypto-anarchy
|
3,687
|
118
|
Start
|
High
|
283
|
Algorand
|
3,652
|
117
|
B
|
Low
|
284
|
Length extension attack
|
3,625
|
116
|
Start
|
Unknown
|
285
|
K-anonymity
|
3,621
|
116
|
Start
|
Mid
|
286
|
Collision attack
|
3,608
|
116
|
Start
|
High
|
287
|
Crypto AG
|
3,597
|
116
|
C
|
High
|
288
|
Bomba (cryptography)
|
3,582
|
115
|
Start
|
Low
|
289
|
Diplomatic bag
|
3,567
|
115
|
Start
|
Low
|
290
|
Whitfield Diffie
|
3,559
|
114
|
B
|
High
|
291
|
I. J. Good
|
3,534
|
114
|
C
|
Low
|
292
|
Threema
|
3,513
|
113
|
C
|
Unknown
|
293
|
Communications security
|
3,508
|
113
|
Start
|
Mid
|
294
|
Special Collection Service
|
3,505
|
113
|
C
|
Low
|
295
|
Data anonymization
|
3,494
|
112
|
Start
|
Mid
|
296
|
RSA Factoring Challenge
|
3,485
|
112
|
Start
|
Low
|
297
|
Physical unclonable function
|
3,483
|
112
|
Start
|
Unknown
|
298
|
Preimage attack
|
3,456
|
111
|
Stub
|
Unknown
|
299
|
Quantum network
|
3,456
|
111
|
C
|
Low
|
300
|
Whonix
|
3,414
|
110
|
Start
|
Mid
|
301
|
Keygen
|
3,403
|
109
|
C
|
Low
|
302
|
Comparison of SSH clients
|
3,395
|
109
|
List
|
Low
|
303
|
Optimal asymmetric encryption padding
|
3,386
|
109
|
Start
|
High
|
304
|
Phil Zimmermann
|
3,360
|
108
|
Start
|
Mid
|
305
|
Cryptographic protocol
|
3,352
|
108
|
Start
|
High
|
306
|
PKCS 11
|
3,339
|
107
|
Unknown
|
Unknown
|
307
|
Non-interactive zero-knowledge proof
|
3,288
|
106
|
Start
|
Low
|
308
|
Copiale cipher
|
3,285
|
105
|
Start
|
Low
|
309
|
Wildcard certificate
|
3,227
|
104
|
Start
|
Unknown
|
310
|
Charlie Lee (computer scientist)
|
3,193
|
103
|
Start
|
Low
|
311
|
Subject Alternative Name
|
3,166
|
102
|
Stub
|
Mid
|
312
|
Disk encryption theory
|
3,131
|
101
|
C
|
Unknown
|
313
|
Certificate Transparency
|
3,042
|
98
|
C
|
High
|
314
|
Dilly Knox
|
3,033
|
97
|
B
|
Unknown
|
315
|
Schnorr signature
|
3,021
|
97
|
C
|
High
|
316
|
Alastair Denniston
|
3,021
|
97
|
Start
|
Unknown
|
317
|
Twofish
|
3,006
|
96
|
Start
|
High
|
318
|
Bouncy Castle (cryptography)
|
3,000
|
96
|
Start
|
Unknown
|
319
|
Secret sharing
|
2,996
|
96
|
B
|
High
|
320
|
Magic (cryptography)
|
2,979
|
96
|
Start
|
Unknown
|
321
|
Scrambler
|
2,970
|
95
|
C
|
Unknown
|
322
|
David Wheeler (computer scientist)
|
2,951
|
95
|
Start
|
Low
|
323
|
Confusion and diffusion
|
2,937
|
94
|
Start
|
Mid
|
324
|
Encryption software
|
2,917
|
94
|
Start
|
Top
|
325
|
PKCS 8
|
2,856
|
92
|
Stub
|
Unknown
|
326
|
HTTP Public Key Pinning
|
2,837
|
91
|
C
|
Mid
|
327
|
Comparison of disk encryption software
|
2,824
|
91
|
List
|
High
|
328
|
FIPS 140
|
2,818
|
90
|
Start
|
Mid
|
329
|
Coppersmith's attack
|
2,811
|
90
|
B
|
High
|
330
|
Data at rest
|
2,798
|
90
|
C
|
Mid
|
331
|
DNS Certification Authority Authorization
|
2,792
|
90
|
GA
|
Low
|
332
|
Tox (protocol)
|
2,788
|
89
|
C
|
Low
|
333
|
HKDF
|
2,767
|
89
|
Start
|
Unknown
|
334
|
Martin Hellman
|
2,766
|
89
|
Start
|
High
|
335
|
Tiny Encryption Algorithm
|
2,765
|
89
|
Unknown
|
Unknown
|
336
|
Crypt (C)
|
2,754
|
88
|
C
|
High
|
337
|
Encrypting File System
|
2,746
|
88
|
B
|
Unknown
|
338
|
William F. Friedman
|
2,740
|
88
|
C
|
Unknown
|
339
|
Clipper chip
|
2,738
|
88
|
C
|
High
|
340
|
Export of cryptography from the United States
|
2,737
|
88
|
C
|
Unknown
|
341
|
Off-the-record messaging
|
2,723
|
87
|
Start
|
Unknown
|
342
|
BB84
|
2,721
|
87
|
Start
|
Low
|
343
|
Key management
|
2,698
|
87
|
Unknown
|
Unknown
|
344
|
AES implementations
|
2,687
|
86
|
List
|
Low
|
345
|
Zcash
|
2,654
|
85
|
Start
|
Low
|
346
|
Rijndael MixColumns
|
2,650
|
85
|
Start
|
Low
|
347
|
Government Communications Security Bureau
|
2,648
|
85
|
B
|
Low
|
348
|
Leo Marks
|
2,642
|
85
|
B
|
Unknown
|
349
|
Ralph Merkle
|
2,635
|
85
|
C
|
High
|
350
|
Meet-in-the-middle attack
|
2,632
|
84
|
C
|
High
|
351
|
Ciphertext indistinguishability
|
2,624
|
84
|
C
|
High
|
352
|
Paillier cryptosystem
|
2,608
|
84
|
Start
|
High
|
353
|
Comparison of cryptography libraries
|
2,605
|
84
|
List
|
Unknown
|
354
|
Clock drift
|
2,583
|
83
|
C
|
Low
|
355
|
Trusted Computing
|
2,572
|
82
|
C
|
Mid
|
356
|
Double Ratchet Algorithm
|
2,564
|
82
|
Start
|
Low
|
357
|
William Binney (intelligence official)
|
2,546
|
82
|
Start
|
Mid
|
358
|
CCM mode
|
2,538
|
81
|
Start
|
High
|
359
|
Advanced Encryption Standard process
|
2,512
|
81
|
C
|
Mid
|
360
|
Classical cipher
|
2,512
|
81
|
Start
|
Top
|
361
|
Bullrun (decryption program)
|
2,489
|
80
|
B
|
Low
|
362
|
Trapdoor function
|
2,421
|
78
|
Start
|
High
|
363
|
FIPS 140-3
|
2,409
|
77
|
C
|
Low
|
364
|
Tor2web
|
2,392
|
77
|
Start
|
Low
|
365
|
Baby-step giant-step
|
2,374
|
76
|
B
|
Unknown
|
366
|
SegWit
|
2,374
|
76
|
Start
|
Low
|
367
|
Authenticator
|
2,372
|
76
|
Start
|
Unknown
|
368
|
Reception and criticism of WhatsApp security and privacy features
|
2,366
|
76
|
C
|
Low
|
369
|
Visual cryptography
|
2,363
|
76
|
Unknown
|
Unknown
|
370
|
Security level
|
2,349
|
75
|
Stub
|
Mid
|
371
|
Pepper (cryptography)
|
2,335
|
75
|
Start
|
Low
|
372
|
Dm-crypt
|
2,331
|
75
|
Start
|
Low
|
373
|
Privacy and blockchain
|
2,328
|
75
|
C
|
Low
|
374
|
Anonymous P2P
|
2,324
|
74
|
C
|
Low
|
375
|
Entrust
|
2,320
|
74
|
Start
|
Low
|
376
|
Mumble (software)
|
2,320
|
74
|
C
|
Unknown
|
377
|
DES supplementary material
|
2,314
|
74
|
C
|
Low
|
378
|
Rubber-hose cryptanalysis
|
2,312
|
74
|
Redirect
|
Low
|
379
|
Comparison of cryptographic hash functions
|
2,310
|
74
|
List
|
Low
|
380
|
W. T. Tutte
|
2,297
|
74
|
C
|
Mid
|
381
|
Trusted timestamping
|
2,283
|
73
|
Start
|
Unknown
|
382
|
Open Whisper Systems
|
2,273
|
73
|
B
|
Unknown
|
383
|
Proof of authority
|
2,268
|
73
|
Start
|
Low
|
384
|
Cryptanalysis of the Lorenz cipher
|
2,265
|
73
|
C
|
High
|
385
|
CBC-MAC
|
2,255
|
72
|
C
|
High
|
386
|
FileVault
|
2,253
|
72
|
C
|
Mid
|
387
|
Cryptographic primitive
|
2,242
|
72
|
Start
|
Top
|
388
|
Lenstra elliptic-curve factorization
|
2,234
|
72
|
C
|
Low
|
389
|
Key encapsulation mechanism
|
2,219
|
71
|
Start
|
High
|
390
|
Opportunistic TLS
|
2,208
|
71
|
Start
|
Mid
|
391
|
MD4
|
2,195
|
70
|
Start
|
Low
|
392
|
The Code Book
|
2,180
|
70
|
Start
|
Low
|
393
|
RSA problem
|
2,160
|
69
|
Start
|
Top
|
394
|
Differential cryptanalysis
|
2,153
|
69
|
B
|
High
|
395
|
Collision resistance
|
2,122
|
68
|
Start
|
High
|
396
|
Blind signature
|
2,119
|
68
|
C
|
Mid
|
397
|
Key disclosure law
|
2,119
|
68
|
C
|
Low
|
398
|
Bitcoin Gold
|
2,086
|
67
|
Start
|
Low
|
399
|
Temporal Key Integrity Protocol
|
2,063
|
66
|
C
|
Low
|
400
|
ADFGVX cipher
|
2,056
|
66
|
Unknown
|
Unknown
|
401
|
Autokey cipher
|
2,053
|
66
|
C
|
Mid
|
402
|
Jami (software)
|
2,049
|
66
|
Start
|
Unknown
|
403
|
Enigma rotor details
|
2,046
|
66
|
Start
|
Mid
|
404
|
Advanced Access Content System
|
2,045
|
65
|
C
|
Mid
|
405
|
Orbot
|
2,034
|
65
|
Stub
|
Low
|
406
|
Keybase
|
2,031
|
65
|
Start
|
Low
|
407
|
Chosen-ciphertext attack
|
2,018
|
65
|
Start
|
High
|
408
|
ElGamal signature scheme
|
2,011
|
64
|
Start
|
Top
|
409
|
Strong cryptography
|
2,006
|
64
|
Unknown
|
Unknown
|
410
|
Arthur Scherbius
|
2,003
|
64
|
Start
|
Mid
|
411
|
GNUnet
|
1,971
|
63
|
B
|
Low
|
412
|
Poly1305
|
1,966
|
63
|
Start
|
Top
|
413
|
DeCSS
|
1,964
|
63
|
C
|
Mid
|
414
|
FreeOTP
|
1,958
|
63
|
Start
|
Low
|
415
|
Wiener's attack
|
1,937
|
62
|
B
|
High
|
416
|
Rotor machine
|
1,925
|
62
|
Unknown
|
Unknown
|
417
|
Key stretching
|
1,925
|
62
|
Start
|
Unknown
|
418
|
Briar (software)
|
1,925
|
62
|
Start
|
Low
|
419
|
Power analysis
|
1,921
|
61
|
Unknown
|
Unknown
|
420
|
Crypto Wars
|
1,902
|
61
|
Start
|
High
|
421
|
UltraViolet (website)
|
1,900
|
61
|
C
|
Low
|
422
|
Generic Security Services Application Program Interface
|
1,897
|
61
|
Start
|
Low
|
423
|
BLS digital signature
|
1,875
|
60
|
Start
|
Mid
|
424
|
LibreSSL
|
1,870
|
60
|
Start
|
High
|
425
|
Code (cryptography)
|
1,861
|
60
|
Start
|
Top
|
426
|
Blum Blum Shub
|
1,838
|
59
|
Start
|
High
|
427
|
Downgrade attack
|
1,838
|
59
|
Start
|
Mid
|
428
|
Key server (cryptographic)
|
1,834
|
59
|
Start
|
Mid
|
429
|
Banburismus
|
1,833
|
59
|
C
|
Low
|
430
|
Simultaneous Authentication of Equals
|
1,828
|
58
|
Start
|
High
|
431
|
Shugborough inscription
|
1,823
|
58
|
Start
|
Low
|
432
|
Tabula recta
|
1,821
|
58
|
Unknown
|
Unknown
|
433
|
Challenge-Handshake Authentication Protocol
|
1,820
|
58
|
Start
|
Low
|
434
|
Content Authenticity Initiative
|
1,820
|
58
|
C
|
Low
|
435
|
Hybrid cryptosystem
|
1,808
|
58
|
Start
|
High
|
436
|
Secret decoder ring
|
1,806
|
58
|
Start
|
Low
|
437
|
ZeroNet
|
1,806
|
58
|
Start
|
Low
|
438
|
Garlic routing
|
1,804
|
58
|
Stub
|
Unknown
|
439
|
International Data Encryption Algorithm
|
1,791
|
57
|
C
|
Unknown
|
440
|
Serpent (cipher)
|
1,787
|
57
|
C
|
Low
|
441
|
SYN cookies
|
1,760
|
56
|
Start
|
Unknown
|
442
|
Black Chamber
|
1,758
|
56
|
Unknown
|
Unknown
|
443
|
Null cipher
|
1,756
|
56
|
Stub
|
Low
|
444
|
Two-square cipher
|
1,753
|
56
|
Unknown
|
Unknown
|
445
|
Dorabella Cipher
|
1,751
|
56
|
Unknown
|
Unknown
|
446
|
Roger Dingledine
|
1,747
|
56
|
Start
|
Unknown
|
447
|
One-key MAC
|
1,735
|
55
|
Start
|
Low
|
448
|
Snowflake (software)
|
1,725
|
55
|
Start
|
Low
|
449
|
RIPEMD
|
1,720
|
55
|
C
|
Unknown
|
450
|
SecureDrop
|
1,713
|
55
|
Start
|
Mid
|
451
|
Pseudorandom function family
|
1,712
|
55
|
Start
|
Low
|
452
|
Random oracle
|
1,708
|
55
|
Start
|
Low
|
453
|
Key-agreement protocol
|
1,699
|
54
|
Start
|
Top
|
454
|
Nothing-up-my-sleeve number
|
1,688
|
54
|
C
|
Low
|
455
|
Public key fingerprint
|
1,685
|
54
|
Start
|
Mid
|
456
|
Format-preserving encryption
|
1,685
|
54
|
Start
|
High
|
457
|
Integrated Encryption Scheme
|
1,676
|
54
|
Start
|
Low
|
458
|
Four-square cipher
|
1,675
|
54
|
C
|
Unknown
|
459
|
Friend-to-friend
|
1,667
|
53
|
Start
|
Low
|
460
|
Hidden message
|
1,666
|
53
|
Start
|
Low
|
461
|
Information-theoretic security
|
1,661
|
53
|
Start
|
Top
|
462
|
Codebook
|
1,648
|
53
|
Stub
|
Unknown
|
463
|
Frank Terpil
|
1,639
|
52
|
Start
|
Low
|
464
|
Coinye
|
1,639
|
52
|
Start
|
Low
|
465
|
Red/black concept
|
1,635
|
52
|
Stub
|
Unknown
|
466
|
McEliece cryptosystem
|
1,630
|
52
|
C
|
High
|
467
|
MD6
|
1,629
|
52
|
Start
|
High
|
468
|
Berlekamp–Massey algorithm
|
1,628
|
52
|
Start
|
Unknown
|
469
|
Cryptovirology
|
1,605
|
51
|
Start
|
Mid
|
470
|
Secure cryptoprocessor
|
1,597
|
51
|
C
|
Mid
|
471
|
National Cryptologic Museum
|
1,591
|
51
|
C
|
Mid
|
472
|
Kasiski examination
|
1,575
|
50
|
Unknown
|
Unknown
|
473
|
NSAKEY
|
1,572
|
50
|
C
|
High
|
474
|
Ring signature
|
1,571
|
50
|
Start
|
Mid
|
475
|
Word square
|
1,546
|
49
|
C
|
Low
|
476
|
Content Scramble System
|
1,544
|
49
|
Start
|
Mid
|
477
|
NTRU
|
1,541
|
49
|
C
|
Low
|
478
|
NTRUEncrypt
|
1,528
|
49
|
C
|
Mid
|
479
|
MS-CHAP
|
1,524
|
49
|
Start
|
Low
|
480
|
One-way compression function
|
1,524
|
49
|
C
|
Top
|
481
|
Taher Elgamal
|
1,523
|
49
|
C
|
Unknown
|
482
|
Mix network
|
1,520
|
49
|
Stub
|
Unknown
|
483
|
Hash-based cryptography
|
1,516
|
48
|
Start
|
Low
|
484
|
Whirlpool (hash function)
|
1,512
|
48
|
Start
|
Low
|
485
|
Proof of space
|
1,505
|
48
|
Start
|
Low
|
486
|
Supersingular isogeny key exchange
|
1,499
|
48
|
Start
|
Low
|
487
|
SIGSALY
|
1,498
|
48
|
C
|
Low
|
488
|
Fuzzy hashing
|
1,463
|
47
|
C
|
Low
|
489
|
Oblivious transfer
|
1,451
|
46
|
Start
|
Unknown
|
490
|
Integrated Windows Authentication
|
1,451
|
46
|
Start
|
Unknown
|
491
|
BTCC (company)
|
1,439
|
46
|
Start
|
Low
|
492
|
List of things named after Alan Turing
|
1,435
|
46
|
List
|
Low
|
493
|
Sponge function
|
1,426
|
46
|
Unknown
|
Unknown
|
494
|
Camellia (cipher)
|
1,416
|
45
|
B
|
High
|
495
|
Always-on DRM
|
1,413
|
45
|
Start
|
Low
|
496
|
Perfect Dark (P2P)
|
1,398
|
45
|
C
|
Low
|
497
|
SIGABA
|
1,387
|
44
|
C
|
High
|
498
|
Retroshare
|
1,387
|
44
|
C
|
Low
|
499
|
Outline of cryptography
|
1,374
|
44
|
List
|
Top
|
500
|
Ian Goldberg
|
1,372
|
44
|
Start
|
Unknown
|