Template:CryptographyTasks
From blackwiki
Revision as of 03:52, 25 September 2009 by
imported>Ntsimp
(
Bent function
now exists)
(
diff
)
← Older revision
|
Latest revision
(
diff
) |
Newer revision →
(
diff
)
Jump to navigation
Jump to search
Current tasks for
Wikipedia:WikiProject Cryptography
edit
Improvement to
featured
or
good article
status:
{{Wikipedia:WikiProject Cryptography/Improvement candidates}}
Start from scratch:
Theory:
Computational boundedness
,
Lattice-based cryptography
Hash functions:
SMASH (hash)
Historical cryptography:
TELWA
,
Hut 3
,
Hut 4
Cipher machines:
Alvis (cipher machine)
,
SIGTOT
,
B-211
or
B-21 (cryptography)
,
OMI (machine)
,
Siemens SFM T43
,
SA-1 (cryptography)
,
BC-543
,
BC-38
,
Syko
,
CORAL
,
PENELOPE
Stream ciphers:
Fast correlation attack
,
HBB (cipher)
Block ciphers:
Vino (cipher)
,
BKSQ
,
Manta (cipher)
Block cipher misc topics:
IAPM
,
XECB
Block cipher cryptanalysis:
Yoyo game
Cryptographers:
Joan Clarke
,
Francis Fasson
,
Vladimir Furman
,
Joos Vandewalle
,
Toshio Tokita
,
Henri Gilbert
,
Helena Handschuh
,
Antoon Bosselaers
,
Christophe De Cannière
,
Joseph Lano
,
Håvard Raddum
,
Michael Wiener
Misc:
Elementary cryptography
Expansion / stubs:
(see also:
Category:Cryptography stubs
)
Cryptographic primitive
,
Key schedule
,
ElGamal signature scheme
,
Cyclometer
,
Algebraic normal form
,
Key clustering
,
cryptographic nonce
,
Slidex
Theory:
Completeness
,
Correlation immunity
,
Ring signature
,
Secure computation
,
Secure two-party computation
,
Universal composability
Hash functions:
HAS-V
,
MASH-1
,
MDC-2
Cryptographers:
Charles Rackoff
,
Leonard Hooper
,
Eric Malcolm Jones
,
Gordon Welchman
,
Victor S. Miller
,
Mihir Bellare
,
Phillip Rogaway
,
Lawrie Brown
,
Josef Pieprzyk
,
Jennifer Seberry
,
Jacques Stern
,
Alex Biryukov
,
Carlisle Adams
,
Matt Robshaw
,
Sean Murphy
,
Burt Kaliski
,
Nikita Borisov
,
Thomas Jakobsen
,
Kaisa Nyberg
,
David Naccache
,
James Massey
,
Stafford Tavares
,
Michael Luby
,
Jean-Jacques Quisquater
,
Paul van Oorschot
,
Howard Heys
,
Tom Berson
,
Hideki Imai
,
Xuejia Lai
,
Hugh Foss
,
Oliver Strachey
,
Francis Birch
Protocol:
Wireless Transport Layer Security
,
Oakley protocol
Stream ciphers:
Correlation attack
,
LILI-128
,
LEVIATHAN
,
Self-shrinking generator
,
SOBER
,
Stream cipher
Block ciphers:
ABC
,
ARIA
,
BaseKing
,
BassOmatic
,
CIKS-1
,
CIPHERUNICORN-A
,
CIPHERUNICORN-E
,
Cobra
,
COCONUT98
,
Crab
,
CRYPTON
,
DFC
,
E2
,
FEA-M
,
Grand Cru
,
Hierocrypt
,
KN-Cipher
,
Ladder-DES
,
M6
,
M8
,
MESH
,
MultiSwap
,
New Data Seal
,
Nimbus
,
NUSH
,
Q
,
SC2000
,
Spectr-H64
,
SXAL/MBAL
,
Treyfer
,
UES
,
Xenon
,
xmx
,
Zodiac
Block cipher cryptanalysis:
Davies' attack
,
Differential-linear attack
,
Higher order differential cryptanalysis
,
Impossible differential cryptanalysis
,
Integral cryptanalysis
,
Interpolation attack
,
Partitioning cryptanalysis
,
Slide attack
,
Truncated differential cryptanalysis
Block cipher misc topics:
CWC mode
,
Decorrelation theory
Misc:
Watermarking attack
,
Rambutan (cryptography)
,
Cryptovirology
Public-key cryptography:
McEliece cryptosystem
,
Public key fingerprint
,
IND-CCA
,
Pairing-based cryptography
,
Pohlig-Hellman algorithm
Verification:
None currently
Images:
None currently
Category
:
Cryptography templates
Navigation menu
Personal tools
English
Create account
Log in
Namespaces
Template
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information