Category:Cryptography
Jump to navigation
Jump to search
Category Cryptography on sister projects: | |||||||||
---|---|---|---|---|---|---|---|---|---|
![]() |
![]() Wikiversity |
![]() Commons |
To display all parents click on the "▶": |
practice and study of secure communication techniques | |||||
Upload media | |||||
Instance of | |||||
---|---|---|---|---|---|
Subclass of |
| ||||
Part of | |||||
Has part(s) |
| ||||
Significant event |
| ||||
| |||||
![]() |
Subcategories
This category has the following 29 subcategories, out of 29 total.
*
+
-
- Central Security Service (4 F)
A
C
- Chaffing and winnowing (3 F)
- Conferences in cryptography (4 F)
D
H
I
K
L
P
Q
R
S
- Somerton Man Code (2 F)
Media in category "Cryptography"
The following 200 files are in this category, out of 550 total.
(previous page) (next page)- 1D MITMNEW.png 529 × 346; 13 KB
- 2007-07-20 Polska Wytwórnia Papierów Wartościowych w Warszawie, wejście.jpg 2,840 × 2,128; 3.96 MB
- 2D MITMNEW.png 988 × 351; 21 KB
- 98-905 (IA 98-905-crs).pdf 1,239 × 1,752, 7 pages; 209 KB
- A single round of Phelix.jpg 284 × 140; 6 KB
- AECall with iPhone.png 1,138 × 804; 1.63 MB
- AES (Rijndael) Round Function.png 640 × 960; 10 KB
- Algorithm diagram for EnRUPT.png 151 × 191; 9 KB
- Algorithm diagram for XXTEA cipher.svg 391 × 462; 63 KB
- Algorythm.png 546 × 669; 62 KB
- Alternating GFN-02.png 476 × 477; 13 KB
- American-Cryptology-during-the-Cold-War-1945-1989-Book-IV-Cryptologic-Rebirth-1981-1989.pdf 1,652 × 1,695, 233 pages; 12.66 MB
- API Call structure for the Sent.ly Web API.png 579 × 436; 54 KB
- ArnoldCipherLetter.jpeg 760 × 491; 129 KB
- Arnsberger Feme ABC-1437.svg 1,075 × 399; 67 KB
- ARX structure-01.png 1,284 × 412; 42 KB
- As-map hobart.png 329 × 353; 32 KB
- As2 ablauf klein.png 410 × 290; 25 KB
- Asiacrypt06.jpg 2,592 × 1,944; 1.02 MB
- AsincStream.jpg 673 × 263; 45 KB
- ASmallSecret.pdf 1,239 × 1,754, 57 pages; 569 KB
- Astronomical Telegram John Ritchie.jpg 846 × 547; 79 KB
- Asymmetric encryption padlock analogy.svg 1,052 × 744; 90 KB
- Atbash.png 63 × 353; 2 KB
- ATM pinpad in german.jpg 295 × 213; 14 KB
- Autocorrelation cryptanalisys exmp.png 646 × 352; 19 KB
- AutocorrelGraph1.png 739 × 379; 822 KB
- AutocorrelGraph2.png 739 × 379; 822 KB
- AutocorrelGraph3.png 739 × 379; 822 KB
- AutocorrelGraph4.png 739 × 379; 822 KB
- B3-2.jpg 881 × 228; 25 KB
- B92 protocol quantum key distribution.svg 1,052 × 354; 17 KB
- Baby step giant step copy-01.svg 273 × 269; 12 KB
- Baby step giant step-01.png 1,136 × 1,119; 84 KB
- Backup facebook to google.jpg 1,921 × 1,080; 173 KB
- Bahaeddin Şakir telegram 4 July 1915.png 1,076 × 1,456; 2.02 MB
- Bandeau portail crypto.jpg 641 × 150; 49 KB
- BATCO Plastic Insert.jpg 2,448 × 3,264; 2.85 MB
- BATCO Wallet.jpg 2,448 × 3,264; 1.38 MB
- BATO Vocab Cards.jpg 2,448 × 3,264; 1.58 MB
- Bcrypt.png 726 × 226; 17 KB
- BelT hashing scheme.jpg 1,363 × 807; 70 KB
- Bildverschlüsselung.jpg 1,176 × 303; 95 KB
- Bipolar.jpg 360 × 141; 16 KB
- Bitcoin machine ATM.jpg 3,456 × 4,608; 5.35 MB
- Blaise de Vigenère – Traité des Chiffres, 1587.pdf 1,187 × 1,577, 705 pages; 557.95 MB
- Bletchley Park last German intercept.JPG 2,272 × 1,704; 1.31 MB
- Bomba full.jpg 1,049 × 1,913; 263 KB
- Bounty 2 Phrase.png 550 × 500; 37 KB
- Bring Chaocipher right wheel letter to zenith.png 653 × 445; 77 KB
- Buchstabenverteilung DE EN.png 723 × 411; 4 KB
- C't Kryptokampagne CeBIT 2006.jpg 1,280 × 926; 367 KB
- Car relay attack.png 889 × 352; 64 KB
- Carte-Visiopass-1990.jpg 323 × 511; 87 KB
- Cast-128(1).png 523 × 400; 40 KB
- Cast-128(2).png 180 × 342; 15 KB
- Ccmp decryption scheme.gif 910 × 254; 7 KB
- Ccmp encryption scheme.gif 878 × 305; 9 KB
- Ccmp packet structure.gif 872 × 301; 9 KB
- Ccmp packet structure.svg 903 × 348; 95 KB
- Ceazer ziper.png 680 × 383; 11 KB
- Certificat Mail.jpg 165 × 154; 15 KB
- Certificate-chain.png 629 × 783; 52 KB
- Chaocipher right disk permuting.png 981 × 905; 208 KB
- Chaocipher wheels starting position.png 653 × 445; 74 KB
- Chaocipher wheels.png 981 × 668; 127 KB
- ChatMail Encrypted mobile communications.gif 1,200 × 1,200; 4.58 MB
- Checking timestamp.png 800 × 468; 44 KB
- ChemicalPencil.png 1,029 × 396; 215 KB
- Choctaw nation medal of valour 1.jpg 2,016 × 1,512; 1.32 MB
- Choctaw nation medal of valour 2.jpg 2,016 × 1,512; 1.32 MB
- Ciphershed screenshot.png 450 × 372; 50 KB
- ClockWiseSpiralPath.png 482 × 210; 13 KB
- ClockWiseSpiralPathSolution.png 536 × 206; 12 KB
- Code wheel.jpg 852 × 430; 62 KB
- Codefranch.jpg 575 × 717; 106 KB
- Codes, Bukit, Bali, Indonesia.jpg 4,032 × 2,688; 6.62 MB
- Combination methods.PNG 909 × 59; 5 KB
- Complementation slide.jpg 1,061 × 607; 105 KB
- Consensus 2022, Cardano.jpg 3,500 × 2,333; 1.35 MB
- Constructor.png 488 × 492; 18 KB
- Contrasenyes.pdf 1,250 × 3,125; 33 KB
- CreacionTBC.png 505 × 286; 11 KB
- Creation and Contents of Digital certificate.png 660 × 457; 33 KB
- CriptografiaAsimetrica.png 800 × 190; 48 KB
- Crypto clipart1.svg 744 × 1,052; 32 KB
- Crypto clipart2.png 595 × 465; 14 KB
- Crypto clipart2.svg 744 × 1,052; 45 KB
- Cryptoapi reading.jpg 714 × 301; 145 KB
- Cryptogram-example.jpg 575 × 327; 44 KB
- Cryptogram-example.svg 512 × 291; 5 KB
- Cryptography by aryabhat.jpg 1,357 × 1,317; 381 KB
- Cryptography clipart1.png 595 × 842; 70 KB
- Cryptography Fleuron T116443-1.png 876 × 882; 60 KB
- Cryptography01.png 636 × 518; 24 KB
- Cryptointro.jpg 190 × 133; 6 KB
- Cypher core system picture wikimedia.tif 1,400 × 1,050; 53 KB
- Data Encryption.JPG 720 × 960; 187 KB
- De-Kryptogramm.ogg 2.1 s; 21 KB
- De-Kryptologe.ogg 2.2 s; 21 KB
- De-Kryptologie.ogg 2.1 s; 20 KB
- Decryption and Topology of the Genetic Code.png 1,410 × 1,583; 77 KB
- DH-EKE.png 401 × 322; 19 KB
- Diagramme sequence.png 1,011 × 664; 46 KB
- DifferentialCryptanalysisOfXXTEAFirstApproach.png 642 × 322; 9 KB
- Diffie-Hellman Key Exchange Paint Analogy.svg 1,997 × 2,997; 29 KB
- Diffie-Hellman Key Exchange-modified.png 480 × 695; 32 KB
- Digital enrollment and authentication reference process.jpg 2,048 × 1,248; 209 KB
- Digital Signature diagram fi.svg 1,500 × 1,125; 16 KB
- Digital Signature diagram ja.svg 1,500 × 1,125; 21 KB
- Digital voting-01.png 1,384 × 835; 75 KB
- Digital Watermark Cleaning - Sequence.svg 916 × 244; 35 KB
- DigitalSignatureSchemes.jpg 787 × 1,084; 126 KB
- Dining cryptographers protocol, announcement, Japanese.svg 372 × 252; 134 KB
- Dining cryptographers protocol, anonymity set, Japanese.svg 320 × 240; 122 KB
- Dining cryptographers protocol, circle graph, Japanese.svg 369 × 240; 120 KB
- Dining cryptographers protocol, network graph, Japanese.svg 320 × 240; 120 KB
- DirectionalSpectra.png 1,378 × 778; 16 KB
- Distance bounding protocole de Hancke et Kuhn.png 960 × 720; 11 KB
- Doubling oriented.jpg 108 × 287; 4 KB
- Dps protocol redone.png 335 × 151; 15 KB
- Dps protocol.png 335 × 151; 15 KB
- DUAL EC DRBG.jpg 1,214 × 316; 21 KB
- EAS S-box.jpg 367 × 177; 24 KB
- EAX block cipher mode of operation.svg 800 × 740; 3 KB
- Ecc over GF-71.png 1,653 × 1,629; 45 KB
- EFS operation scheme.png 1,187 × 1,429; 158 KB
- EJBCA 7.9.0.2 in English – Administration.png 1,148 × 817; 140 KB
- Ejemplo2 wm txt.gif 600 × 262; 23 KB
- EKE.png 225 × 418; 16 KB
- EncapsulationSecurityPayload.JPG 807 × 506; 60 KB
- Encoded letter of Gabriel Luetz d Aramon after 1546 with partial deciphering.jpg 3,034 × 2,058; 1.75 MB
- EncripDecrip.png 454 × 646; 44 KB
- Encrypted file.png 668 × 272; 61 KB
- Encryption - Asymmetric.svg 1,028 × 248; 5 KB
- Encryption - Symmetric.svg 1,028 × 248; 4 KB
- Encryption example with two people.png 1,110 × 520; 21 KB
- Encryption gnupg 1.png 1,920 × 1,080; 139 KB
- Encryption gnupg 2.png 942 × 494; 34 KB
- Encryption gnupg 3.png 1,906 × 1,079; 207 KB
- Encryption gnupg 5.png 1,906 × 1,079; 296 KB
- Encryption gnupg 6.png 1,899 × 1,075; 170 KB
- Encryption gnupg 7.png 1,910 × 1,079; 217 KB
- Encryption gnupg 8.png 1,910 × 1,079; 182 KB
- Encyclopedia of Cryptography and Security.jpg 371 × 573; 51 KB
- Enkriptimi dhe dekriptimi me PGP.png 500 × 521; 37 KB
- Erasure code work principle.png 1,152 × 648; 31 KB
- Esquema per il·lustrar el xifratge simetric.PNG 412 × 266; 12 KB
- Extendedvalidation.PNG 400 × 244; 16 KB
- FBacon alfa1.jpg 300 × 187; 19 KB
- FBacon alfa2.jpg 300 × 415; 41 KB
- Fcsr1.png 1,076 × 387; 20 KB
- FEAL-f.png 844 × 813; 22 KB
- FEAL-fk.png 844 × 813; 27 KB
- FEAL-scheme.png 1,103 × 1,918; 59 KB
- Filetopia-Screen 1.png 944 × 751; 148 KB
- Finalcrypt GUI Log.png 1,920 × 1,080; 253 KB
- Finalcrypt GUI Main.png 1,920 × 1,080; 182 KB
- Fips186-2.svg 942 × 679; 22 KB
- Firma Digital Asimétrica.png 761 × 198; 48 KB
- Firma digital.jpg 524 × 397; 37 KB
- FirstQuantumCryptoScheme.jpg 548 × 228; 36 KB
- Fluxus Haiku Issue 1.pdf 1,239 × 1,754; 81 KB
- Fluxus Haiku Issue 2.pdf 1,239 × 1,754; 66 KB
- Forward Secrecy - Instant Perfect forward Secrecy.png 388 × 251; 33 KB
- FrameSmal5.gif 250 × 40; 979 bytes
- FrameSmall2.gif 250 × 26; 709 bytes
- FrameSmall3.gif 250 × 26; 730 bytes
- FrameSmall4.gif 250 × 26; 674 bytes
- Friedman Lectures on Cryptology.pdf 1,510 × 1,562, 187 pages; 10.77 MB
- FuncR.png 525 × 203; 10 KB
- Function search 2.png 283 × 393; 8 KB
- Function search cycle.png 314 × 545; 19 KB
- FWB(K).png 300 × 100; 8 KB
- FWB(K-szyfrowane).png 300 × 100; 5 KB
- FWB.png 300 × 100; 6 KB
- Gamma123.PNG 816 × 436; 16 KB
- Gammirovanie GOST.png 400 × 293; 16 KB
- Gammirovanie s obratnoy svyazyu GOST.png 400 × 290; 15 KB
- Garbled circuit AND gate illustration.svg 179 × 95; 41 KB
- Garbled circuit AND gate truth table illustration.svg 394 × 112; 146 KB
- Generation meсhanism of Yarrow algorithm.png 831 × 281; 27 KB
- Generic Bootstrapping Architecture.jpg 620 × 480; 33 KB
- GetDownGetEncrypted.jpeg 842 × 595; 146 KB
- GoldBug MELODICA Calling.png 865 × 771; 106 KB
- Green Keys.jpg 650 × 265; 148 KB
- GSM auth A8.jpg 991 × 673; 103 KB
- Génération de clés cryptographiques avec la biométrie.jpg 806 × 442; 78 KB
- Hardware Encrypted USB Flash Drive.pdf 1,752 × 1,239, 8 pages; 2.76 MB
- Hash attack.png 391 × 522; 17 KB
- Hash function2-es.svg 531 × 310; 18 KB
- Hashalgorithm.png 2,940 × 1,500; 131 KB
- Hellman.png 1,041 × 555; 11 KB
- Hollman cas.png 920 × 172; 22 KB