Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List[edit]

Period: 2024-03-01 to 2024-03-31

Total views: 7,329,810

Updated: 15:41, 5 April 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 1,117,239 36,039 B High
2 Bitcoin 363,297 11,719 B High
3 Alan Turing 228,452 7,369 GA Top
4 Cryptocurrency 175,582 5,663 C High
5 WikiLeaks 137,631 4,439 B Low
6 HTTPS 114,267 3,686 C High
7 The Imitation Game 103,584 3,341 C Mid
8 Tor (network) 103,046 3,324 B Mid
9 Voynich manuscript 100,290 3,235 B Low
10 Blockchain 87,468 2,821 B High
11 Transport Layer Security 82,337 2,656 B Top
12 Virtual private network 82,087 2,647 C Mid
13 History of bitcoin 81,264 2,621 C Low
14 National Security Agency 72,364 2,334 C High
15 Enigma machine 71,189 2,296 C High
16 Vitalik Buterin 69,519 2,242 C Low
17 Password 68,754 2,217 C Top
18 RSA (cryptosystem) 68,727 2,217 C Top
19 Dogecoin 56,686 1,828 C Low
20 Advanced Encryption Standard 56,509 1,822 B Top
21 Diffie–Hellman key exchange 54,504 1,758 C Top
22 SHA-2 49,501 1,596 C Top
23 Secure Shell 48,305 1,558 C High
24 Cryptography 48,122 1,552 C Top
25 HTTP Strict Transport Security 45,008 1,451 C Low
26 Shiba Inu (cryptocurrency) 42,395 1,367 Start Low
27 Public-key cryptography 40,950 1,320 C Top
28 Changpeng Zhao 40,507 1,306 Start Low
29 Block cipher mode of operation 40,309 1,300 C Top
30 Darknet market 39,668 1,279 B Mid
31 Zimmermann Telegram 38,539 1,243 B High
32 Caesar cipher 38,287 1,235 FA High
33 Joan Clarke 36,028 1,162 C Mid
34 MD5 35,133 1,133 C Top
35 Man-in-the-middle attack 32,388 1,044 C Mid
36 Digital signature 29,645 956 C Top
37 Knapsack problem 29,618 955 B Mid
38 GCHQ 29,272 944 B Low
39 Vigenère cipher 29,187 941 B Low
40 Proton Mail 28,926 933 C Low
41 Claude Shannon 28,834 930 C Top
42 Cryptographic hash function 28,811 929 C Top
43 Encryption 28,000 903 C Top
44 HMAC 27,590 890 C High
45 Information theory 27,409 884 B Top
46 Steganography 27,209 877 B High
47 Active Directory 27,126 875 C Low
48 Sator Square 26,952 869 B Low
49 Post-quantum cryptography 26,360 850 C High
50 SHA-1 25,766 831 C Top
51 I2P 25,181 812 B Low
52 Pretty Good Privacy 24,883 802 B High
53 Bletchley Park 23,747 766 B High
54 NordVPN 23,183 747 C Mid
55 Elliptic-curve cryptography 22,767 734 C High
56 Certificate authority 22,699 732 C High
57 Signal (messaging app) 22,669 731 C Mid
58 Digital rights management 22,541 727 B High
59 Ross J. Anderson 22,332 720 C Mid
60 Zero-knowledge proof 22,253 717 C Top
61 Merkle tree 22,073 712 C Mid
62 Wi-Fi Protected Access 21,868 705 C Mid
63 Trusted Platform Module 21,712 700 C Mid
64 Letter frequency 21,597 696 B Low
65 Cipher 20,733 668 C Top
66 Information security 20,674 666 B Top
67 Data Encryption Standard 19,877 641 C Top
68 Cryptanalysis of the Enigma 19,583 631 C Mid
69 Kerberos (protocol) 19,466 627 C High
70 Public key infrastructure 19,327 623 C Top
71 One-time pad 18,801 606 C Top
72 Homomorphic encryption 18,669 602 C High
73 One-time password 18,459 595 C Mid
74 ROT13 18,301 590 C Mid
75 Vault 7 17,704 571 C Mid
76 Authentication 17,503 564 C High
77 Secure Hash Algorithms 17,237 556 Start High
78 Bcrypt 16,853 543 C Mid
79 Side-channel attack 16,763 540 C High
80 .onion 16,248 524 C Low
81 Hyphanet 16,199 522 B Mid
82 Bitcoin Cash 16,089 519 Start Low
83 Kryptos 16,024 516 C Low
84 Code talker 15,946 514 B Low
85 Salt (cryptography) 15,915 513 Start High
86 Rainbow table 15,642 504 C High
87 Bombe 15,439 498 B Mid
88 Brute-force attack 15,242 491 C High
89 Substitution cipher 15,111 487 Unknown Unknown
90 OpenVPN 15,064 485 C Mid
91 Public key certificate 14,702 474 C Top
92 SHA-3 14,701 474 Start Mid
93 Elliptic Curve Digital Signature Algorithm 14,419 465 C High
94 SSH File Transfer Protocol 14,253 459 Start Unknown
95 Phone hacking 14,200 458 Start Mid
96 Keychain (software) 13,966 450 Start Unknown
97 OpenSSL 13,873 447 B High
98 Galois/Counter Mode 13,787 444 C Mid
99 Utah Data Center 13,651 440 C Mid
100 Symmetric-key algorithm 13,608 438 Start Top
101 Grover's algorithm 13,474 434 C Mid
102 InterPlanetary File System 12,786 412 C Low
103 Colossus computer 12,596 406 B Mid
104 Integer factorization 12,545 404 B Mid
105 Alice and Bob 12,177 392 Start Low
106 Tails (operating system) 12,153 392 Start Low
107 Proof of stake 12,133 391 Start Low
108 Ultra (cryptography) 11,978 386 C High
109 Forward secrecy 11,924 384 C High
110 PBKDF2 11,294 364 Start Unknown
111 Differential privacy 10,918 352 C Unknown
112 Playfair cipher 10,703 345 Unknown Unknown
113 Pay television 10,648 343 Start Unknown
114 Theoretical computer science 10,552 340 B Low
115 VeraCrypt 10,512 339 C Mid
116 Apple–FBI encryption dispute 10,482 338 C Low
117 Fort Meade 10,424 336 C Low
118 Shamir's secret sharing 10,374 334 C High
119 Mullvad 10,369 334 Start Low
120 Comparison of BitTorrent clients 10,357 334 List Low
121 Cryptographic nonce 10,263 331 Start High
122 Cryptonomicon 10,228 329 C Low
123 Message authentication code 10,179 328 C Top
124 Lavarand 9,913 319 Start Mid
125 Cypherpunk 9,902 319 C Mid
126 Link 16 9,893 319 Start Low
127 Quantum key distribution 9,841 317 B Mid
128 Self-signed certificate 9,792 315 Start Unknown
129 3-D Secure 9,750 314 Start Low
130 Bitwarden 9,555 308 C Low
131 EdDSA 9,529 307 C High
132 Authenticated encryption 9,506 306 C Mid
133 Password manager 9,399 303 C Low
134 Beale ciphers 9,396 303 B Low
135 Cryptanalysis 9,384 302 C High
136 Birthday attack 9,382 302 C High
137 Transposition cipher 9,375 302 Unknown Unknown
138 Litecoin 9,181 296 Start Low
139 The Tor Project 9,092 293 C Mid
140 Confidentiality 9,087 293 C Low
141 ChaCha20-Poly1305 8,974 289 C Low
142 Adam Back 8,868 286 Start Low
143 Curve25519 8,829 284 C High
144 RC4 8,720 281 B Top
145 Triple DES 8,704 280 Start Unknown
146 Elliptic-curve Diffie–Hellman 8,640 278 Start Mid
147 Discrete logarithm 8,633 278 C Mid
148 Block cipher 8,404 271 C Top
149 FIPS 140-2 8,368 269 C Mid
150 Len Sassaman 8,307 267 Start Unknown
151 Babington Plot 8,246 266 C Low
152 Decentralized finance 8,225 265 Start Low
153 WebTorrent 8,215 265 Start Unknown
154 Certificate signing request 8,210 264 C Low
155 Illegal number 8,205 264 C Low
156 Bitconnect 8,035 259 C Low
157 Signal Protocol 8,011 258 C High
158 Argon2 7,944 256 Start Mid
159 GNU Privacy Guard 7,919 255 C Unknown
160 PKCS 12 7,882 254 Start Unknown
161 Digital Signature Algorithm 7,800 251 C Top
162 Cipher suite 7,795 251 C Top
163 Quantum cryptography 7,782 251 C High
164 Password strength 7,704 248 C High
165 Citizenfour 7,668 247 C Low
166 ElGamal encryption 7,565 244 Start Top
167 KeePass 7,490 241 C Low
168 Stream cipher 7,466 240 Start Top
169 Wired Equivalent Privacy 7,361 237 C Mid
170 RSA Security 7,287 235 C Unknown
171 Digest access authentication 7,278 234 B Low
172 Matrix (protocol) 7,208 232 Start Unknown
173 Richard Teng 7,120 229 Start Low
174 Key derivation function 7,099 229 C Low
175 IMSI-catcher 7,070 228 Start Mid
176 Conel Hugh O'Donel Alexander 7,001 225 Start Low
177 Cryptographically secure pseudorandom number generator 6,938 223 C Top
178 Qubes OS 6,892 222 C Mid
179 Dual EC DRBG 6,759 218 C High
180 Lorenz cipher 6,747 217 C Top
181 Tap code 6,738 217 Start Low
182 DNS-based Authentication of Named Entities 6,738 217 C Mid
183 Secure multi-party computation 6,711 216 Start High
184 Boolean function 6,643 214 Start Mid
185 Mutual authentication 6,499 209 Stub Low
186 Electronic signature 6,499 209 C Low
187 Deniable encryption 6,480 209 Start High
188 Padding (cryptography) 6,446 207 Start Unknown
189 Password cracking 6,425 207 C Mid
190 Polkadot (cryptocurrency) 6,385 205 Start Low
191 Root certificate 6,342 204 Start Low
192 Salsa20 6,340 204 C Top
193 Rijndael S-box 6,308 203 Start Low
194 Elizebeth Smith Friedman 6,289 202 C Mid
195 OpenSSH 6,242 201 C High
196 Blowfish (cipher) 6,211 200 B High
197 Bitcoin scalability problem 6,208 200 C Low
198 Key (cryptography) 6,162 198 Start Unknown
199 Kerckhoffs's principle 6,063 195 Start Mid
200 XOR cipher 6,027 194 Stub Mid
201 A5/1 5,996 193 B High
202 Cryptogram 5,937 191 C Mid
203 The Doughnut 5,924 191 GA High
204 Lattice-based cryptography 5,917 190 Start Low
205 Ciphertext 5,888 189 Start High
206 Initialization vector 5,869 189 C High
207 Polybius square 5,722 184 Start Mid
208 AES instruction set 5,714 184 C Low
209 BLAKE (hash function) 5,705 184 C Mid
210 RSA SecurID 5,685 183 Unknown Unknown
211 Units of information 5,676 183 C Unknown
212 Adi Shamir 5,652 182 Start Unknown
213 Web of trust 5,652 182 C High
214 Gordon Welchman 5,631 181 C Low
215 Datagram Transport Layer Security 5,620 181 Start Mid
216 Feistel cipher 5,609 180 Start Unknown
217 List of bitcoin forks 5,568 179 List Low
218 Rail fence cipher 5,508 177 Start Low
219 KeePassXC 5,454 175 Start Low
220 TrueCrypt 5,418 174 C Mid
221 History of cryptography 5,406 174 Start High
222 Marian Rejewski 5,399 174 FA Mid
223 Supply chain attack 5,374 173 C Low
224 Frequency analysis 5,328 171 C High
225 Replay attack 5,311 171 C Top
226 Privacy-Enhanced Mail 5,262 169 Start Low
227 Hill cipher 5,259 169 Unknown Unknown
228 Padding oracle attack 5,102 164 Stub Unknown
229 Certificate revocation list 5,014 161 C Low
230 Bitcoin Core 5,008 161 Start Low
231 Non-repudiation 4,959 159 Start Mid
232 Bruce Schneier 4,893 157 Start High
233 Automatic Certificate Management Environment 4,860 156 Start Low
234 One-way function 4,810 155 Start Top
235 Key size 4,807 155 C High
236 Affine cipher 4,770 153 C Low
237 Communications Security Establishment 4,768 153 C Mid
238 Bacon's cipher 4,756 153 Start Low
239 Blockchain game 4,748 153 Start Low
240 Cold boot attack 4,714 152 C Low
241 David Chaum 4,693 151 C Low
242 AES key schedule 4,681 151 Start Low
243 Ricky McCormick's encrypted notes 4,679 150 B Unknown
244 11B-X-1371 4,676 150 GA Low
245 Avalanche effect 4,668 150 Start High
246 S-box 4,652 150 Start Top
247 PKCS 4,573 147 List High
248 Digital watermarking 4,535 146 B Mid
249 Filecoin 4,481 144 Stub Low
250 Commitment scheme 4,403 142 C High
251 Timing attack 4,385 141 C High
252 Harvest now, decrypt later 4,368 140 Start Low
253 Cryptocurrency tumbler 4,368 140 Start Unknown
254 Challenge–response authentication 4,325 139 Start Mid
255 Known-plaintext attack 4,275 137 Start High
256 NIST Post-Quantum Cryptography Standardization 4,219 136 C Mid
257 Dictionary attack 4,170 134 C Unknown
258 PKCS 7 4,159 134 Start Low
259 Book cipher 4,131 133 C Low
260 Hashcash 4,120 132 Start Unknown
261 Session (software) 4,116 132 Start Low
262 PKCS 1 4,073 131 C Mid
263 Code signing 4,051 130 C Low
264 Australian Signals Directorate 4,036 130 C Low
265 Digital renminbi 3,949 127 B High
266 Merkle–Damgård construction 3,929 126 C Unknown
267 Elliptic curve point multiplication 3,922 126 C Mid
268 Type B Cipher Machine 3,914 126 Start Low
269 Comparison of TLS implementations 3,889 125 List High
270 Disk encryption 3,837 123 C High
271 IEEE 802.11i-2004 3,810 122 C Mid
272 SipHash 3,797 122 Start Low
273 Fork (blockchain) 3,791 122 Start Mid
274 Pre-shared key 3,773 121 Start Mid
275 Key exchange 3,772 121 Start Unknown
276 Plaintext 3,742 120 Start High
277 Daniel J. Bernstein 3,726 120 C Mid
278 Polyalphabetic cipher 3,725 120 Start Unknown
279 Chosen-plaintext attack 3,710 119 Stub Unknown
280 List of ciphertexts 3,707 119 List Low
281 Atbash 3,695 119 Stub Low
282 Crypto-anarchy 3,687 118 Start High
283 Algorand 3,652 117 B Low
284 Length extension attack 3,625 116 Start Unknown
285 K-anonymity 3,621 116 Start Mid
286 Collision attack 3,608 116 Start High
287 Crypto AG 3,597 116 C High
288 Bomba (cryptography) 3,582 115 Start Low
289 Diplomatic bag 3,567 115 Start Low
290 Whitfield Diffie 3,559 114 B High
291 I. J. Good 3,534 114 C Low
292 Threema 3,513 113 C Unknown
293 Communications security 3,508 113 Start Mid
294 Special Collection Service 3,505 113 C Low
295 Data anonymization 3,494 112 Start Mid
296 RSA Factoring Challenge 3,485 112 Start Low
297 Physical unclonable function 3,483 112 Start Unknown
298 Preimage attack 3,456 111 Stub Unknown
299 Quantum network 3,456 111 C Low
300 Whonix 3,414 110 Start Mid
301 Keygen 3,403 109 C Low
302 Comparison of SSH clients 3,395 109 List Low
303 Optimal asymmetric encryption padding 3,386 109 Start High
304 Phil Zimmermann 3,360 108 Start Mid
305 Cryptographic protocol 3,352 108 Start High
306 PKCS 11 3,339 107 Unknown Unknown
307 Non-interactive zero-knowledge proof 3,288 106 Start Low
308 Copiale cipher 3,285 105 Start Low
309 Wildcard certificate 3,227 104 Start Unknown
310 Charlie Lee (computer scientist) 3,193 103 Start Low
311 Subject Alternative Name 3,166 102 Stub Mid
312 Disk encryption theory 3,131 101 C Unknown
313 Certificate Transparency 3,042 98 C High
314 Dilly Knox 3,033 97 B Unknown
315 Schnorr signature 3,021 97 C High
316 Alastair Denniston 3,021 97 Start Unknown
317 Twofish 3,006 96 Start High
318 Bouncy Castle (cryptography) 3,000 96 Start Unknown
319 Secret sharing 2,996 96 B High
320 Magic (cryptography) 2,979 96 Start Unknown
321 Scrambler 2,970 95 C Unknown
322 David Wheeler (computer scientist) 2,951 95 Start Low
323 Confusion and diffusion 2,937 94 Start Mid
324 Encryption software 2,917 94 Start Top
325 PKCS 8 2,856 92 Stub Unknown
326 HTTP Public Key Pinning 2,837 91 C Mid
327 Comparison of disk encryption software 2,824 91 List High
328 FIPS 140 2,818 90 Start Mid
329 Coppersmith's attack 2,811 90 B High
330 Data at rest 2,798 90 C Mid
331 DNS Certification Authority Authorization 2,792 90 GA Low
332 Tox (protocol) 2,788 89 C Low
333 HKDF 2,767 89 Start Unknown
334 Martin Hellman 2,766 89 Start High
335 Tiny Encryption Algorithm 2,765 89 Unknown Unknown
336 Crypt (C) 2,754 88 C High
337 Encrypting File System 2,746 88 B Unknown
338 William F. Friedman 2,740 88 C Unknown
339 Clipper chip 2,738 88 C High
340 Export of cryptography from the United States 2,737 88 C Unknown
341 Off-the-record messaging 2,723 87 Start Unknown
342 BB84 2,721 87 Start Low
343 Key management 2,698 87 Unknown Unknown
344 AES implementations 2,687 86 List Low
345 Zcash 2,654 85 Start Low
346 Rijndael MixColumns 2,650 85 Start Low
347 Government Communications Security Bureau 2,648 85 B Low
348 Leo Marks 2,642 85 B Unknown
349 Ralph Merkle 2,635 85 C High
350 Meet-in-the-middle attack 2,632 84 C High
351 Ciphertext indistinguishability 2,624 84 C High
352 Paillier cryptosystem 2,608 84 Start High
353 Comparison of cryptography libraries 2,605 84 List Unknown
354 Clock drift 2,583 83 C Low
355 Trusted Computing 2,572 82 C Mid
356 Double Ratchet Algorithm 2,564 82 Start Low
357 William Binney (intelligence official) 2,546 82 Start Mid
358 CCM mode 2,538 81 Start High
359 Advanced Encryption Standard process 2,512 81 C Mid
360 Classical cipher 2,512 81 Start Top
361 Bullrun (decryption program) 2,489 80 B Low
362 Trapdoor function 2,421 78 Start High
363 FIPS 140-3 2,409 77 C Low
364 Tor2web 2,392 77 Start Low
365 Baby-step giant-step 2,374 76 B Unknown
366 SegWit 2,374 76 Start Low
367 Authenticator 2,372 76 Start Unknown
368 Reception and criticism of WhatsApp security and privacy features 2,366 76 C Low
369 Visual cryptography 2,363 76 Unknown Unknown
370 Security level 2,349 75 Stub Mid
371 Pepper (cryptography) 2,335 75 Start Low
372 Dm-crypt 2,331 75 Start Low
373 Privacy and blockchain 2,328 75 C Low
374 Anonymous P2P 2,324 74 C Low
375 Entrust 2,320 74 Start Low
376 Mumble (software) 2,320 74 C Unknown
377 DES supplementary material 2,314 74 C Low
378 Rubber-hose cryptanalysis 2,312 74 Redirect Low
379 Comparison of cryptographic hash functions 2,310 74 List Low
380 W. T. Tutte 2,297 74 C Mid
381 Trusted timestamping 2,283 73 Start Unknown
382 Open Whisper Systems 2,273 73 B Unknown
383 Proof of authority 2,268 73 Start Low
384 Cryptanalysis of the Lorenz cipher 2,265 73 C High
385 CBC-MAC 2,255 72 C High
386 FileVault 2,253 72 C Mid
387 Cryptographic primitive 2,242 72 Start Top
388 Lenstra elliptic-curve factorization 2,234 72 C Low
389 Key encapsulation mechanism 2,219 71 Start High
390 Opportunistic TLS 2,208 71 Start Mid
391 MD4 2,195 70 Start Low
392 The Code Book 2,180 70 Start Low
393 RSA problem 2,160 69 Start Top
394 Differential cryptanalysis 2,153 69 B High
395 Collision resistance 2,122 68 Start High
396 Blind signature 2,119 68 C Mid
397 Key disclosure law 2,119 68 C Low
398 Bitcoin Gold 2,086 67 Start Low
399 Temporal Key Integrity Protocol 2,063 66 C Low
400 ADFGVX cipher 2,056 66 Unknown Unknown
401 Autokey cipher 2,053 66 C Mid
402 Jami (software) 2,049 66 Start Unknown
403 Enigma rotor details 2,046 66 Start Mid
404 Advanced Access Content System 2,045 65 C Mid
405 Orbot 2,034 65 Stub Low
406 Keybase 2,031 65 Start Low
407 Chosen-ciphertext attack 2,018 65 Start High
408 ElGamal signature scheme 2,011 64 Start Top
409 Strong cryptography 2,006 64 Unknown Unknown
410 Arthur Scherbius 2,003 64 Start Mid
411 GNUnet 1,971 63 B Low
412 Poly1305 1,966 63 Start Top
413 DeCSS 1,964 63 C Mid
414 FreeOTP 1,958 63 Start Low
415 Wiener's attack 1,937 62 B High
416 Rotor machine 1,925 62 Unknown Unknown
417 Key stretching 1,925 62 Start Unknown
418 Briar (software) 1,925 62 Start Low
419 Power analysis 1,921 61 Unknown Unknown
420 Crypto Wars 1,902 61 Start High
421 UltraViolet (website) 1,900 61 C Low
422 Generic Security Services Application Program Interface 1,897 61 Start Low
423 BLS digital signature 1,875 60 Start Mid
424 LibreSSL 1,870 60 Start High
425 Code (cryptography) 1,861 60 Start Top
426 Blum Blum Shub 1,838 59 Start High
427 Downgrade attack 1,838 59 Start Mid
428 Key server (cryptographic) 1,834 59 Start Mid
429 Banburismus 1,833 59 C Low
430 Simultaneous Authentication of Equals 1,828 58 Start High
431 Shugborough inscription 1,823 58 Start Low
432 Tabula recta 1,821 58 Unknown Unknown
433 Challenge-Handshake Authentication Protocol 1,820 58 Start Low
434 Content Authenticity Initiative 1,820 58 C Low
435 Hybrid cryptosystem 1,808 58 Start High
436 Secret decoder ring 1,806 58 Start Low
437 ZeroNet 1,806 58 Start Low
438 Garlic routing 1,804 58 Stub Unknown
439 International Data Encryption Algorithm 1,791 57 C Unknown
440 Serpent (cipher) 1,787 57 C Low
441 SYN cookies 1,760 56 Start Unknown
442 Black Chamber 1,758 56 Unknown Unknown
443 Null cipher 1,756 56 Stub Low
444 Two-square cipher 1,753 56 Unknown Unknown
445 Dorabella Cipher 1,751 56 Unknown Unknown
446 Roger Dingledine 1,747 56 Start Unknown
447 One-key MAC 1,735 55 Start Low
448 Snowflake (software) 1,725 55 Start Low
449 RIPEMD 1,720 55 C Unknown
450 SecureDrop 1,713 55 Start Mid
451 Pseudorandom function family 1,712 55 Start Low
452 Random oracle 1,708 55 Start Low
453 Key-agreement protocol 1,699 54 Start Top
454 Nothing-up-my-sleeve number 1,688 54 C Low
455 Public key fingerprint 1,685 54 Start Mid
456 Format-preserving encryption 1,685 54 Start High
457 Integrated Encryption Scheme 1,676 54 Start Low
458 Four-square cipher 1,675 54 C Unknown
459 Friend-to-friend 1,667 53 Start Low
460 Hidden message 1,666 53 Start Low
461 Information-theoretic security 1,661 53 Start Top
462 Codebook 1,648 53 Stub Unknown
463 Frank Terpil 1,639 52 Start Low
464 Coinye 1,639 52 Start Low
465 Red/black concept 1,635 52 Stub Unknown
466 McEliece cryptosystem 1,630 52 C High
467 MD6 1,629 52 Start High
468 Berlekamp–Massey algorithm 1,628 52 Start Unknown
469 Cryptovirology 1,605 51 Start Mid
470 Secure cryptoprocessor 1,597 51 C Mid
471 National Cryptologic Museum 1,591 51 C Mid
472 Kasiski examination 1,575 50 Unknown Unknown
473 NSAKEY 1,572 50 C High
474 Ring signature 1,571 50 Start Mid
475 Word square 1,546 49 C Low
476 Content Scramble System 1,544 49 Start Mid
477 NTRU 1,541 49 C Low
478 NTRUEncrypt 1,528 49 C Mid
479 MS-CHAP 1,524 49 Start Low
480 One-way compression function 1,524 49 C Top
481 Taher Elgamal 1,523 49 C Unknown
482 Mix network 1,520 49 Stub Unknown
483 Hash-based cryptography 1,516 48 Start Low
484 Whirlpool (hash function) 1,512 48 Start Low
485 Proof of space 1,505 48 Start Low
486 Supersingular isogeny key exchange 1,499 48 Start Low
487 SIGSALY 1,498 48 C Low
488 Fuzzy hashing 1,463 47 C Low
489 Oblivious transfer 1,451 46 Start Unknown
490 Integrated Windows Authentication 1,451 46 Start Unknown
491 BTCC (company) 1,439 46 Start Low
492 List of things named after Alan Turing 1,435 46 List Low
493 Sponge function 1,426 46 Unknown Unknown
494 Camellia (cipher) 1,416 45 B High
495 Always-on DRM 1,413 45 Start Low
496 Perfect Dark (P2P) 1,398 45 C Low
497 SIGABA 1,387 44 C High
498 Retroshare 1,387 44 C Low
499 Outline of cryptography 1,374 44 List Top
500 Ian Goldberg 1,372 44 Start Unknown