From Wikipedia, the free encyclopedia
This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
Period: 2025-04-01 to 2025-04-30
Total views: 5,500,263
Updated: 14:31, 6 May 2025 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
505,808
|
16,860
|
B
|
High
|
2
|
Telegram (software)
|
253,892
|
8,463
|
B
|
Mid
|
3
|
Alan Turing
|
217,350
|
7,245
|
GA
|
Top
|
4
|
Bitcoin
|
160,578
|
5,352
|
B
|
High
|
5
|
Voynich manuscript
|
95,683
|
3,189
|
B
|
Low
|
6
|
Cryptocurrency
|
84,017
|
2,800
|
C
|
High
|
7
|
Signal (software)
|
83,476
|
2,782
|
C
|
Mid
|
8
|
The Imitation Game
|
82,226
|
2,740
|
C
|
Mid
|
9
|
Tor (network)
|
76,518
|
2,550
|
B
|
Mid
|
10
|
WikiLeaks
|
68,734
|
2,291
|
B
|
Low
|
11
|
Blockchain
|
67,383
|
2,246
|
B
|
High
|
12
|
National Security Agency
|
66,835
|
2,227
|
C
|
High
|
13
|
History of bitcoin
|
62,742
|
2,091
|
C
|
Low
|
14
|
Transport Layer Security
|
62,685
|
2,089
|
B
|
Top
|
15
|
HTTP Strict Transport Security
|
50,920
|
1,697
|
C
|
Low
|
16
|
$Trump
|
49,842
|
1,661
|
C
|
Low
|
17
|
RSA cryptosystem
|
48,169
|
1,605
|
C
|
Top
|
18
|
Darknet market
|
46,539
|
1,551
|
B
|
Mid
|
19
|
HTTPS
|
43,718
|
1,457
|
C
|
High
|
20
|
Enigma machine
|
42,250
|
1,408
|
C
|
High
|
21
|
Advanced Encryption Standard
|
42,123
|
1,404
|
B
|
Top
|
22
|
Dogecoin
|
41,372
|
1,379
|
C
|
Low
|
23
|
Diffie–Hellman key exchange
|
39,153
|
1,305
|
C
|
Top
|
24
|
Cryptography
|
36,912
|
1,230
|
C
|
Top
|
25
|
Virtual private network
|
36,120
|
1,204
|
C
|
Mid
|
26
|
XiaoFeng Wang (computer scientist)
|
35,825
|
1,194
|
C
|
Unknown
|
27
|
Secure Shell
|
34,444
|
1,148
|
C
|
High
|
28
|
SHA-2
|
33,875
|
1,129
|
C
|
Top
|
29
|
Changpeng Zhao
|
33,363
|
1,112
|
Start
|
Low
|
30
|
Public-key cryptography
|
28,399
|
946
|
C
|
Top
|
31
|
Caesar cipher
|
28,172
|
939
|
FA
|
High
|
32
|
Steganography
|
28,145
|
938
|
C
|
High
|
33
|
Proton Mail
|
27,668
|
922
|
C
|
Low
|
34
|
Block cipher mode of operation
|
27,366
|
912
|
C
|
Top
|
35
|
Claude Shannon
|
27,303
|
910
|
C
|
Top
|
36
|
Joan Clarke
|
25,990
|
866
|
C
|
Mid
|
37
|
Vitalik Buterin
|
25,387
|
846
|
C
|
Low
|
38
|
Vigenère cipher
|
25,234
|
841
|
B
|
Low
|
39
|
Post-quantum cryptography
|
24,615
|
820
|
C
|
High
|
40
|
Information theory
|
24,313
|
810
|
B
|
Top
|
41
|
Letter frequency
|
24,101
|
803
|
B
|
Low
|
42
|
Bletchley Park
|
23,863
|
795
|
B
|
High
|
43
|
Phone hacking
|
23,422
|
780
|
Start
|
Mid
|
44
|
Zimmermann telegram
|
22,922
|
764
|
B
|
High
|
45
|
Knapsack problem
|
22,765
|
758
|
C
|
Mid
|
46
|
MD5
|
22,449
|
748
|
C
|
Top
|
47
|
Man-in-the-middle attack
|
21,702
|
723
|
C
|
Mid
|
48
|
Pretty Good Privacy
|
20,344
|
678
|
B
|
High
|
49
|
Grover's algorithm
|
20,268
|
675
|
C
|
Mid
|
50
|
NordVPN
|
20,022
|
667
|
C
|
Mid
|
51
|
HMAC
|
19,963
|
665
|
C
|
High
|
52
|
Merkle tree
|
19,326
|
644
|
C
|
Mid
|
53
|
Digital signature
|
19,112
|
637
|
C
|
Top
|
54
|
Elliptic-curve cryptography
|
18,657
|
621
|
C
|
High
|
55
|
Digital renminbi
|
18,474
|
615
|
B
|
High
|
56
|
GCHQ
|
18,209
|
606
|
B
|
Low
|
57
|
Cryptographic hash function
|
18,066
|
602
|
C
|
Top
|
58
|
SHA-1
|
17,809
|
593
|
C
|
Top
|
59
|
Zero-knowledge proof
|
17,022
|
567
|
C
|
Top
|
60
|
Sator Square
|
16,712
|
557
|
B
|
Low
|
61
|
.onion
|
16,178
|
539
|
C
|
Low
|
62
|
Cipher
|
15,855
|
528
|
C
|
Top
|
63
|
ROT13
|
15,832
|
527
|
C
|
Mid
|
64
|
Trusted Platform Module
|
15,814
|
527
|
C
|
Mid
|
65
|
Encryption
|
15,242
|
508
|
C
|
Top
|
66
|
Kerberos (protocol)
|
15,226
|
507
|
C
|
High
|
67
|
One-time pad
|
15,208
|
506
|
C
|
Top
|
68
|
Rainbow table
|
14,960
|
498
|
C
|
High
|
69
|
Automatic Certificate Management Environment
|
14,957
|
498
|
Start
|
Low
|
70
|
Password
|
14,879
|
495
|
C
|
Top
|
71
|
Wi-Fi Protected Access
|
14,664
|
488
|
C
|
Mid
|
72
|
Certificate authority
|
14,647
|
488
|
C
|
High
|
73
|
Digital rights management
|
14,330
|
477
|
C
|
High
|
74
|
Active Directory
|
14,271
|
475
|
C
|
Low
|
75
|
Kryptos
|
13,781
|
459
|
C
|
Low
|
76
|
Information security
|
13,594
|
453
|
B
|
Top
|
77
|
Code talker
|
13,339
|
444
|
B
|
Low
|
78
|
NSAKEY
|
13,120
|
437
|
C
|
High
|
79
|
Public key certificate
|
13,092
|
436
|
C
|
Top
|
80
|
One-time password
|
13,036
|
434
|
B
|
Mid
|
81
|
Cryptanalysis of the Enigma
|
12,779
|
425
|
C
|
Mid
|
82
|
Keychain (software)
|
12,660
|
422
|
Start
|
Unknown
|
83
|
Bcrypt
|
12,185
|
406
|
C
|
Mid
|
84
|
Mersenne Twister
|
11,863
|
395
|
C
|
Low
|
85
|
Tails (operating system)
|
11,646
|
388
|
Start
|
Low
|
86
|
OpenVPN
|
11,470
|
382
|
C
|
Mid
|
87
|
Galois/Counter Mode
|
11,418
|
380
|
C
|
Mid
|
88
|
Public key infrastructure
|
11,412
|
380
|
C
|
Top
|
89
|
OpenSSL
|
11,208
|
373
|
B
|
High
|
90
|
Hashcash
|
11,193
|
373
|
Start
|
Unknown
|
91
|
SHA-3
|
10,861
|
362
|
Start
|
Mid
|
92
|
Mullvad
|
10,827
|
360
|
Start
|
Low
|
93
|
Bombe
|
10,704
|
356
|
B
|
Mid
|
94
|
Bitwarden
|
10,593
|
353
|
C
|
Low
|
95
|
Elliptic Curve Digital Signature Algorithm
|
10,524
|
350
|
C
|
High
|
96
|
Integer factorization
|
10,509
|
350
|
B
|
Mid
|
97
|
IMSI-catcher
|
10,430
|
347
|
Start
|
Mid
|
98
|
Secure Hash Algorithms
|
10,306
|
343
|
Start
|
High
|
99
|
Salt (cryptography)
|
10,278
|
342
|
Start
|
High
|
100
|
VeraCrypt
|
10,255
|
341
|
C
|
Mid
|
101
|
Homomorphic encryption
|
10,211
|
340
|
C
|
High
|
102
|
Ultra (cryptography)
|
10,059
|
335
|
C
|
High
|
103
|
Substitution cipher
|
10,009
|
333
|
Unknown
|
Unknown
|
104
|
Alice and Bob
|
9,937
|
331
|
Start
|
High
|
105
|
Data Encryption Standard
|
9,772
|
325
|
C
|
Top
|
106
|
Pay television
|
9,711
|
323
|
Start
|
Unknown
|
107
|
Shiba Inu (cryptocurrency)
|
9,701
|
323
|
Start
|
Low
|
108
|
Shamir's secret sharing
|
9,557
|
318
|
C
|
High
|
109
|
Cryptonomicon
|
9,554
|
318
|
C
|
Low
|
110
|
SSH File Transfer Protocol
|
9,490
|
316
|
C
|
Low
|
111
|
Cryptographic nonce
|
9,446
|
314
|
Start
|
High
|
112
|
Proof of stake
|
9,385
|
312
|
C
|
Low
|
113
|
Colossus computer
|
9,339
|
311
|
B
|
Mid
|
114
|
Adam Back
|
9,328
|
310
|
C
|
Low
|
115
|
Matrix (protocol)
|
9,284
|
309
|
Start
|
Unknown
|
116
|
Forward secrecy
|
9,103
|
303
|
C
|
High
|
117
|
Brute-force attack
|
8,966
|
298
|
C
|
High
|
118
|
Decentralized finance
|
8,855
|
295
|
Start
|
Low
|
119
|
Fort Meade
|
8,812
|
293
|
C
|
Low
|
120
|
Symmetric-key algorithm
|
8,782
|
292
|
Start
|
Top
|
121
|
ChaCha20-Poly1305
|
8,751
|
291
|
C
|
Low
|
122
|
Vault 7
|
8,733
|
291
|
C
|
Mid
|
123
|
Password manager
|
8,713
|
290
|
C
|
Low
|
124
|
Authentication
|
8,663
|
288
|
C
|
High
|
125
|
I2P
|
8,486
|
282
|
B
|
Low
|
126
|
InterPlanetary File System
|
8,449
|
281
|
C
|
Low
|
127
|
Authenticated encryption
|
8,418
|
280
|
C
|
Mid
|
128
|
PBKDF2
|
8,412
|
280
|
C
|
Low
|
129
|
Theoretical computer science
|
8,357
|
278
|
B
|
Low
|
130
|
EdDSA
|
8,260
|
275
|
C
|
High
|
131
|
Quantum key distribution
|
8,240
|
274
|
B
|
Mid
|
132
|
Link 16
|
8,215
|
273
|
Start
|
Low
|
133
|
Playfair cipher
|
8,207
|
273
|
Unknown
|
Unknown
|
134
|
Elliptic-curve Diffie–Hellman
|
8,121
|
270
|
Start
|
Mid
|
135
|
Comparison of BitTorrent clients
|
8,080
|
269
|
List
|
Low
|
136
|
Curve25519
|
8,056
|
268
|
C
|
High
|
137
|
Cryptanalysis
|
8,055
|
268
|
C
|
High
|
138
|
Signal Protocol
|
7,900
|
263
|
C
|
High
|
139
|
Beale ciphers
|
7,837
|
261
|
B
|
Low
|
140
|
Message authentication code
|
7,616
|
253
|
C
|
Top
|
141
|
Argon2
|
7,501
|
250
|
C
|
Mid
|
142
|
Babington Plot
|
7,448
|
248
|
C
|
Low
|
143
|
Differential privacy
|
7,250
|
241
|
C
|
Mid
|
144
|
Discrete logarithm
|
7,049
|
234
|
C
|
Mid
|
145
|
KeePass
|
6,941
|
231
|
C
|
Low
|
146
|
Lavarand
|
6,795
|
226
|
Start
|
Mid
|
147
|
Bitcoin Cash
|
6,694
|
223
|
Start
|
Low
|
148
|
Apple–FBI encryption dispute
|
6,692
|
223
|
C
|
Low
|
149
|
Password cracking
|
6,599
|
219
|
C
|
Mid
|
150
|
Qubes OS
|
6,560
|
218
|
C
|
Mid
|
151
|
Cypherpunk
|
6,394
|
213
|
C
|
Mid
|
152
|
The Tor Project
|
6,349
|
211
|
C
|
Mid
|
153
|
Litecoin
|
6,256
|
208
|
Start
|
Low
|
154
|
Threema
|
6,247
|
208
|
C
|
Unknown
|
155
|
Certificate signing request
|
6,218
|
207
|
C
|
Low
|
156
|
Birthday attack
|
6,123
|
204
|
C
|
High
|
157
|
Illegal number
|
6,073
|
202
|
C
|
Low
|
158
|
Quantum cryptography
|
6,059
|
201
|
C
|
High
|
159
|
Self-signed certificate
|
6,048
|
201
|
Start
|
Unknown
|
160
|
Hyphanet
|
5,978
|
199
|
B
|
Mid
|
161
|
Side-channel attack
|
5,931
|
197
|
C
|
High
|
162
|
11B-X-1371
|
5,900
|
196
|
GA
|
Low
|
163
|
Units of information
|
5,804
|
193
|
C
|
Unknown
|
164
|
GNU Privacy Guard
|
5,786
|
192
|
C
|
Unknown
|
165
|
Lorenz cipher
|
5,732
|
191
|
C
|
Top
|
166
|
Key derivation function
|
5,717
|
190
|
C
|
Low
|
167
|
XOR cipher
|
5,701
|
190
|
Stub
|
Mid
|
168
|
ElGamal encryption
|
5,668
|
188
|
Start
|
Top
|
169
|
Padding oracle attack
|
5,656
|
188
|
Start
|
Low
|
170
|
RC4
|
5,643
|
188
|
B
|
Top
|
171
|
Conel Hugh O'Donel Alexander
|
5,486
|
182
|
Start
|
Low
|
172
|
Lattice-based cryptography
|
5,463
|
182
|
Start
|
Low
|
173
|
KeePassXC
|
5,453
|
181
|
Start
|
Low
|
174
|
Ricky McCormick's encrypted notes
|
5,432
|
181
|
B
|
Low
|
175
|
Salsa20
|
5,424
|
180
|
C
|
Top
|
176
|
Padding (cryptography)
|
5,413
|
180
|
Start
|
Unknown
|
177
|
Session (software)
|
5,379
|
179
|
Start
|
Low
|
178
|
Polkadot (blockchain platform)
|
5,263
|
175
|
Start
|
Low
|
179
|
Cryptographically secure pseudorandom number generator
|
5,261
|
175
|
C
|
Top
|
180
|
PKCS 12
|
5,258
|
175
|
Start
|
Low
|
181
|
RSA Security
|
5,234
|
174
|
C
|
Unknown
|
182
|
Harvest now, decrypt later
|
5,192
|
173
|
Start
|
Low
|
183
|
Triple DES
|
5,181
|
172
|
Start
|
Unknown
|
184
|
Digital Signature Algorithm
|
5,152
|
171
|
C
|
Top
|
185
|
Cipher suite
|
5,141
|
171
|
C
|
Top
|
186
|
Transposition cipher
|
5,129
|
170
|
Unknown
|
Unknown
|
187
|
OpenSSH
|
5,109
|
170
|
C
|
High
|
188
|
BLAKE (hash function)
|
5,099
|
169
|
C
|
Mid
|
189
|
3-D Secure
|
5,058
|
168
|
Start
|
Low
|
190
|
Kerckhoffs's principle
|
5,031
|
167
|
Start
|
Mid
|
191
|
Password strength
|
5,018
|
167
|
C
|
High
|
192
|
FIPS 140-2
|
4,999
|
166
|
C
|
Mid
|
193
|
Block cipher
|
4,988
|
166
|
C
|
Top
|
194
|
Mutual authentication
|
4,988
|
166
|
Stub
|
Low
|
195
|
NIST SP 800-90A
|
4,977
|
165
|
C
|
Mid
|
196
|
Adi Shamir
|
4,954
|
165
|
C
|
Unknown
|
197
|
Len Sassaman
|
4,905
|
163
|
Start
|
Unknown
|
198
|
Citizenfour
|
4,853
|
161
|
C
|
Low
|
199
|
Bitconnect
|
4,809
|
160
|
C
|
Low
|
200
|
Utah Data Center
|
4,805
|
160
|
C
|
Mid
|
201
|
Root certificate
|
4,800
|
160
|
Start
|
Low
|
202
|
Digest access authentication
|
4,795
|
159
|
B
|
Low
|
203
|
Tap code
|
4,732
|
157
|
Start
|
Low
|
204
|
Cryptogram
|
4,725
|
157
|
C
|
Mid
|
205
|
DNS Certification Authority Authorization
|
4,680
|
156
|
GA
|
Low
|
206
|
Rijndael S-box
|
4,642
|
154
|
Start
|
Low
|
207
|
Replay attack
|
4,630
|
154
|
C
|
Top
|
208
|
Datagram Transport Layer Security
|
4,621
|
154
|
C
|
Mid
|
209
|
Secure multi-party computation
|
4,539
|
151
|
Start
|
High
|
210
|
Stream cipher
|
4,468
|
148
|
Start
|
Top
|
211
|
Blowfish (cipher)
|
4,465
|
148
|
B
|
High
|
212
|
Polybius square
|
4,334
|
144
|
Start
|
Mid
|
213
|
Deniable encryption
|
4,181
|
139
|
Start
|
High
|
214
|
Confidentiality
|
4,158
|
138
|
C
|
Low
|
215
|
Marian Rejewski
|
4,148
|
138
|
FA
|
Mid
|
216
|
Avalanche effect
|
4,068
|
135
|
Start
|
High
|
217
|
Commitment scheme
|
4,066
|
135
|
C
|
High
|
218
|
Bacon's cipher
|
4,064
|
135
|
Start
|
Low
|
219
|
Privacy-Enhanced Mail
|
4,037
|
134
|
Start
|
Low
|
220
|
Key (cryptography)
|
4,024
|
134
|
Start
|
Unknown
|
221
|
Boolean function
|
3,973
|
132
|
Start
|
Mid
|
222
|
Feistel cipher
|
3,924
|
130
|
Start
|
Unknown
|
223
|
Wired Equivalent Privacy
|
3,919
|
130
|
C
|
Mid
|
224
|
Bruce Schneier
|
3,869
|
128
|
Start
|
High
|
225
|
History of cryptography
|
3,852
|
128
|
Start
|
High
|
226
|
Richard Teng
|
3,841
|
128
|
Start
|
Low
|
227
|
Fork (blockchain)
|
3,774
|
125
|
Start
|
Mid
|
228
|
Diplomatic bag
|
3,769
|
125
|
Start
|
Low
|
229
|
Shugborough inscription
|
3,769
|
125
|
Start
|
Low
|
230
|
PKCS
|
3,736
|
124
|
List
|
High
|
231
|
Known-plaintext attack
|
3,734
|
124
|
Start
|
High
|
232
|
Certificate revocation list
|
3,706
|
123
|
C
|
Low
|
233
|
TrueCrypt
|
3,700
|
123
|
C
|
Mid
|
234
|
Export of cryptography from the United States
|
3,660
|
122
|
C
|
Unknown
|
235
|
Initialization vector
|
3,651
|
121
|
C
|
High
|
236
|
Web of trust
|
3,649
|
121
|
C
|
High
|
237
|
The Doughnut
|
3,640
|
121
|
GA
|
High
|
238
|
AES instruction set
|
3,630
|
121
|
C
|
Low
|
239
|
Dual EC DRBG
|
3,577
|
119
|
C
|
High
|
240
|
NIST Post-Quantum Cryptography Standardization
|
3,571
|
119
|
C
|
Mid
|
241
|
Cold boot attack
|
3,564
|
118
|
C
|
Low
|
242
|
List of ciphertexts
|
3,552
|
118
|
List
|
Low
|
243
|
Certificate Transparency
|
3,537
|
117
|
C
|
High
|
244
|
Plaintext
|
3,510
|
117
|
Start
|
High
|
245
|
Key exchange
|
3,495
|
116
|
Start
|
Unknown
|
246
|
Rail fence cipher
|
3,464
|
115
|
Start
|
Low
|
247
|
SipHash
|
3,437
|
114
|
Start
|
Low
|
248
|
Electronic signature
|
3,432
|
114
|
C
|
Low
|
249
|
Frequency analysis
|
3,431
|
114
|
C
|
High
|
250
|
Elizebeth Smith Friedman
|
3,431
|
114
|
C
|
Mid
|
251
|
Book cipher
|
3,429
|
114
|
C
|
Low
|
252
|
PKCS 11
|
3,418
|
113
|
Unknown
|
Unknown
|
253
|
Length extension attack
|
3,417
|
113
|
Start
|
Unknown
|
254
|
Dilly Knox
|
3,416
|
113
|
B
|
Unknown
|
255
|
Daniel J. Bernstein
|
3,407
|
113
|
C
|
Mid
|
256
|
Ciphertext
|
3,307
|
110
|
Start
|
High
|
257
|
BB84
|
3,306
|
110
|
Start
|
Low
|
258
|
Atbash
|
3,266
|
108
|
Stub
|
Low
|
259
|
Elliptic curve point multiplication
|
3,260
|
108
|
C
|
Mid
|
260
|
Quantum network
|
3,237
|
107
|
C
|
Low
|
261
|
One-way function
|
3,235
|
107
|
Start
|
Top
|
262
|
Hill cipher
|
3,223
|
107
|
Unknown
|
Unknown
|
263
|
W. T. Tutte
|
3,207
|
106
|
C
|
Mid
|
264
|
Timing attack
|
3,192
|
106
|
C
|
High
|
265
|
Communications Security Establishment
|
3,179
|
105
|
C
|
Mid
|
266
|
RSA SecurID
|
3,174
|
105
|
C
|
Low
|
267
|
Crypto-anarchy
|
3,171
|
105
|
Start
|
High
|
268
|
Challenge–response authentication
|
3,156
|
105
|
Start
|
Mid
|
269
|
Cryptocurrency tumbler
|
3,154
|
105
|
Start
|
Unknown
|
270
|
Double Ratchet Algorithm
|
3,112
|
103
|
Start
|
Low
|
271
|
Type B Cipher Machine
|
3,103
|
103
|
Start
|
Low
|
272
|
Whonix
|
3,070
|
102
|
Start
|
Mid
|
273
|
Whitfield Diffie
|
3,069
|
102
|
B
|
High
|
274
|
David Chaum
|
3,064
|
102
|
C
|
Low
|
275
|
Australian Signals Directorate
|
3,062
|
102
|
C
|
Low
|
276
|
Peter Todd (programmer)
|
3,061
|
102
|
Start
|
Unknown
|
277
|
Algorand
|
3,051
|
101
|
B
|
Low
|
278
|
Copiale cipher
|
3,018
|
100
|
Start
|
Low
|
279
|
AES key schedule
|
3,011
|
100
|
Start
|
Low
|
280
|
Blockchain game
|
2,984
|
99
|
Start
|
Low
|
281
|
Bomba (cryptography)
|
2,977
|
99
|
Start
|
Low
|
282
|
Merkle–Damgård construction
|
2,966
|
98
|
C
|
Unknown
|
283
|
PKCS 7
|
2,944
|
98
|
Start
|
Low
|
284
|
Key size
|
2,936
|
97
|
C
|
High
|
285
|
K-anonymity
|
2,930
|
97
|
Start
|
Mid
|
286
|
PKCS 1
|
2,861
|
95
|
C
|
Mid
|
287
|
Collision attack
|
2,851
|
95
|
Start
|
High
|
288
|
Polyalphabetic cipher
|
2,831
|
94
|
Start
|
Unknown
|
289
|
Disk encryption theory
|
2,824
|
94
|
C
|
Unknown
|
290
|
Jami (software)
|
2,807
|
93
|
Start
|
Unknown
|
291
|
Keygen
|
2,793
|
93
|
C
|
Low
|
292
|
Mumble (software)
|
2,780
|
92
|
C
|
Unknown
|
293
|
Directory service
|
2,775
|
92
|
Start
|
Mid
|
294
|
Non-repudiation
|
2,771
|
92
|
Start
|
Mid
|
295
|
Supply chain attack
|
2,731
|
91
|
C
|
Low
|
296
|
Crypto AG
|
2,707
|
90
|
C
|
High
|
297
|
Zcash
|
2,687
|
89
|
Start
|
Low
|
298
|
RSA Factoring Challenge
|
2,686
|
89
|
Start
|
Low
|
299
|
Digital watermarking
|
2,670
|
89
|
B
|
Mid
|
300
|
Trusted timestamping
|
2,668
|
88
|
Start
|
Unknown
|
301
|
Key encapsulation mechanism
|
2,644
|
88
|
Start
|
High
|
302
|
Magic (cryptography)
|
2,627
|
87
|
Start
|
Unknown
|
303
|
HKDF
|
2,625
|
87
|
Start
|
Unknown
|
304
|
S-box
|
2,613
|
87
|
Start
|
Top
|
305
|
Proton Drive
|
2,599
|
86
|
Start
|
Low
|
306
|
DNS-based Authentication of Named Entities
|
2,589
|
86
|
C
|
Mid
|
307
|
Optimal asymmetric encryption padding
|
2,584
|
86
|
Start
|
High
|
308
|
Preimage attack
|
2,512
|
83
|
Stub
|
Unknown
|
309
|
Bitcoin scalability problem
|
2,511
|
83
|
C
|
Low
|
310
|
Bitcoin Core
|
2,507
|
83
|
Start
|
Low
|
311
|
I. J. Good
|
2,502
|
83
|
C
|
Low
|
312
|
Code signing
|
2,479
|
82
|
C
|
Low
|
313
|
Dictionary attack
|
2,454
|
81
|
C
|
Unknown
|
314
|
List of bitcoin forks
|
2,453
|
81
|
List
|
Low
|
315
|
Affine cipher
|
2,422
|
80
|
C
|
Low
|
316
|
Special Collection Service
|
2,414
|
80
|
C
|
Low
|
317
|
Key disclosure law
|
2,405
|
80
|
C
|
Low
|
318
|
Disk encryption
|
2,397
|
79
|
C
|
High
|
319
|
FIPS 140
|
2,378
|
79
|
Start
|
Mid
|
320
|
Gordon Welchman
|
2,365
|
78
|
C
|
Low
|
321
|
Alastair Denniston
|
2,341
|
78
|
Start
|
Unknown
|
322
|
Clipper chip
|
2,340
|
78
|
C
|
High
|
323
|
Baby-step giant-step
|
2,321
|
77
|
C
|
Unknown
|
324
|
Schnorr signature
|
2,320
|
77
|
C
|
High
|
325
|
PKCS 8
|
2,281
|
76
|
Stub
|
Unknown
|
326
|
Nothing-up-my-sleeve number
|
2,273
|
75
|
C
|
Low
|
327
|
Non-interactive zero-knowledge proof
|
2,269
|
75
|
Start
|
Low
|
328
|
Scrambler
|
2,258
|
75
|
C
|
Unknown
|
329
|
Reception and criticism of WhatsApp security and privacy features
|
2,257
|
75
|
C
|
Low
|
330
|
William F. Friedman
|
2,242
|
74
|
C
|
Unknown
|
331
|
FIPS 140-3
|
2,236
|
74
|
C
|
Low
|
332
|
Twofish
|
2,233
|
74
|
Start
|
High
|
333
|
Bitcoin Gold
|
2,228
|
74
|
Start
|
Low
|
334
|
Hash chain
|
2,225
|
74
|
Start
|
Unknown
|
335
|
BLS digital signature
|
2,221
|
74
|
Start
|
Mid
|
336
|
Comparison of disk encryption software
|
2,214
|
73
|
List
|
High
|
337
|
Comparison of SSH clients
|
2,212
|
73
|
List
|
Low
|
338
|
Leo Marks
|
2,207
|
73
|
B
|
Unknown
|
339
|
Pepper (cryptography)
|
2,198
|
73
|
Start
|
Low
|
340
|
Briar (software)
|
2,186
|
72
|
Start
|
Low
|
341
|
Physical unclonable function
|
2,184
|
72
|
Start
|
Unknown
|
342
|
Off-the-record messaging
|
2,172
|
72
|
Start
|
Unknown
|
343
|
Musical cryptogram
|
2,167
|
72
|
C
|
Low
|
344
|
Cryptographic protocol
|
2,146
|
71
|
Start
|
High
|
345
|
William Binney (intelligence official)
|
2,146
|
71
|
C
|
Mid
|
346
|
Secret sharing
|
2,139
|
71
|
C
|
High
|
347
|
Ralph Merkle
|
2,115
|
70
|
C
|
High
|
348
|
Classical cipher
|
2,115
|
70
|
Start
|
Top
|
349
|
Tox (protocol)
|
2,114
|
70
|
C
|
Low
|
350
|
Phil Zimmermann
|
2,112
|
70
|
Start
|
Mid
|
351
|
Filecoin
|
2,111
|
70
|
Start
|
Low
|
352
|
Paillier cryptosystem
|
2,107
|
70
|
Start
|
High
|
353
|
IEEE 802.11i-2004
|
2,096
|
69
|
C
|
Mid
|
354
|
Pre-shared key
|
2,060
|
68
|
Start
|
Mid
|
355
|
Martin Hellman
|
2,055
|
68
|
Start
|
High
|
356
|
HTTP Public Key Pinning
|
2,043
|
68
|
C
|
Mid
|
357
|
Ciphertext indistinguishability
|
2,040
|
68
|
C
|
High
|
358
|
Authenticator
|
2,039
|
67
|
B
|
Low
|
359
|
PGP word list
|
2,036
|
67
|
Start
|
Low
|
360
|
Entrust
|
2,025
|
67
|
Start
|
Low
|
361
|
McEliece cryptosystem
|
1,995
|
66
|
C
|
High
|
362
|
Lenstra elliptic-curve factorization
|
1,984
|
66
|
C
|
Low
|
363
|
Stuart Haber
|
1,983
|
66
|
Start
|
Unknown
|
364
|
Opportunistic TLS
|
1,982
|
66
|
Start
|
Mid
|
365
|
Communications security
|
1,958
|
65
|
Start
|
Mid
|
366
|
Trusted Computing
|
1,949
|
64
|
C
|
Mid
|
367
|
Bouncy Castle (cryptography)
|
1,945
|
64
|
Start
|
Unknown
|
368
|
BTCC (company)
|
1,927
|
64
|
Start
|
Low
|
369
|
CCM mode
|
1,916
|
63
|
Start
|
High
|
370
|
Dm-crypt
|
1,913
|
63
|
Start
|
Low
|
371
|
Trapdoor function
|
1,908
|
63
|
Start
|
High
|
372
|
Open Whisper Systems
|
1,908
|
63
|
B
|
Unknown
|
373
|
Data at rest
|
1,884
|
62
|
C
|
Mid
|
374
|
Data anonymization
|
1,878
|
62
|
Start
|
Mid
|
375
|
Skipjack (cipher)
|
1,851
|
61
|
Start
|
High
|
376
|
BusKill
|
1,848
|
61
|
Start
|
Low
|
377
|
Cryptographic primitive
|
1,846
|
61
|
Start
|
Top
|
378
|
Comparison of cryptography libraries
|
1,806
|
60
|
List
|
Unknown
|
379
|
Bullrun (decryption program)
|
1,803
|
60
|
B
|
Low
|
380
|
Proof of authority
|
1,803
|
60
|
Start
|
Low
|
381
|
Berlekamp–Massey algorithm
|
1,798
|
59
|
Start
|
Unknown
|
382
|
ADFGVX cipher
|
1,781
|
59
|
Unknown
|
Unknown
|
383
|
Security level
|
1,779
|
59
|
Stub
|
Mid
|
384
|
Coppersmith's attack
|
1,776
|
59
|
B
|
High
|
385
|
Chosen-plaintext attack
|
1,769
|
58
|
Stub
|
Unknown
|
386
|
Comparison of TLS implementations
|
1,766
|
58
|
List
|
High
|
387
|
Autokey cipher
|
1,751
|
58
|
C
|
Mid
|
388
|
Crypto Wars
|
1,746
|
58
|
Start
|
High
|
389
|
Blind signature
|
1,744
|
58
|
C
|
Mid
|
390
|
Confusion and diffusion
|
1,741
|
58
|
Start
|
Mid
|
391
|
Taher Elgamal
|
1,735
|
57
|
C
|
Unknown
|
392
|
Poly1305
|
1,715
|
57
|
Start
|
Top
|
393
|
Anonymous P2P
|
1,701
|
56
|
C
|
Low
|
394
|
Charlie Lee (computer scientist)
|
1,701
|
56
|
Start
|
Low
|
395
|
W. Scott Stornetta
|
1,695
|
56
|
Start
|
Unknown
|
396
|
Rijndael MixColumns
|
1,689
|
56
|
Start
|
Low
|
397
|
Dorabella Cipher
|
1,688
|
56
|
Unknown
|
Unknown
|
398
|
Tabula recta
|
1,683
|
56
|
Unknown
|
Unknown
|
399
|
Blum Blum Shub
|
1,677
|
55
|
C
|
High
|
400
|
Clock drift
|
1,666
|
55
|
C
|
Low
|
401
|
Key stretching
|
1,658
|
55
|
Start
|
Unknown
|
402
|
Cryptanalysis of the Lorenz cipher
|
1,658
|
55
|
C
|
High
|
403
|
Crypt (C)
|
1,647
|
54
|
C
|
High
|
404
|
UltraViolet (website)
|
1,640
|
54
|
C
|
Low
|
405
|
CBC-MAC
|
1,638
|
54
|
C
|
High
|
406
|
Encryption software
|
1,632
|
54
|
Start
|
Top
|
407
|
Differential cryptanalysis
|
1,628
|
54
|
B
|
High
|
408
|
Arthur Scherbius
|
1,612
|
53
|
Start
|
Mid
|
409
|
Nyctography
|
1,607
|
53
|
Unknown
|
Unknown
|
410
|
Banburismus
|
1,605
|
53
|
C
|
Low
|
411
|
Enigma rotor details
|
1,604
|
53
|
Start
|
Mid
|
412
|
Public key fingerprint
|
1,596
|
53
|
Start
|
Mid
|
413
|
Coinye
|
1,595
|
53
|
Start
|
Low
|
414
|
WebTorrent
|
1,593
|
53
|
Start
|
Unknown
|
415
|
Encrypting File System
|
1,589
|
52
|
B
|
Unknown
|
416
|
SegWit
|
1,586
|
52
|
Start
|
Low
|
417
|
Tiny Encryption Algorithm
|
1,581
|
52
|
Unknown
|
Unknown
|
418
|
LibreSSL
|
1,581
|
52
|
C
|
High
|
419
|
Tor2web
|
1,564
|
52
|
Start
|
Low
|
420
|
Government Communications Security Bureau
|
1,561
|
52
|
B
|
Low
|
421
|
FreeOTP
|
1,554
|
51
|
Start
|
Low
|
422
|
Meet-in-the-middle attack
|
1,539
|
51
|
C
|
High
|
423
|
ZeroNet
|
1,531
|
51
|
Start
|
Low
|
424
|
Information-theoretic security
|
1,527
|
50
|
Start
|
Top
|
425
|
Null cipher
|
1,510
|
50
|
Stub
|
Low
|
426
|
Diehard tests
|
1,509
|
50
|
C
|
Low
|
427
|
Station HYPO
|
1,502
|
50
|
Start
|
Low
|
428
|
Comparison of cryptographic hash functions
|
1,499
|
49
|
List
|
Low
|
429
|
One-key MAC
|
1,496
|
49
|
Start
|
Low
|
430
|
Roger Dingledine
|
1,482
|
49
|
Start
|
Unknown
|
431
|
Jefferson disk
|
1,475
|
49
|
Start
|
Unknown
|
432
|
Secret decoder ring
|
1,474
|
49
|
Start
|
Low
|
433
|
Wiener's attack
|
1,459
|
48
|
B
|
High
|
434
|
Random oracle
|
1,458
|
48
|
Start
|
Low
|
435
|
Electronic Signatures in Global and National Commerce Act
|
1,457
|
48
|
Stub
|
Unknown
|
436
|
SYN cookies
|
1,457
|
48
|
Start
|
Unknown
|
437
|
Advanced Access Content System
|
1,454
|
48
|
C
|
Mid
|
438
|
Key server (cryptographic)
|
1,448
|
48
|
Start
|
Mid
|
439
|
SIGSALY
|
1,446
|
48
|
C
|
Low
|
440
|
Content Scramble System
|
1,436
|
47
|
Start
|
Mid
|
441
|
DES supplementary material
|
1,435
|
47
|
C
|
Low
|
442
|
Content Authenticity Initiative
|
1,434
|
47
|
C
|
Low
|
443
|
DeCSS
|
1,432
|
47
|
C
|
Mid
|
444
|
Generic Security Services Application Programming Interface
|
1,429
|
47
|
Start
|
Low
|
445
|
Michael O. Rabin
|
1,428
|
47
|
C
|
Low
|
446
|
Interactive proof system
|
1,425
|
47
|
Start
|
High
|
447
|
National Cryptologic Museum
|
1,420
|
47
|
C
|
Mid
|
448
|
Black Chamber
|
1,415
|
47
|
Unknown
|
Unknown
|
449
|
NTRUEncrypt
|
1,414
|
47
|
C
|
Mid
|
450
|
Pseudorandom function family
|
1,404
|
46
|
Start
|
Low
|
451
|
Serpent (cipher)
|
1,401
|
46
|
C
|
Low
|
452
|
MD4
|
1,398
|
46
|
Start
|
Low
|
453
|
Orbot
|
1,396
|
46
|
Stub
|
Low
|
454
|
Hybrid cryptosystem
|
1,391
|
46
|
Start
|
High
|
455
|
Mix network
|
1,388
|
46
|
C
|
Low
|
456
|
NTRU
|
1,384
|
46
|
C
|
Low
|
457
|
FileVault
|
1,383
|
46
|
C
|
Mid
|
458
|
Codebook
|
1,381
|
46
|
Stub
|
Unknown
|
459
|
Supersingular isogeny key exchange
|
1,380
|
46
|
Start
|
Low
|
460
|
Great Cipher
|
1,374
|
45
|
Start
|
Mid
|
461
|
Visual cryptography
|
1,369
|
45
|
Unknown
|
Unknown
|
462
|
Solitaire (cipher)
|
1,367
|
45
|
Unknown
|
Unknown
|
463
|
Four-square cipher
|
1,364
|
45
|
C
|
Unknown
|
464
|
Red/black concept
|
1,362
|
45
|
Stub
|
Unknown
|
465
|
Simultaneous Authentication of Equals
|
1,358
|
45
|
Start
|
High
|
466
|
Sponge function
|
1,356
|
45
|
Unknown
|
Unknown
|
467
|
David Wheeler (computer scientist)
|
1,350
|
45
|
C
|
Low
|
468
|
Advanced Encryption Standard process
|
1,345
|
44
|
C
|
Mid
|
469
|
Cryptographic Message Syntax
|
1,342
|
44
|
Stub
|
Mid
|
470
|
Oblivious transfer
|
1,340
|
44
|
Start
|
Unknown
|
471
|
SecureDrop
|
1,340
|
44
|
Start
|
Mid
|
472
|
Wildcard certificate
|
1,337
|
44
|
Redirect
|
NA
|
473
|
Cryptome
|
1,328
|
44
|
C
|
Low
|
474
|
AES implementations
|
1,328
|
44
|
List
|
Low
|
475
|
Challenge-Handshake Authentication Protocol
|
1,322
|
44
|
Start
|
Low
|
476
|
Kasiski examination
|
1,319
|
43
|
Unknown
|
Unknown
|
477
|
Format-preserving encryption
|
1,313
|
43
|
Start
|
High
|
478
|
Key management
|
1,308
|
43
|
Unknown
|
Unknown
|
479
|
SIGABA
|
1,301
|
43
|
C
|
High
|
480
|
Conditional-access module
|
1,300
|
43
|
Start
|
Low
|
481
|
ElGamal signature scheme
|
1,298
|
43
|
Start
|
Top
|
482
|
Key signing party
|
1,297
|
43
|
Stub
|
Low
|
483
|
Max Newman
|
1,296
|
43
|
B
|
Low
|
484
|
Secure cryptoprocessor
|
1,292
|
43
|
C
|
Mid
|
485
|
Code (cryptography)
|
1,292
|
43
|
Start
|
Top
|
486
|
Word square
|
1,292
|
43
|
C
|
Low
|
487
|
Yescrypt
|
1,292
|
43
|
Stub
|
Low
|
488
|
List of things named after Alan Turing
|
1,290
|
43
|
List
|
Low
|
489
|
Perfect Dark (P2P)
|
1,287
|
42
|
C
|
Low
|
490
|
Integrated Encryption Scheme
|
1,285
|
42
|
Start
|
Low
|
491
|
Keybase
|
1,284
|
42
|
Start
|
Low
|
492
|
Hash-based cryptography
|
1,282
|
42
|
Start
|
Low
|
493
|
Whirlpool (hash function)
|
1,278
|
42
|
Start
|
Low
|
494
|
Frank Terpil
|
1,271
|
42
|
Start
|
Low
|
495
|
Collision resistance
|
1,270
|
42
|
Start
|
High
|
496
|
Cryptomator
|
1,267
|
42
|
C
|
Unknown
|
497
|
RSA problem
|
1,258
|
41
|
Start
|
Top
|
498
|
GNUnet
|
1,255
|
41
|
B
|
Low
|
499
|
List of cryptographers
|
1,253
|
41
|
List
|
Low
|
500
|
Needham–Schroeder protocol
|
1,248
|
41
|
Start
|
Mid
|