Jump to content

Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2025-04-01 to 2025-04-30

Total views: 5,500,263

Updated: 14:31, 6 May 2025 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 505,808 16,860 B High
2 Telegram (software) 253,892 8,463 B Mid
3 Alan Turing 217,350 7,245 GA Top
4 Bitcoin 160,578 5,352 B High
5 Voynich manuscript 95,683 3,189 B Low
6 Cryptocurrency 84,017 2,800 C High
7 Signal (software) 83,476 2,782 C Mid
8 The Imitation Game 82,226 2,740 C Mid
9 Tor (network) 76,518 2,550 B Mid
10 WikiLeaks 68,734 2,291 B Low
11 Blockchain 67,383 2,246 B High
12 National Security Agency 66,835 2,227 C High
13 History of bitcoin 62,742 2,091 C Low
14 Transport Layer Security 62,685 2,089 B Top
15 HTTP Strict Transport Security 50,920 1,697 C Low
16 $Trump 49,842 1,661 C Low
17 RSA cryptosystem 48,169 1,605 C Top
18 Darknet market 46,539 1,551 B Mid
19 HTTPS 43,718 1,457 C High
20 Enigma machine 42,250 1,408 C High
21 Advanced Encryption Standard 42,123 1,404 B Top
22 Dogecoin 41,372 1,379 C Low
23 Diffie–Hellman key exchange 39,153 1,305 C Top
24 Cryptography 36,912 1,230 C Top
25 Virtual private network 36,120 1,204 C Mid
26 XiaoFeng Wang (computer scientist) 35,825 1,194 C Unknown
27 Secure Shell 34,444 1,148 C High
28 SHA-2 33,875 1,129 C Top
29 Changpeng Zhao 33,363 1,112 Start Low
30 Public-key cryptography 28,399 946 C Top
31 Caesar cipher 28,172 939 FA High
32 Steganography 28,145 938 C High
33 Proton Mail 27,668 922 C Low
34 Block cipher mode of operation 27,366 912 C Top
35 Claude Shannon 27,303 910 C Top
36 Joan Clarke 25,990 866 C Mid
37 Vitalik Buterin 25,387 846 C Low
38 Vigenère cipher 25,234 841 B Low
39 Post-quantum cryptography 24,615 820 C High
40 Information theory 24,313 810 B Top
41 Letter frequency 24,101 803 B Low
42 Bletchley Park 23,863 795 B High
43 Phone hacking 23,422 780 Start Mid
44 Zimmermann telegram 22,922 764 B High
45 Knapsack problem 22,765 758 C Mid
46 MD5 22,449 748 C Top
47 Man-in-the-middle attack 21,702 723 C Mid
48 Pretty Good Privacy 20,344 678 B High
49 Grover's algorithm 20,268 675 C Mid
50 NordVPN 20,022 667 C Mid
51 HMAC 19,963 665 C High
52 Merkle tree 19,326 644 C Mid
53 Digital signature 19,112 637 C Top
54 Elliptic-curve cryptography 18,657 621 C High
55 Digital renminbi 18,474 615 B High
56 GCHQ 18,209 606 B Low
57 Cryptographic hash function 18,066 602 C Top
58 SHA-1 17,809 593 C Top
59 Zero-knowledge proof 17,022 567 C Top
60 Sator Square 16,712 557 B Low
61 .onion 16,178 539 C Low
62 Cipher 15,855 528 C Top
63 ROT13 15,832 527 C Mid
64 Trusted Platform Module 15,814 527 C Mid
65 Encryption 15,242 508 C Top
66 Kerberos (protocol) 15,226 507 C High
67 One-time pad 15,208 506 C Top
68 Rainbow table 14,960 498 C High
69 Automatic Certificate Management Environment 14,957 498 Start Low
70 Password 14,879 495 C Top
71 Wi-Fi Protected Access 14,664 488 C Mid
72 Certificate authority 14,647 488 C High
73 Digital rights management 14,330 477 C High
74 Active Directory 14,271 475 C Low
75 Kryptos 13,781 459 C Low
76 Information security 13,594 453 B Top
77 Code talker 13,339 444 B Low
78 NSAKEY 13,120 437 C High
79 Public key certificate 13,092 436 C Top
80 One-time password 13,036 434 B Mid
81 Cryptanalysis of the Enigma 12,779 425 C Mid
82 Keychain (software) 12,660 422 Start Unknown
83 Bcrypt 12,185 406 C Mid
84 Mersenne Twister 11,863 395 C Low
85 Tails (operating system) 11,646 388 Start Low
86 OpenVPN 11,470 382 C Mid
87 Galois/Counter Mode 11,418 380 C Mid
88 Public key infrastructure 11,412 380 C Top
89 OpenSSL 11,208 373 B High
90 Hashcash 11,193 373 Start Unknown
91 SHA-3 10,861 362 Start Mid
92 Mullvad 10,827 360 Start Low
93 Bombe 10,704 356 B Mid
94 Bitwarden 10,593 353 C Low
95 Elliptic Curve Digital Signature Algorithm 10,524 350 C High
96 Integer factorization 10,509 350 B Mid
97 IMSI-catcher 10,430 347 Start Mid
98 Secure Hash Algorithms 10,306 343 Start High
99 Salt (cryptography) 10,278 342 Start High
100 VeraCrypt 10,255 341 C Mid
101 Homomorphic encryption 10,211 340 C High
102 Ultra (cryptography) 10,059 335 C High
103 Substitution cipher 10,009 333 Unknown Unknown
104 Alice and Bob 9,937 331 Start High
105 Data Encryption Standard 9,772 325 C Top
106 Pay television 9,711 323 Start Unknown
107 Shiba Inu (cryptocurrency) 9,701 323 Start Low
108 Shamir's secret sharing 9,557 318 C High
109 Cryptonomicon 9,554 318 C Low
110 SSH File Transfer Protocol 9,490 316 C Low
111 Cryptographic nonce 9,446 314 Start High
112 Proof of stake 9,385 312 C Low
113 Colossus computer 9,339 311 B Mid
114 Adam Back 9,328 310 C Low
115 Matrix (protocol) 9,284 309 Start Unknown
116 Forward secrecy 9,103 303 C High
117 Brute-force attack 8,966 298 C High
118 Decentralized finance 8,855 295 Start Low
119 Fort Meade 8,812 293 C Low
120 Symmetric-key algorithm 8,782 292 Start Top
121 ChaCha20-Poly1305 8,751 291 C Low
122 Vault 7 8,733 291 C Mid
123 Password manager 8,713 290 C Low
124 Authentication 8,663 288 C High
125 I2P 8,486 282 B Low
126 InterPlanetary File System 8,449 281 C Low
127 Authenticated encryption 8,418 280 C Mid
128 PBKDF2 8,412 280 C Low
129 Theoretical computer science 8,357 278 B Low
130 EdDSA 8,260 275 C High
131 Quantum key distribution 8,240 274 B Mid
132 Link 16 8,215 273 Start Low
133 Playfair cipher 8,207 273 Unknown Unknown
134 Elliptic-curve Diffie–Hellman 8,121 270 Start Mid
135 Comparison of BitTorrent clients 8,080 269 List Low
136 Curve25519 8,056 268 C High
137 Cryptanalysis 8,055 268 C High
138 Signal Protocol 7,900 263 C High
139 Beale ciphers 7,837 261 B Low
140 Message authentication code 7,616 253 C Top
141 Argon2 7,501 250 C Mid
142 Babington Plot 7,448 248 C Low
143 Differential privacy 7,250 241 C Mid
144 Discrete logarithm 7,049 234 C Mid
145 KeePass 6,941 231 C Low
146 Lavarand 6,795 226 Start Mid
147 Bitcoin Cash 6,694 223 Start Low
148 Apple–FBI encryption dispute 6,692 223 C Low
149 Password cracking 6,599 219 C Mid
150 Qubes OS 6,560 218 C Mid
151 Cypherpunk 6,394 213 C Mid
152 The Tor Project 6,349 211 C Mid
153 Litecoin 6,256 208 Start Low
154 Threema 6,247 208 C Unknown
155 Certificate signing request 6,218 207 C Low
156 Birthday attack 6,123 204 C High
157 Illegal number 6,073 202 C Low
158 Quantum cryptography 6,059 201 C High
159 Self-signed certificate 6,048 201 Start Unknown
160 Hyphanet 5,978 199 B Mid
161 Side-channel attack 5,931 197 C High
162 11B-X-1371 5,900 196 GA Low
163 Units of information 5,804 193 C Unknown
164 GNU Privacy Guard 5,786 192 C Unknown
165 Lorenz cipher 5,732 191 C Top
166 Key derivation function 5,717 190 C Low
167 XOR cipher 5,701 190 Stub Mid
168 ElGamal encryption 5,668 188 Start Top
169 Padding oracle attack 5,656 188 Start Low
170 RC4 5,643 188 B Top
171 Conel Hugh O'Donel Alexander 5,486 182 Start Low
172 Lattice-based cryptography 5,463 182 Start Low
173 KeePassXC 5,453 181 Start Low
174 Ricky McCormick's encrypted notes 5,432 181 B Low
175 Salsa20 5,424 180 C Top
176 Padding (cryptography) 5,413 180 Start Unknown
177 Session (software) 5,379 179 Start Low
178 Polkadot (blockchain platform) 5,263 175 Start Low
179 Cryptographically secure pseudorandom number generator 5,261 175 C Top
180 PKCS 12 5,258 175 Start Low
181 RSA Security 5,234 174 C Unknown
182 Harvest now, decrypt later 5,192 173 Start Low
183 Triple DES 5,181 172 Start Unknown
184 Digital Signature Algorithm 5,152 171 C Top
185 Cipher suite 5,141 171 C Top
186 Transposition cipher 5,129 170 Unknown Unknown
187 OpenSSH 5,109 170 C High
188 BLAKE (hash function) 5,099 169 C Mid
189 3-D Secure 5,058 168 Start Low
190 Kerckhoffs's principle 5,031 167 Start Mid
191 Password strength 5,018 167 C High
192 FIPS 140-2 4,999 166 C Mid
193 Block cipher 4,988 166 C Top
194 Mutual authentication 4,988 166 Stub Low
195 NIST SP 800-90A 4,977 165 C Mid
196 Adi Shamir 4,954 165 C Unknown
197 Len Sassaman 4,905 163 Start Unknown
198 Citizenfour 4,853 161 C Low
199 Bitconnect 4,809 160 C Low
200 Utah Data Center 4,805 160 C Mid
201 Root certificate 4,800 160 Start Low
202 Digest access authentication 4,795 159 B Low
203 Tap code 4,732 157 Start Low
204 Cryptogram 4,725 157 C Mid
205 DNS Certification Authority Authorization 4,680 156 GA Low
206 Rijndael S-box 4,642 154 Start Low
207 Replay attack 4,630 154 C Top
208 Datagram Transport Layer Security 4,621 154 C Mid
209 Secure multi-party computation 4,539 151 Start High
210 Stream cipher 4,468 148 Start Top
211 Blowfish (cipher) 4,465 148 B High
212 Polybius square 4,334 144 Start Mid
213 Deniable encryption 4,181 139 Start High
214 Confidentiality 4,158 138 C Low
215 Marian Rejewski 4,148 138 FA Mid
216 Avalanche effect 4,068 135 Start High
217 Commitment scheme 4,066 135 C High
218 Bacon's cipher 4,064 135 Start Low
219 Privacy-Enhanced Mail 4,037 134 Start Low
220 Key (cryptography) 4,024 134 Start Unknown
221 Boolean function 3,973 132 Start Mid
222 Feistel cipher 3,924 130 Start Unknown
223 Wired Equivalent Privacy 3,919 130 C Mid
224 Bruce Schneier 3,869 128 Start High
225 History of cryptography 3,852 128 Start High
226 Richard Teng 3,841 128 Start Low
227 Fork (blockchain) 3,774 125 Start Mid
228 Diplomatic bag 3,769 125 Start Low
229 Shugborough inscription 3,769 125 Start Low
230 PKCS 3,736 124 List High
231 Known-plaintext attack 3,734 124 Start High
232 Certificate revocation list 3,706 123 C Low
233 TrueCrypt 3,700 123 C Mid
234 Export of cryptography from the United States 3,660 122 C Unknown
235 Initialization vector 3,651 121 C High
236 Web of trust 3,649 121 C High
237 The Doughnut 3,640 121 GA High
238 AES instruction set 3,630 121 C Low
239 Dual EC DRBG 3,577 119 C High
240 NIST Post-Quantum Cryptography Standardization 3,571 119 C Mid
241 Cold boot attack 3,564 118 C Low
242 List of ciphertexts 3,552 118 List Low
243 Certificate Transparency 3,537 117 C High
244 Plaintext 3,510 117 Start High
245 Key exchange 3,495 116 Start Unknown
246 Rail fence cipher 3,464 115 Start Low
247 SipHash 3,437 114 Start Low
248 Electronic signature 3,432 114 C Low
249 Frequency analysis 3,431 114 C High
250 Elizebeth Smith Friedman 3,431 114 C Mid
251 Book cipher 3,429 114 C Low
252 PKCS 11 3,418 113 Unknown Unknown
253 Length extension attack 3,417 113 Start Unknown
254 Dilly Knox 3,416 113 B Unknown
255 Daniel J. Bernstein 3,407 113 C Mid
256 Ciphertext 3,307 110 Start High
257 BB84 3,306 110 Start Low
258 Atbash 3,266 108 Stub Low
259 Elliptic curve point multiplication 3,260 108 C Mid
260 Quantum network 3,237 107 C Low
261 One-way function 3,235 107 Start Top
262 Hill cipher 3,223 107 Unknown Unknown
263 W. T. Tutte 3,207 106 C Mid
264 Timing attack 3,192 106 C High
265 Communications Security Establishment 3,179 105 C Mid
266 RSA SecurID 3,174 105 C Low
267 Crypto-anarchy 3,171 105 Start High
268 Challenge–response authentication 3,156 105 Start Mid
269 Cryptocurrency tumbler 3,154 105 Start Unknown
270 Double Ratchet Algorithm 3,112 103 Start Low
271 Type B Cipher Machine 3,103 103 Start Low
272 Whonix 3,070 102 Start Mid
273 Whitfield Diffie 3,069 102 B High
274 David Chaum 3,064 102 C Low
275 Australian Signals Directorate 3,062 102 C Low
276 Peter Todd (programmer) 3,061 102 Start Unknown
277 Algorand 3,051 101 B Low
278 Copiale cipher 3,018 100 Start Low
279 AES key schedule 3,011 100 Start Low
280 Blockchain game 2,984 99 Start Low
281 Bomba (cryptography) 2,977 99 Start Low
282 Merkle–Damgård construction 2,966 98 C Unknown
283 PKCS 7 2,944 98 Start Low
284 Key size 2,936 97 C High
285 K-anonymity 2,930 97 Start Mid
286 PKCS 1 2,861 95 C Mid
287 Collision attack 2,851 95 Start High
288 Polyalphabetic cipher 2,831 94 Start Unknown
289 Disk encryption theory 2,824 94 C Unknown
290 Jami (software) 2,807 93 Start Unknown
291 Keygen 2,793 93 C Low
292 Mumble (software) 2,780 92 C Unknown
293 Directory service 2,775 92 Start Mid
294 Non-repudiation 2,771 92 Start Mid
295 Supply chain attack 2,731 91 C Low
296 Crypto AG 2,707 90 C High
297 Zcash 2,687 89 Start Low
298 RSA Factoring Challenge 2,686 89 Start Low
299 Digital watermarking 2,670 89 B Mid
300 Trusted timestamping 2,668 88 Start Unknown
301 Key encapsulation mechanism 2,644 88 Start High
302 Magic (cryptography) 2,627 87 Start Unknown
303 HKDF 2,625 87 Start Unknown
304 S-box 2,613 87 Start Top
305 Proton Drive 2,599 86 Start Low
306 DNS-based Authentication of Named Entities 2,589 86 C Mid
307 Optimal asymmetric encryption padding 2,584 86 Start High
308 Preimage attack 2,512 83 Stub Unknown
309 Bitcoin scalability problem 2,511 83 C Low
310 Bitcoin Core 2,507 83 Start Low
311 I. J. Good 2,502 83 C Low
312 Code signing 2,479 82 C Low
313 Dictionary attack 2,454 81 C Unknown
314 List of bitcoin forks 2,453 81 List Low
315 Affine cipher 2,422 80 C Low
316 Special Collection Service 2,414 80 C Low
317 Key disclosure law 2,405 80 C Low
318 Disk encryption 2,397 79 C High
319 FIPS 140 2,378 79 Start Mid
320 Gordon Welchman 2,365 78 C Low
321 Alastair Denniston 2,341 78 Start Unknown
322 Clipper chip 2,340 78 C High
323 Baby-step giant-step 2,321 77 C Unknown
324 Schnorr signature 2,320 77 C High
325 PKCS 8 2,281 76 Stub Unknown
326 Nothing-up-my-sleeve number 2,273 75 C Low
327 Non-interactive zero-knowledge proof 2,269 75 Start Low
328 Scrambler 2,258 75 C Unknown
329 Reception and criticism of WhatsApp security and privacy features 2,257 75 C Low
330 William F. Friedman 2,242 74 C Unknown
331 FIPS 140-3 2,236 74 C Low
332 Twofish 2,233 74 Start High
333 Bitcoin Gold 2,228 74 Start Low
334 Hash chain 2,225 74 Start Unknown
335 BLS digital signature 2,221 74 Start Mid
336 Comparison of disk encryption software 2,214 73 List High
337 Comparison of SSH clients 2,212 73 List Low
338 Leo Marks 2,207 73 B Unknown
339 Pepper (cryptography) 2,198 73 Start Low
340 Briar (software) 2,186 72 Start Low
341 Physical unclonable function 2,184 72 Start Unknown
342 Off-the-record messaging 2,172 72 Start Unknown
343 Musical cryptogram 2,167 72 C Low
344 Cryptographic protocol 2,146 71 Start High
345 William Binney (intelligence official) 2,146 71 C Mid
346 Secret sharing 2,139 71 C High
347 Ralph Merkle 2,115 70 C High
348 Classical cipher 2,115 70 Start Top
349 Tox (protocol) 2,114 70 C Low
350 Phil Zimmermann 2,112 70 Start Mid
351 Filecoin 2,111 70 Start Low
352 Paillier cryptosystem 2,107 70 Start High
353 IEEE 802.11i-2004 2,096 69 C Mid
354 Pre-shared key 2,060 68 Start Mid
355 Martin Hellman 2,055 68 Start High
356 HTTP Public Key Pinning 2,043 68 C Mid
357 Ciphertext indistinguishability 2,040 68 C High
358 Authenticator 2,039 67 B Low
359 PGP word list 2,036 67 Start Low
360 Entrust 2,025 67 Start Low
361 McEliece cryptosystem 1,995 66 C High
362 Lenstra elliptic-curve factorization 1,984 66 C Low
363 Stuart Haber 1,983 66 Start Unknown
364 Opportunistic TLS 1,982 66 Start Mid
365 Communications security 1,958 65 Start Mid
366 Trusted Computing 1,949 64 C Mid
367 Bouncy Castle (cryptography) 1,945 64 Start Unknown
368 BTCC (company) 1,927 64 Start Low
369 CCM mode 1,916 63 Start High
370 Dm-crypt 1,913 63 Start Low
371 Trapdoor function 1,908 63 Start High
372 Open Whisper Systems 1,908 63 B Unknown
373 Data at rest 1,884 62 C Mid
374 Data anonymization 1,878 62 Start Mid
375 Skipjack (cipher) 1,851 61 Start High
376 BusKill 1,848 61 Start Low
377 Cryptographic primitive 1,846 61 Start Top
378 Comparison of cryptography libraries 1,806 60 List Unknown
379 Bullrun (decryption program) 1,803 60 B Low
380 Proof of authority 1,803 60 Start Low
381 Berlekamp–Massey algorithm 1,798 59 Start Unknown
382 ADFGVX cipher 1,781 59 Unknown Unknown
383 Security level 1,779 59 Stub Mid
384 Coppersmith's attack 1,776 59 B High
385 Chosen-plaintext attack 1,769 58 Stub Unknown
386 Comparison of TLS implementations 1,766 58 List High
387 Autokey cipher 1,751 58 C Mid
388 Crypto Wars 1,746 58 Start High
389 Blind signature 1,744 58 C Mid
390 Confusion and diffusion 1,741 58 Start Mid
391 Taher Elgamal 1,735 57 C Unknown
392 Poly1305 1,715 57 Start Top
393 Anonymous P2P 1,701 56 C Low
394 Charlie Lee (computer scientist) 1,701 56 Start Low
395 W. Scott Stornetta 1,695 56 Start Unknown
396 Rijndael MixColumns 1,689 56 Start Low
397 Dorabella Cipher 1,688 56 Unknown Unknown
398 Tabula recta 1,683 56 Unknown Unknown
399 Blum Blum Shub 1,677 55 C High
400 Clock drift 1,666 55 C Low
401 Key stretching 1,658 55 Start Unknown
402 Cryptanalysis of the Lorenz cipher 1,658 55 C High
403 Crypt (C) 1,647 54 C High
404 UltraViolet (website) 1,640 54 C Low
405 CBC-MAC 1,638 54 C High
406 Encryption software 1,632 54 Start Top
407 Differential cryptanalysis 1,628 54 B High
408 Arthur Scherbius 1,612 53 Start Mid
409 Nyctography 1,607 53 Unknown Unknown
410 Banburismus 1,605 53 C Low
411 Enigma rotor details 1,604 53 Start Mid
412 Public key fingerprint 1,596 53 Start Mid
413 Coinye 1,595 53 Start Low
414 WebTorrent 1,593 53 Start Unknown
415 Encrypting File System 1,589 52 B Unknown
416 SegWit 1,586 52 Start Low
417 Tiny Encryption Algorithm 1,581 52 Unknown Unknown
418 LibreSSL 1,581 52 C High
419 Tor2web 1,564 52 Start Low
420 Government Communications Security Bureau 1,561 52 B Low
421 FreeOTP 1,554 51 Start Low
422 Meet-in-the-middle attack 1,539 51 C High
423 ZeroNet 1,531 51 Start Low
424 Information-theoretic security 1,527 50 Start Top
425 Null cipher 1,510 50 Stub Low
426 Diehard tests 1,509 50 C Low
427 Station HYPO 1,502 50 Start Low
428 Comparison of cryptographic hash functions 1,499 49 List Low
429 One-key MAC 1,496 49 Start Low
430 Roger Dingledine 1,482 49 Start Unknown
431 Jefferson disk 1,475 49 Start Unknown
432 Secret decoder ring 1,474 49 Start Low
433 Wiener's attack 1,459 48 B High
434 Random oracle 1,458 48 Start Low
435 Electronic Signatures in Global and National Commerce Act 1,457 48 Stub Unknown
436 SYN cookies 1,457 48 Start Unknown
437 Advanced Access Content System 1,454 48 C Mid
438 Key server (cryptographic) 1,448 48 Start Mid
439 SIGSALY 1,446 48 C Low
440 Content Scramble System 1,436 47 Start Mid
441 DES supplementary material 1,435 47 C Low
442 Content Authenticity Initiative 1,434 47 C Low
443 DeCSS 1,432 47 C Mid
444 Generic Security Services Application Programming Interface 1,429 47 Start Low
445 Michael O. Rabin 1,428 47 C Low
446 Interactive proof system 1,425 47 Start High
447 National Cryptologic Museum 1,420 47 C Mid
448 Black Chamber 1,415 47 Unknown Unknown
449 NTRUEncrypt 1,414 47 C Mid
450 Pseudorandom function family 1,404 46 Start Low
451 Serpent (cipher) 1,401 46 C Low
452 MD4 1,398 46 Start Low
453 Orbot 1,396 46 Stub Low
454 Hybrid cryptosystem 1,391 46 Start High
455 Mix network 1,388 46 C Low
456 NTRU 1,384 46 C Low
457 FileVault 1,383 46 C Mid
458 Codebook 1,381 46 Stub Unknown
459 Supersingular isogeny key exchange 1,380 46 Start Low
460 Great Cipher 1,374 45 Start Mid
461 Visual cryptography 1,369 45 Unknown Unknown
462 Solitaire (cipher) 1,367 45 Unknown Unknown
463 Four-square cipher 1,364 45 C Unknown
464 Red/black concept 1,362 45 Stub Unknown
465 Simultaneous Authentication of Equals 1,358 45 Start High
466 Sponge function 1,356 45 Unknown Unknown
467 David Wheeler (computer scientist) 1,350 45 C Low
468 Advanced Encryption Standard process 1,345 44 C Mid
469 Cryptographic Message Syntax 1,342 44 Stub Mid
470 Oblivious transfer 1,340 44 Start Unknown
471 SecureDrop 1,340 44 Start Mid
472 Wildcard certificate 1,337 44 Redirect NA
473 Cryptome 1,328 44 C Low
474 AES implementations 1,328 44 List Low
475 Challenge-Handshake Authentication Protocol 1,322 44 Start Low
476 Kasiski examination 1,319 43 Unknown Unknown
477 Format-preserving encryption 1,313 43 Start High
478 Key management 1,308 43 Unknown Unknown
479 SIGABA 1,301 43 C High
480 Conditional-access module 1,300 43 Start Low
481 ElGamal signature scheme 1,298 43 Start Top
482 Key signing party 1,297 43 Stub Low
483 Max Newman 1,296 43 B Low
484 Secure cryptoprocessor 1,292 43 C Mid
485 Code (cryptography) 1,292 43 Start Top
486 Word square 1,292 43 C Low
487 Yescrypt 1,292 43 Stub Low
488 List of things named after Alan Turing 1,290 43 List Low
489 Perfect Dark (P2P) 1,287 42 C Low
490 Integrated Encryption Scheme 1,285 42 Start Low
491 Keybase 1,284 42 Start Low
492 Hash-based cryptography 1,282 42 Start Low
493 Whirlpool (hash function) 1,278 42 Start Low
494 Frank Terpil 1,271 42 Start Low
495 Collision resistance 1,270 42 Start High
496 Cryptomator 1,267 42 C Unknown
497 RSA problem 1,258 41 Start Top
498 GNUnet 1,255 41 B Low
499 List of cryptographers 1,253 41 List Low
500 Needham–Schroeder protocol 1,248 41 Start Mid