Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List[edit]

Period: 2024-04-01 to 2024-04-30

Total views: 7,300,926

Updated: 12:51, 15 May 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 1,178,938 39,297 B High
2 Telegram (software) 423,551 14,118 B Mid
3 Bitcoin 254,546 8,484 B High
4 Alan Turing 208,019 6,933 GA Top
5 Cryptocurrency 206,616 6,887 C High
6 WikiLeaks 116,711 3,890 B Low
7 Blockchain 116,230 3,874 B High
8 HTTPS 110,471 3,682 C High
9 Tor (network) 99,033 3,301 B Mid
10 The Imitation Game 88,609 2,953 C Mid
11 Transport Layer Security 79,826 2,660 B Top
12 Voynich manuscript 73,627 2,454 B Low
13 Virtual private network 69,166 2,305 C Mid
14 National Security Agency 67,223 2,240 C High
15 Enigma machine 65,065 2,168 C High
16 RSA (cryptosystem) 62,620 2,087 C Top
17 Password 61,548 2,051 C Top
18 Diffie–Hellman key exchange 54,540 1,818 C Top
19 Advanced Encryption Standard 53,605 1,786 B Top
20 Changpeng Zhao 49,188 1,639 Start Low
21 History of bitcoin 48,831 1,627 C Low
22 Vigenère cipher 45,802 1,526 B Low
23 SHA-2 44,984 1,499 C Top
24 Secure Shell 44,967 1,498 C High
25 HTTP Strict Transport Security 44,615 1,487 C Low
26 Cryptography 42,993 1,433 C Top
27 Signal (messaging app) 40,868 1,362 C Mid
28 Vitalik Buterin 39,761 1,325 C Low
29 WhatsApp University 39,431 1,314 Start Low
30 Public-key cryptography 39,134 1,304 C Top
31 MD5 35,975 1,199 C Top
32 Block cipher mode of operation 34,939 1,164 C Top
33 Darknet market 34,000 1,133 B Mid
34 Dogecoin 33,354 1,111 C Low
35 Caesar cipher 32,841 1,094 FA High
36 Zimmermann Telegram 32,813 1,093 B High
37 Sator Square 31,960 1,065 B Low
38 Joan Clarke 31,844 1,061 C Mid
39 Man-in-the-middle attack 30,549 1,018 C Mid
40 Digital signature 29,777 992 C Top
41 Knapsack problem 29,022 967 C Mid
42 Proton Mail 28,860 962 C Low
43 Encryption 28,365 945 C Top
44 Information theory 27,655 921 B Top
45 HMAC 26,646 888 C High
46 I2P 25,725 857 B Low
47 Steganography 25,501 850 B High
48 Active Directory 25,089 836 C Low
49 Cryptographic hash function 25,050 835 C Top
50 Claude Shannon 25,015 833 C Top
51 GCHQ 24,876 829 B Low
52 SHA-1 24,274 809 C Top
53 Pretty Good Privacy 23,717 790 B High
54 Bletchley Park 22,672 755 B High
55 Elliptic-curve cryptography 22,252 741 C High
56 NordVPN 21,655 721 C Mid
57 Zero-knowledge proof 21,488 716 C Top
58 Digital rights management 21,130 704 B High
59 Wi-Fi Protected Access 21,040 701 C Mid
60 Post-quantum cryptography 20,804 693 C High
61 Trusted Platform Module 20,793 693 C Mid
62 Certificate authority 20,030 667 C High
63 Letter frequency 19,441 648 B Low
64 Merkle tree 19,334 644 C Mid
65 Information security 19,326 644 B Top
66 Ross J. Anderson 18,586 619 C Mid
67 Cipher 18,475 615 C Top
68 Kerberos (protocol) 18,191 606 C High
69 Public key infrastructure 18,029 600 C Top
70 Cryptanalysis of the Enigma 17,793 593 C Mid
71 Secure Hash Algorithms 17,361 578 Start High
72 Shiba Inu (cryptocurrency) 17,223 574 Start Low
73 One-time pad 17,205 573 C Top
74 ROT13 16,890 563 C Mid
75 Data Encryption Standard 16,573 552 C Top
76 Authentication 16,280 542 C High
77 Hyphanet 16,249 541 B Mid
78 Homomorphic encryption 15,725 524 C High
79 Elliptic Curve Digital Signature Algorithm 15,565 518 C High
80 OpenVPN 15,522 517 C Mid
81 Keychain (software) 15,434 514 Start Unknown
82 Rainbow table 15,353 511 C High
83 Vault 7 15,218 507 C Mid
84 Bcrypt 15,142 504 C Mid
85 Code talker 14,644 488 B Low
86 Bombe 14,563 485 B Mid
87 One-time password 14,522 484 C Mid
88 Utah Data Center 14,135 471 C Mid
89 Galois/Counter Mode 14,069 468 C Mid
90 Public key certificate 13,898 463 C Top
91 Phone hacking 13,816 460 Start Mid
92 SHA-3 13,752 458 Start Mid
93 OpenSSL 13,454 448 B High
94 Symmetric-key algorithm 13,433 447 Start Top
95 Bitcoin Cash 13,209 440 Start Low
96 Salt (cryptography) 13,179 439 Start High
97 EdDSA 13,122 437 C High
98 .onion 12,947 431 C Low
99 Brute-force attack 12,784 426 C High
100 SSH File Transfer Protocol 12,674 422 Start Unknown
101 Alice and Bob 12,436 414 Start Low
102 Grover's algorithm 12,302 410 C Mid
103 Mullvad 12,279 409 Start Low
104 Kryptos 12,152 405 C Low
105 Integer factorization 11,741 391 B Mid
106 Colossus computer 10,924 364 B Mid
107 Ultra (cryptography) 10,837 361 C High
108 Forward secrecy 10,778 359 C High
109 Tails (operating system) 10,755 358 Start Low
110 PBKDF2 10,746 358 C Low
111 Substitution cipher 10,508 350 Unknown Unknown
112 Cryptographic nonce 10,487 349 Start High
113 Shamir's secret sharing 10,183 339 C High
114 InterPlanetary File System 10,178 339 C Low
115 Theoretical computer science 10,108 336 B Low
116 Link 16 10,027 334 Start Low
117 Comparison of BitTorrent clients 9,936 331 List Low
118 Apple–FBI encryption dispute 9,838 327 C Low
119 Differential privacy 9,730 324 C Unknown
120 Message authentication code 9,723 324 C Top
121 3-D Secure 9,657 321 Start Low
122 Fort Meade 9,621 320 C Low
123 ChaCha20-Poly1305 9,612 320 C Low
124 Pay television 9,454 315 Start Unknown
125 Cryptonomicon 9,452 315 C Low
126 RC4 9,424 314 B Top
127 Side-channel attack 9,424 314 C High
128 Authenticated encryption 9,302 310 C Mid
129 Quantum key distribution 9,132 304 B Mid
130 Bitwarden 8,974 299 C Low
131 Curve25519 8,969 298 C High
132 Cryptanalysis 8,907 296 C High
133 Self-signed certificate 8,850 295 Start Unknown
134 Proof of stake 8,761 292 Start Low
135 Lattice-based cryptography 8,656 288 Start Low
136 Elliptic-curve Diffie–Hellman 8,626 287 Start Mid
137 Discrete logarithm 8,546 284 C Mid
138 Cypherpunk 8,503 283 C Mid
139 VeraCrypt 8,411 280 C Mid
140 Playfair cipher 8,410 280 Unknown Unknown
141 The Tor Project 8,317 277 C Mid
142 Password manager 8,293 276 C Low
143 Birthday attack 8,162 272 C High
144 Beale ciphers 8,095 269 B Low
145 Triple DES 7,972 265 Start Unknown
146 Babington Plot 7,927 264 C Low
147 Matrix (protocol) 7,925 264 Start Unknown
148 Confidentiality 7,917 263 C Low
149 Certificate signing request 7,832 261 C Low
150 PKCS 12 7,744 258 Start Unknown
151 OpenSSH 7,718 257 C High
152 Argon2 7,698 256 C Mid
153 Transposition cipher 7,660 255 Unknown Unknown
154 Richard Teng 7,617 253 Start Low
155 Digital Signature Algorithm 7,590 253 C Top
156 Decentralized finance 7,553 251 Start Low
157 FIPS 140-2 7,390 246 C Mid
158 Supply chain attack 7,298 243 C Low
159 Quantum cryptography 7,291 243 C High
160 Litecoin 7,280 242 Start Low
161 ElGamal encryption 7,207 240 Start Top
162 KeePass 7,190 239 C Low
163 Citizenfour 7,149 238 C Low
164 Qubes OS 7,087 236 C Mid
165 Cipher suite 7,013 233 C Top
166 Block cipher 6,920 230 C Top
167 Lavarand 6,881 229 Start Mid
168 Wired Equivalent Privacy 6,869 228 C Mid
169 Password strength 6,864 228 C High
170 RSA Security 6,858 228 C Unknown
171 Digest access authentication 6,840 228 B Low
172 GNU Privacy Guard 6,830 227 C Unknown
173 Conel Hugh O'Donel Alexander 6,789 226 Start Low
174 Bitconnect 6,612 220 C Low
175 WebTorrent 6,554 218 Start Unknown
176 IMSI-catcher 6,504 216 Start Mid
177 Adam Back 6,469 215 Start Low
178 Cryptographically secure pseudorandom number generator 6,403 213 C Top
179 Signal Protocol 6,297 209 C High
180 Kerckhoffs's principle 6,290 209 Start Mid
181 Key derivation function 6,290 209 C Low
182 Len Sassaman 6,285 209 Start Unknown
183 Lorenz cipher 6,248 208 C Top
184 Dual EC DRBG 6,247 208 C High
185 Salsa20 6,191 206 C Top
186 Stream cipher 6,144 204 Start Top
187 Blowfish (cipher) 6,074 202 B High
188 Tap code 6,041 201 Start Low
189 Units of information 5,996 199 C Unknown
190 Root certificate 5,986 199 Start Low
191 Mutual authentication 5,961 198 Stub Low
192 Rijndael S-box 5,846 194 Start Low
193 Electronic signature 5,837 194 C Low
194 Padding (cryptography) 5,735 191 Start Unknown
195 BLAKE (hash function) 5,670 189 C Mid
196 Secure multi-party computation 5,565 185 Start High
197 RSA SecurID 5,502 183 Unknown Unknown
198 Cryptogram 5,478 182 C Mid
199 Bitcoin Core 5,386 179 Start Low
200 Password cracking 5,284 176 C Mid
201 Initialization vector 5,278 175 C High
202 XOR cipher 5,170 172 Stub Mid
203 Certificate revocation list 5,073 169 C Low
204 Privacy-Enhanced Mail 5,020 167 Start Low
205 AES instruction set 4,999 166 C Low
206 TrueCrypt 4,979 165 C Mid
207 Adi Shamir 4,978 165 Start Unknown
208 Boolean function 4,961 165 Start Mid
209 Datagram Transport Layer Security 4,952 165 Start Mid
210 Polkadot (cryptocurrency) 4,928 164 Start Low
211 Web of trust 4,916 163 C High
212 Key (cryptography) 4,898 163 Start Unknown
213 Deniable encryption 4,884 162 Start High
214 KeePassXC 4,854 161 Start Low
215 Feistel cipher 4,800 160 Start Unknown
216 Automatic Certificate Management Environment 4,787 159 Start Low
217 11B-X-1371 4,786 159 GA Low
218 PKCS 4,785 159 List High
219 Bitcoin scalability problem 4,749 158 C Low
220 Replay attack 4,672 155 C Top
221 Fork (blockchain) 4,652 155 Start Mid
222 Padding oracle attack 4,605 153 Stub Unknown
223 Diplomatic bag 4,602 153 Start Low
224 Rail fence cipher 4,576 152 Start Low
225 Marian Rejewski 4,532 151 FA Mid
226 Operation Rubicon 4,503 150 C Low
227 Ciphertext 4,486 149 Start High
228 Elliptic curve point multiplication 4,482 149 C Mid
229 Illegal number 4,454 148 C Low
230 The Doughnut 4,401 146 GA High
231 Polybius square 4,395 146 Start Mid
232 AES key schedule 4,382 146 Start Low
233 History of cryptography 4,379 145 Start High
234 Frequency analysis 4,333 144 C High
235 Hill cipher 4,281 142 Unknown Unknown
236 Bruce Schneier 4,224 140 Start High
237 Communications Security Establishment 4,214 140 C Mid
238 Session (software) 4,155 138 Start Low
239 One-way function 4,138 137 Start Top
240 Commitment scheme 4,138 137 C High
241 Challenge–response authentication 4,136 137 Start Mid
242 Key size 4,135 137 C High
243 PKCS 7 4,086 136 Start Low
244 Cold boot attack 4,067 135 C Low
245 NIST Post-Quantum Cryptography Standardization 3,930 131 C Mid
246 Blockchain game 3,918 130 Start Low
247 Daniel J. Bernstein 3,893 129 C Mid
248 Digital watermarking 3,889 129 B Mid
249 Non-repudiation 3,884 129 Start Mid
250 Known-plaintext attack 3,884 129 Start High
251 List of bitcoin forks 3,867 128 List Low
252 Cryptocurrency tumbler 3,841 128 Start Unknown
253 Copiale cipher 3,824 127 Start Low
254 Bacon's cipher 3,787 126 Start Low
255 PKCS 1 3,787 126 C Mid
256 Elizebeth Smith Friedman 3,771 125 C Mid
257 Code signing 3,770 125 C Low
258 Book cipher 3,751 125 C Low
259 David Chaum 3,663 122 C Low
260 S-box 3,650 121 Start Top
261 Length extension attack 3,640 121 Start Unknown
262 SipHash 3,635 121 Start Low
263 PKCS 11 3,620 120 Unknown Unknown
264 Bomba (cryptography) 3,578 119 Start Low
265 Avalanche effect 3,578 119 Start High
266 Merkle–Damgård construction 3,546 118 C Unknown
267 Directory service 3,538 117 Start Mid
268 Timing attack 3,522 117 C High
269 Crypto AG 3,510 117 C High
270 Atbash 3,504 116 Stub Low
271 Hashcash 3,494 116 Start Unknown
272 Pre-shared key 3,490 116 Start Mid
273 K-anonymity 3,472 115 Start Mid
274 Ricky McCormick's encrypted notes 3,459 115 B Unknown
275 Key exchange 3,440 114 Start Unknown
276 Subject Alternative Name 3,436 114 Stub Mid
277 Disk encryption 3,419 113 C High
278 Clipper chip 3,409 113 C High
279 Type B Cipher Machine 3,402 113 Start Low
280 Collision attack 3,401 113 Start High
281 Australian Signals Directorate 3,367 112 C Low
282 Affine cipher 3,334 111 C Low
283 Dictionary attack 3,328 110 C Unknown
284 Polyalphabetic cipher 3,326 110 Start Unknown
285 Data anonymization 3,322 110 Start Mid
286 List of ciphertexts 3,312 110 List Low
287 Digital renminbi 3,260 108 B High
288 Special Collection Service 3,244 108 C Low
289 Cryptographic protocol 3,219 107 Start High
290 Hash chain 3,202 106 Start Unknown
291 Wildcard certificate 3,189 106 Start Unknown
292 Crypto-anarchy 3,183 106 Start High
293 Schnorr signature 3,180 106 C High
294 RSA Factoring Challenge 3,151 105 Start Low
295 Quantum network 3,147 104 C Low
296 Whonix 3,145 104 Start Mid
297 Comparison of SSH clients 3,118 103 List Low
298 Twofish 3,102 103 Start High
299 Communications security 3,092 103 Start Mid
300 Optimal asymmetric encryption padding 3,082 102 Start High
301 Threema 3,082 102 C Unknown
302 Filecoin 3,076 102 Stub Low
303 BB84 3,039 101 Start Low
304 Whitfield Diffie 2,990 99 B High
305 Plaintext 2,964 98 Start High
306 Disk encryption theory 2,947 98 C Unknown
307 Non-interactive zero-knowledge proof 2,916 97 Start Low
308 Scrambler 2,908 96 C Unknown
309 PKCS 8 2,890 96 Stub Unknown
310 Curve448 2,884 96 Start Mid
311 Keygen 2,881 96 C Low
312 Preimage attack 2,877 95 Stub Unknown
313 Gordon Welchman 2,865 95 C Low
314 HKDF 2,817 93 Start Unknown
315 Magic (cryptography) 2,806 93 Start Unknown
316 Harvest now, decrypt later 2,801 93 Start Low
317 IEEE 802.11i-2004 2,792 93 C Mid
318 Physical unclonable function 2,790 93 Start Unknown
319 Data at rest 2,783 92 C Mid
320 FIPS 140 2,772 92 Start Mid
321 Alastair Denniston 2,748 91 Start Unknown
322 Charlie Lee (computer scientist) 2,747 91 Start Low
323 Secret sharing 2,741 91 B High
324 Export of cryptography from the United States 2,727 90 C Unknown
325 DNS-based Authentication of Named Entities 2,725 90 C Mid
326 Dilly Knox 2,705 90 B Unknown
327 Mumble (software) 2,688 89 C Unknown
328 Algorand 2,683 89 B Low
329 Certificate Transparency 2,632 87 C High
330 DNS Certification Authority Authorization 2,620 87 GA Low
331 I. J. Good 2,617 87 C Low
332 Entrust 2,586 86 Start Low
333 CCM mode 2,584 86 Start High
334 Bouncy Castle (cryptography) 2,564 85 Start Unknown
335 William Binney (intelligence official) 2,562 85 Start Mid
336 Phil Zimmermann 2,549 84 Start Mid
337 Zcash 2,542 84 Start Low
338 Encrypting File System 2,536 84 B Unknown
339 Rijndael MixColumns 2,536 84 Start Low
340 Classical cipher 2,528 84 Start Top
341 Clock drift 2,510 83 C Low
342 Confusion and diffusion 2,509 83 Start Mid
343 Baby-step giant-step 2,505 83 B Unknown
344 Key management 2,491 83 Unknown Unknown
345 HTTP Public Key Pinning 2,490 83 C Mid
346 Reception and criticism of WhatsApp security and privacy features 2,489 82 C Low
347 Comparison of disk encryption software 2,477 82 List High
348 Off-the-record messaging 2,453 81 Start Unknown
349 FIPS 140-3 2,450 81 C Low
350 Authenticator 2,434 81 Start Unknown
351 Martin Hellman 2,427 80 Start High
352 Pepper (cryptography) 2,421 80 Start Low
353 Chosen-plaintext attack 2,416 80 Stub Unknown
354 Paillier cryptosystem 2,408 80 Start High
355 Opportunistic TLS 2,386 79 Start Mid
356 DES supplementary material 2,383 79 C Low
357 Trusted Computing 2,378 79 C Mid
358 Dm-crypt 2,370 79 Start Low
359 Blum Blum Shub 2,327 77 Start High
360 CBC-MAC 2,324 77 C High
361 Comparison of cryptography libraries 2,322 77 List Unknown
362 Trapdoor function 2,312 77 Start High
363 Bullrun (decryption program) 2,295 76 B Low
364 Ciphertext indistinguishability 2,279 75 C High
365 Tox (protocol) 2,266 75 C Low
366 McEliece cryptosystem 2,265 75 C High
367 ElGamal signature scheme 2,241 74 Start Top
368 Security level 2,239 74 Stub Mid
369 Double Ratchet Algorithm 2,236 74 Start Low
370 Ralph Merkle 2,233 74 C High
371 Trusted timestamping 2,228 74 Start Unknown
372 Meet-in-the-middle attack 2,216 73 C High
373 SegWit 2,204 73 Start Low
374 Advanced Encryption Standard process 2,200 73 C Mid
375 Crypto Wars 2,199 73 Start High
376 Leo Marks 2,196 73 B Unknown
377 Anonymous P2P 2,196 73 C Low
378 Poly1305 2,186 72 Start Top
379 Key disclosure law 2,159 71 C Low
380 Encryption software 2,153 71 Start Top
381 Crypt (C) 2,113 70 C High
382 Comparison of cryptographic hash functions 2,103 70 List Low
383 Lenstra elliptic-curve factorization 2,102 70 C Low
384 Comparison of TLS implementations 2,081 69 List High
385 Coppersmith's attack 2,081 69 B High
386 AES implementations 2,077 69 List Low
387 Cryptographic primitive 2,049 68 Start Top
388 Tiny Encryption Algorithm 2,046 68 Unknown Unknown
389 William F. Friedman 2,040 68 C Unknown
390 LibreSSL 2,040 68 Start High
391 Autokey cipher 2,020 67 C Mid
392 Nothing-up-my-sleeve number 2,020 67 C Low
393 MD4 2,006 66 Start Low
394 Serpent (cipher) 2,003 66 C Low
395 Enigma rotor details 2,000 66 Start Mid
396 FileVault 1,996 66 C Mid
397 Key encapsulation mechanism 1,996 66 Start High
398 One-key MAC 1,956 65 Start Low
399 Wiener's attack 1,956 65 B High
400 Cryptanalysis of the Lorenz cipher 1,927 64 C High
401 Proof of authority 1,919 63 Start Low
402 DeCSS 1,918 63 C Mid
403 NTRUEncrypt 1,916 63 C Mid
404 Orbot 1,880 62 Stub Low
405 Blind signature 1,877 62 C Mid
406 NSAKEY 1,874 62 C High
407 Tor2web 1,849 61 Start Low
408 Differential cryptanalysis 1,842 61 B High
409 Generic Security Services Application Program Interface 1,842 61 Start Low
410 International Data Encryption Algorithm 1,830 61 C Unknown
411 Jami (software) 1,830 61 Start Unknown
412 Arthur Scherbius 1,821 60 Start Mid
413 SYN cookies 1,821 60 Start Unknown
414 GNUnet 1,817 60 B Low
415 CableCARD 1,816 60 B Unknown
416 ADFGVX cipher 1,815 60 Unknown Unknown
417 Key stretching 1,808 60 Start Unknown
418 Garlic routing 1,806 60 Stub Unknown
419 Downgrade attack 1,806 60 Start Mid
420 RSA problem 1,803 60 Start Top
421 W. T. Tutte 1,796 59 C Mid
422 Simultaneous Authentication of Equals 1,796 59 Start High
423 Strong cryptography 1,794 59 Unknown Unknown
424 Hybrid cryptosystem 1,793 59 Start High
425 BLS digital signature 1,790 59 Start Mid
426 Roger Dingledine 1,787 59 Start Unknown
427 NTRU 1,776 59 C Low
428 Advanced Access Content System 1,754 58 C Mid
429 ZeroNet 1,737 57 Start Low
430 Temporal Key Integrity Protocol 1,733 57 C Low
431 A5/1 1,730 57 B High
432 Friend-to-friend 1,730 57 Start Low
433 Black Chamber 1,725 57 Unknown Unknown
434 Always-on DRM 1,725 57 Start Low
435 Bernstein v. United States 1,716 57 Start Mid
436 Red/black concept 1,713 57 Stub Unknown
437 Banburismus 1,708 56 C Low
438 UltraViolet (website) 1,700 56 C Low
439 Format-preserving encryption 1,698 56 Start High
440 Visual cryptography 1,697 56 Unknown Unknown
441 Null cipher 1,696 56 Stub Low
442 Government Communications Security Bureau 1,693 56 B Low
443 Key server (cryptographic) 1,690 56 Start Mid
444 Briar (software) 1,684 56 Start Low
445 FreeOTP 1,679 55 Start Low
446 Secret decoder ring 1,678 55 Start Low
447 Collision resistance 1,678 55 Start High
448 Challenge-Handshake Authentication Protocol 1,671 55 Start Low
449 Power analysis 1,662 55 Unknown Unknown
450 Information-theoretic security 1,655 55 Start Top
451 Integrated Encryption Scheme 1,650 55 Start Low
452 Chosen-ciphertext attack 1,648 54 Start High
453 Bitcoin Gold 1,646 54 Start Low
454 Public key fingerprint 1,642 54 Start Mid
455 Word square 1,640 54 C Low
456 Needham–Schroeder protocol 1,636 54 Start Mid
457 Coinye 1,630 54 Start Low
458 Oblivious transfer 1,626 54 Start Unknown
459 Keybase 1,625 54 Start Low
460 Rotor machine 1,621 54 Unknown Unknown
461 Shugborough inscription 1,616 53 Start Low
462 Berlekamp–Massey algorithm 1,614 53 Start Unknown
463 Open Whisper Systems 1,598 53 B Unknown
464 Taher Elgamal 1,596 53 C Unknown
465 Codebook 1,593 53 Stub Unknown
466 Interactive proof system 1,590 53 Start High
467 Hidden message 1,586 52 Start Low
468 David Wheeler (computer scientist) 1,585 52 Start Low
469 RIPEMD 1,559 51 C Unknown
470 SecureDrop 1,554 51 Start Mid
471 Supersingular isogeny key exchange 1,551 51 Start Low
472 Cryptovirology 1,526 50 Start Mid
473 Tabula recta 1,521 50 Unknown Unknown
474 Key-agreement protocol 1,502 50 Start Top
475 National Cryptologic Museum 1,499 49 C Mid
476 Random oracle 1,487 49 Start Low
477 Content Authenticity Initiative 1,470 49 C Low
478 Hash-based cryptography 1,450 48 Start Low
479 Twisted Edwards curve 1,447 48 C Low
480 SIGSALY 1,443 48 C Low
481 Michael O. Rabin 1,441 48 C Low
482 Dorabella Cipher 1,439 47 Unknown Unknown
483 Secure cryptoprocessor 1,436 47 C Mid
484 Retroshare 1,431 47 C Low
485 GOST (block cipher) 1,427 47 Start Mid
486 Mix network 1,426 47 Stub Unknown
487 Four-square cipher 1,423 47 C Unknown
488 SIGABA 1,420 47 C High
489 Perfect Dark (P2P) 1,412 47 C Low
490 Ring signature 1,407 46 Start Mid
491 Code (cryptography) 1,406 46 Start Top
492 Two-square cipher 1,404 46 Unknown Unknown
493 Kasiski examination 1,401 46 Unknown Unknown
494 Fuzzy hashing 1,401 46 C Low
495 Whirlpool (hash function) 1,390 46 Start Low
496 Identity-based encryption 1,389 46 C High
497 Content Scramble System 1,389 46 Start Mid
498 MS-CHAP 1,388 46 Start Low
499 Frank Terpil 1,381 46 Start Low
500 Pseudorandom function family 1,380 46 Start Low