Category:Cryptographic protocols
Cryptographic protocols — the communication protocols designed and available to provide computer security assurances using cryptographic mechanisms.
- Classic assurances include internet protocols for confidentiality and message integrity — and more recent research includes anonymity assurances. The term "protocol" is used in a wide sense, to include off-line arrangements such as encryption of email messages.
Subcategories
This category has the following 10 subcategories, out of 12 total.
(previous page) (next page)G
- Garlic routing (3 P)
K
- Key transport protocols (4 P)
- Key-agreement protocols (14 P)
- Key-based routing (10 P)
M
- Multicast encryption (1 P)
O
S
T
Z
- Zero-knowledge protocols (6 P)
Pages in category "Cryptographic protocols"
The following 101 pages are in this category, out of 129 total. This list may not reflect recent changes.
(previous page) (next page)D
G
H
I
K
M
O
P
S
- Salted Challenge Response Authentication Mechanism
- SCVP
- Secure Communications Interoperability Protocol
- Secure copy protocol
- Secure Hypertext Transfer Protocol
- Secure multi-party computation
- Secure Neighbor Discovery
- Secure Real-time Transport Protocol
- Security Protocols Open Repository
- Shamir three-pass protocol
- Signal Protocol
- Signature Record Type Definition
- Silent Circle Instant Messaging Protocol
- Simple Authentication and Security Layer
- Simple Certificate Enrollment Protocol
- Simultaneous Authentication of Equals
- SPNEGO