Category:Cryptographic protocols
Cryptographic protocols — the communication protocols designed and available to provide computer security assurances using cryptographic mechanisms.
- Classic assurances include internet protocols for confidentiality and message integrity — and more recent research includes anonymity assurances. The term "protocol" is used in a wide sense, to include off-line arrangements such as encryption of email messages.
Subcategories
This category has the following 12 subcategories, out of 12 total.
A
- Authentication protocols (15 P)
G
- Garlic routing (3 P)
K
- Key transport protocols (4 P)
- Key-agreement protocols (14 P)
- Key-based routing (10 P)
M
- Multicast encryption (1 P)
O
S
T
Z
- Zero-knowledge protocols (6 P)
Pages in category "Cryptographic protocols"
The following 129 pages are in this category, out of 129 total. This list may not reflect recent changes.
0–9
A
B
C
D
- Datagram Transport Layer Security
- Delegated credential
- Delegated Path Discovery
- Delegated Path Validation
- Deniable authentication
- DH/DSS
- Digest access authentication
- DigiCipher 2
- Digital credential
- Distance-bounding protocol
- Distributed System Security Architecture
- DomainKeys
- DomainKeys Identified Mail
G
H
I
K
M
O
P
S
- Salted Challenge Response Authentication Mechanism
- SCVP
- Secure Communications Interoperability Protocol
- Secure copy protocol
- Secure Hypertext Transfer Protocol
- Secure multi-party computation
- Secure Neighbor Discovery
- Secure Real-time Transport Protocol
- Security Protocols Open Repository
- Shamir three-pass protocol
- Signal Protocol
- Signature Record Type Definition
- Silent Circle Instant Messaging Protocol
- Simple Authentication and Security Layer
- Simple Certificate Enrollment Protocol
- Simultaneous Authentication of Equals
- SPNEGO
- SSH File Transfer Protocol