| Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
| 1
|
WhatsApp
|
457,426
|
15,247
|
B
|
High
|
| 2
|
Telegram (software)
|
298,646
|
9,954
|
B
|
Mid
|
| 3
|
Alan Turing
|
179,810
|
5,993
|
GA
|
Top
|
| 4
|
Bitcoin
|
150,410
|
5,013
|
B
|
High
|
| 5
|
Voynich manuscript
|
91,440
|
3,048
|
B
|
Low
|
| 6
|
Changpeng Zhao
|
72,848
|
2,428
|
Start
|
Low
|
| 7
|
Tor (network)
|
72,363
|
2,412
|
B
|
Mid
|
| 8
|
The Imitation Game
|
71,385
|
2,379
|
C
|
Mid
|
| 9
|
Cryptocurrency
|
70,950
|
2,365
|
C
|
High
|
| 10
|
WikiLeaks
|
61,280
|
2,042
|
B
|
Low
|
| 11
|
Transport Layer Security
|
53,908
|
1,796
|
B
|
Top
|
| 12
|
Blockchain
|
50,596
|
1,686
|
B
|
High
|
| 13
|
National Security Agency
|
47,701
|
1,590
|
C
|
High
|
| 14
|
Enigma machine
|
46,479
|
1,549
|
C
|
High
|
| 15
|
HTTPS
|
45,790
|
1,526
|
C
|
High
|
| 16
|
Digital rights management
|
45,140
|
1,504
|
C
|
High
|
| 17
|
History of bitcoin
|
42,909
|
1,430
|
B
|
Low
|
| 18
|
Secure Shell
|
40,474
|
1,349
|
C
|
High
|
| 19
|
RSA cryptosystem
|
40,316
|
1,343
|
C
|
Top
|
| 20
|
Virtual private network
|
37,753
|
1,258
|
C
|
Mid
|
| 21
|
Signal (software)
|
36,083
|
1,202
|
C
|
Mid
|
| 22
|
Advanced Encryption Standard
|
35,339
|
1,177
|
B
|
Top
|
| 23
|
Diffie–Hellman key exchange
|
33,848
|
1,128
|
C
|
Top
|
| 24
|
Kryptos
|
33,698
|
1,123
|
C
|
Low
|
| 25
|
Vitalik Buterin
|
33,327
|
1,110
|
C
|
Low
|
| 26
|
HTTP Strict Transport Security
|
31,454
|
1,048
|
C
|
Low
|
| 27
|
Cryptography
|
30,825
|
1,027
|
C
|
Top
|
| 28
|
Zcash
|
30,327
|
1,010
|
Start
|
Low
|
| 29
|
SHA-2
|
29,835
|
994
|
C
|
Top
|
| 30
|
Proton Mail
|
28,643
|
954
|
C
|
Low
|
| 31
|
Letter frequency
|
28,165
|
938
|
B
|
Low
|
| 32
|
Vault 7
|
27,320
|
910
|
C
|
Mid
|
| 33
|
Caesar cipher
|
26,983
|
899
|
FA
|
High
|
| 34
|
Dogecoin
|
26,792
|
893
|
C
|
Low
|
| 35
|
Darknet market
|
26,487
|
882
|
B
|
Mid
|
| 36
|
Lavarand
|
25,509
|
850
|
B
|
Mid
|
| 37
|
Claude Shannon
|
25,089
|
836
|
C
|
Top
|
| 38
|
Zimmermann telegram
|
24,351
|
811
|
B
|
High
|
| 39
|
Code talker
|
24,319
|
810
|
B
|
Low
|
| 40
|
Vigenère cipher
|
24,254
|
808
|
B
|
Low
|
| 41
|
Post-quantum cryptography
|
23,512
|
783
|
C
|
High
|
| 42
|
Password
|
23,429
|
780
|
C
|
Top
|
| 43
|
Zero-knowledge proof
|
22,695
|
756
|
C
|
Top
|
| 44
|
Public-key cryptography
|
22,077
|
735
|
C
|
Top
|
| 45
|
Block cipher mode of operation
|
22,056
|
735
|
C
|
Top
|
| 46
|
GCHQ
|
21,067
|
702
|
B
|
Low
|
| 47
|
Information theory
|
20,271
|
675
|
B
|
Top
|
| 48
|
Man-in-the-middle attack
|
19,836
|
661
|
C
|
Mid
|
| 49
|
One-time password
|
19,643
|
654
|
B
|
Mid
|
| 50
|
Trusted Platform Module
|
19,541
|
651
|
C
|
Mid
|
| 51
|
Bletchley Park
|
19,316
|
643
|
B
|
High
|
| 52
|
Merkle tree
|
19,236
|
641
|
C
|
Mid
|
| 53
|
NordVPN
|
18,725
|
624
|
C
|
Mid
|
| 54
|
MD5
|
18,695
|
623
|
C
|
Top
|
| 55
|
Sator Square
|
18,671
|
622
|
B
|
Low
|
| 56
|
Joan Clarke
|
18,598
|
619
|
C
|
Mid
|
| 57
|
HMAC
|
18,098
|
603
|
C
|
High
|
| 58
|
Knapsack problem
|
17,661
|
588
|
C
|
Mid
|
| 59
|
ROT13
|
17,278
|
575
|
C
|
Mid
|
| 60
|
Steganography
|
17,125
|
570
|
C
|
High
|
| 61
|
Pretty Good Privacy
|
16,765
|
558
|
B
|
High
|
| 62
|
Cryptographic hash function
|
16,187
|
539
|
C
|
Top
|
| 63
|
Elliptic-curve cryptography
|
15,895
|
529
|
C
|
High
|
| 64
|
Adam Back
|
15,571
|
519
|
C
|
Low
|
| 65
|
Cipher
|
15,211
|
507
|
C
|
Top
|
| 66
|
Bitwarden
|
14,944
|
498
|
C
|
Low
|
| 67
|
Digital signature
|
14,682
|
489
|
C
|
Top
|
| 68
|
Encryption
|
14,579
|
485
|
C
|
Top
|
| 69
|
One-time pad
|
14,134
|
471
|
C
|
Top
|
| 70
|
Cryptanalysis of the Enigma
|
13,878
|
462
|
C
|
Mid
|
| 71
|
Rainbow table
|
13,831
|
461
|
C
|
High
|
| 72
|
Grover's algorithm
|
13,823
|
460
|
C
|
Mid
|
| 73
|
OpenVPN
|
13,806
|
460
|
C
|
Mid
|
| 74
|
SHA-1
|
13,787
|
459
|
C
|
Top
|
| 75
|
Password manager
|
13,255
|
441
|
C
|
Low
|
| 76
|
Babington Plot
|
13,225
|
440
|
C
|
Low
|
| 77
|
Certificate authority
|
13,088
|
436
|
C
|
High
|
| 78
|
Wi-Fi Protected Access
|
12,312
|
410
|
C
|
Mid
|
| 79
|
Information security
|
11,963
|
398
|
B
|
Top
|
| 80
|
Kerberos (protocol)
|
11,929
|
397
|
C
|
High
|
| 81
|
Litecoin
|
11,762
|
392
|
Start
|
Low
|
| 82
|
Mullvad
|
11,621
|
387
|
Start
|
Low
|
| 83
|
Public key certificate
|
11,180
|
372
|
C
|
Top
|
| 84
|
Tails (operating system)
|
11,175
|
372
|
Start
|
Low
|
| 85
|
Active Directory
|
11,148
|
371
|
C
|
Low
|
| 86
|
Bombe
|
10,755
|
358
|
B
|
Mid
|
| 87
|
Automatic Certificate Management Environment
|
10,745
|
358
|
Start
|
Low
|
| 88
|
Decentralized finance
|
10,701
|
356
|
Start
|
Low
|
| 89
|
Homomorphic encryption
|
10,516
|
350
|
C
|
High
|
| 90
|
Mersenne Twister
|
10,418
|
347
|
C
|
Low
|
| 91
|
Brute-force attack
|
10,095
|
336
|
C
|
High
|
| 92
|
Galois/Counter Mode
|
10,069
|
335
|
C
|
Mid
|
| 93
|
Bcrypt
|
10,053
|
335
|
C
|
Mid
|
| 94
|
.onion
|
9,966
|
332
|
C
|
Low
|
| 95
|
Colossus computer
|
9,729
|
324
|
B
|
Mid
|
| 96
|
Elliptic Curve Digital Signature Algorithm
|
9,626
|
320
|
C
|
High
|
| 97
|
Public key infrastructure
|
9,612
|
320
|
C
|
Top
|
| 98
|
VeraCrypt
|
9,572
|
319
|
C
|
Mid
|
| 99
|
Shamir's secret sharing
|
9,485
|
316
|
C
|
High
|
| 100
|
KeePass
|
9,389
|
312
|
C
|
Low
|
| 101
|
Ultra (cryptography)
|
9,291
|
309
|
C
|
High
|
| 102
|
Salt (cryptography)
|
9,192
|
306
|
Start
|
High
|
| 103
|
Substitution cipher
|
9,126
|
304
|
C
|
Low
|
| 104
|
SHA-3
|
9,087
|
302
|
C
|
Mid
|
| 105
|
SSH File Transfer Protocol
|
8,971
|
299
|
C
|
Low
|
| 106
|
Alice and Bob
|
8,816
|
293
|
Start
|
High
|
| 107
|
Phone hacking
|
8,715
|
290
|
Start
|
Mid
|
| 108
|
Data Encryption Standard
|
8,713
|
290
|
C
|
Top
|
| 109
|
End-to-end encryption
|
8,603
|
286
|
C
|
High
|
| 110
|
Integer factorization
|
8,532
|
284
|
B
|
Mid
|
| 111
|
Secure Hash Algorithms
|
8,482
|
282
|
Start
|
High
|
| 112
|
Pay television
|
8,464
|
282
|
Start
|
Unknown
|
| 113
|
OpenSSL
|
8,441
|
281
|
B
|
High
|
| 114
|
Cypherpunk
|
8,298
|
276
|
C
|
Mid
|
| 115
|
Matrix (protocol)
|
8,216
|
273
|
B
|
Unknown
|
| 116
|
I2P
|
8,105
|
270
|
B
|
Low
|
| 117
|
ChaCha20-Poly1305
|
8,080
|
269
|
C
|
Low
|
| 118
|
Authentication
|
8,069
|
268
|
C
|
High
|
| 119
|
InterPlanetary File System
|
8,064
|
268
|
C
|
Low
|
| 120
|
Keygen
|
7,809
|
260
|
C
|
Low
|
| 121
|
Forward secrecy
|
7,772
|
259
|
C
|
High
|
| 122
|
EdDSA
|
7,579
|
252
|
C
|
High
|
| 123
|
Hashcash
|
7,564
|
252
|
Start
|
Unknown
|
| 124
|
Cryptonomicon
|
7,473
|
249
|
C
|
Low
|
| 125
|
Proof of stake
|
7,458
|
248
|
C
|
Low
|
| 126
|
Fort Meade
|
7,422
|
247
|
C
|
Low
|
| 127
|
Qubes OS
|
7,402
|
246
|
C
|
Mid
|
| 128
|
Threema
|
7,323
|
244
|
C
|
Unknown
|
| 129
|
Quantum key distribution
|
7,314
|
243
|
B
|
Mid
|
| 130
|
PBKDF2
|
7,219
|
240
|
C
|
Low
|
| 131
|
Differential privacy
|
7,211
|
240
|
C
|
Mid
|
| 132
|
Argon2
|
7,111
|
237
|
C
|
Mid
|
| 133
|
Apple–FBI encryption dispute
|
7,016
|
233
|
C
|
Low
|
| 134
|
Curve25519
|
7,000
|
233
|
C
|
High
|
| 135
|
Comparison of BitTorrent clients
|
6,955
|
231
|
List
|
Low
|
| 136
|
Theoretical computer science
|
6,942
|
231
|
B
|
Low
|
| 137
|
Elliptic-curve Diffie–Hellman
|
6,887
|
229
|
Start
|
Mid
|
| 138
|
Cryptographic nonce
|
6,725
|
224
|
Start
|
High
|
| 139
|
Link 16
|
6,708
|
223
|
Start
|
Low
|
| 140
|
Symmetric-key algorithm
|
6,705
|
223
|
Start
|
Top
|
| 141
|
Message authentication code
|
6,628
|
220
|
C
|
Top
|
| 142
|
Authenticated encryption
|
6,573
|
219
|
C
|
Mid
|
| 143
|
The Tor Project
|
6,553
|
218
|
C
|
Mid
|
| 144
|
Beale ciphers
|
6,527
|
217
|
B
|
Low
|
| 145
|
IMSI-catcher
|
6,525
|
217
|
Start
|
Mid
|
| 146
|
Cryptanalysis
|
6,481
|
216
|
C
|
High
|
| 147
|
Bitcoin Cash
|
6,314
|
210
|
Start
|
Low
|
| 148
|
Playfair cipher
|
6,312
|
210
|
Unknown
|
Unknown
|
| 149
|
Commitment scheme
|
6,240
|
208
|
C
|
High
|
| 150
|
Salsa20
|
6,138
|
204
|
C
|
Top
|
| 151
|
Len Sassaman
|
6,069
|
202
|
C
|
Unknown
|
| 152
|
Bitconnect
|
6,068
|
202
|
C
|
Low
|
| 153
|
Hyphanet
|
6,055
|
201
|
B
|
Mid
|
| 154
|
Daniel J. Bernstein
|
6,055
|
201
|
C
|
Mid
|
| 155
|
KeePassXC
|
5,995
|
199
|
Start
|
Low
|
| 156
|
Crypto AG
|
5,849
|
194
|
C
|
High
|
| 157
|
Signal Protocol
|
5,834
|
194
|
C
|
High
|
| 158
|
Birthday attack
|
5,822
|
194
|
C
|
High
|
| 159
|
Harvest now, decrypt later
|
5,788
|
192
|
Start
|
Low
|
| 160
|
Keychain (software)
|
5,784
|
192
|
Start
|
Unknown
|
| 161
|
Password cracking
|
5,754
|
191
|
C
|
Mid
|
| 162
|
Discrete logarithm
|
5,645
|
188
|
C
|
Mid
|
| 163
|
Lorenz cipher
|
5,431
|
181
|
C
|
Top
|
| 164
|
Quantum cryptography
|
5,406
|
180
|
C
|
High
|
| 165
|
Transposition cipher
|
5,337
|
177
|
Unknown
|
Unknown
|
| 166
|
RC4
|
5,316
|
177
|
B
|
Top
|
| 167
|
Illegal number
|
5,301
|
176
|
C
|
Low
|
| 168
|
DNS Certification Authority Authorization
|
5,274
|
175
|
GA
|
Low
|
| 169
|
Units of information
|
5,230
|
174
|
C
|
Unknown
|
| 170
|
Session (software)
|
5,221
|
174
|
Start
|
Low
|
| 171
|
Cryptographically secure pseudorandom number generator
|
5,170
|
172
|
C
|
Top
|
| 172
|
Shiba Inu (cryptocurrency)
|
5,087
|
169
|
Start
|
Low
|
| 173
|
Side-channel attack
|
5,038
|
167
|
C
|
High
|
| 174
|
Zerocoin protocol
|
4,988
|
166
|
C
|
Low
|
| 175
|
PKCS 12
|
4,858
|
161
|
Start
|
Low
|
| 176
|
Lattice-based cryptography
|
4,842
|
161
|
Start
|
Low
|
| 177
|
Key derivation function
|
4,793
|
159
|
C
|
Low
|
| 178
|
Kerckhoffs's principle
|
4,791
|
159
|
Start
|
Mid
|
| 179
|
Citizenfour
|
4,742
|
158
|
C
|
Low
|
| 180
|
Padding oracle attack
|
4,735
|
157
|
Start
|
Low
|
| 181
|
Adi Shamir
|
4,734
|
157
|
C
|
Unknown
|
| 182
|
GNU Privacy Guard
|
4,674
|
155
|
C
|
Unknown
|
| 183
|
BLAKE (hash function)
|
4,671
|
155
|
C
|
Mid
|
| 184
|
Password strength
|
4,628
|
154
|
C
|
High
|
| 185
|
Mutual authentication
|
4,568
|
152
|
Stub
|
Low
|
| 186
|
Dual EC DRBG
|
4,554
|
151
|
C
|
High
|
| 187
|
Conel Hugh O'Donel Alexander
|
4,496
|
149
|
Start
|
Low
|
| 188
|
3-D Secure
|
4,481
|
149
|
C
|
Low
|
| 189
|
Twofish
|
4,442
|
148
|
Start
|
High
|
| 190
|
Certificate signing request
|
4,430
|
147
|
C
|
Low
|
| 191
|
Polkadot (blockchain platform)
|
4,415
|
147
|
Start
|
Low
|
| 192
|
Ricky McCormick's encrypted notes
|
4,378
|
145
|
B
|
Low
|
| 193
|
Cryptogram
|
4,365
|
145
|
C
|
Mid
|
| 194
|
11B-X-1371
|
4,353
|
145
|
GA
|
Low
|
| 195
|
Triple DES
|
4,313
|
143
|
Start
|
Unknown
|
| 196
|
Block cipher
|
4,248
|
141
|
C
|
Top
|
| 197
|
Digital renminbi
|
4,245
|
141
|
B
|
High
|
| 198
|
Utah Data Center
|
4,240
|
141
|
C
|
Mid
|
| 199
|
Digital Signature Algorithm
|
4,119
|
137
|
C
|
Top
|
| 200
|
Marian Rejewski
|
4,111
|
137
|
FA
|
Mid
|
| 201
|
ElGamal encryption
|
4,083
|
136
|
Start
|
Top
|
| 202
|
Known-plaintext attack
|
4,032
|
134
|
Start
|
High
|
| 203
|
Polybius square
|
4,030
|
134
|
Start
|
Mid
|
| 204
|
Secure multi-party computation
|
4,021
|
134
|
Start
|
High
|
| 205
|
Communications Security Establishment
|
3,964
|
132
|
C
|
Mid
|
| 206
|
Clipper chip
|
3,963
|
132
|
C
|
High
|
| 207
|
Bruce Schneier
|
3,936
|
131
|
Start
|
High
|
| 208
|
Bacon's cipher
|
3,917
|
130
|
Start
|
Low
|
| 209
|
David Chaum
|
3,904
|
130
|
C
|
Low
|
| 210
|
OpenSSH
|
3,877
|
129
|
C
|
High
|
| 211
|
Blowfish (cipher)
|
3,865
|
128
|
B
|
High
|
| 212
|
FIPS 140-2
|
3,839
|
127
|
C
|
Mid
|
| 213
|
Tap code
|
3,819
|
127
|
Start
|
Low
|
| 214
|
Richard Teng
|
3,817
|
127
|
Start
|
Low
|
| 215
|
XOR cipher
|
3,802
|
126
|
Stub
|
Mid
|
| 216
|
Replay attack
|
3,799
|
126
|
C
|
Top
|
| 217
|
Padding (cryptography)
|
3,775
|
125
|
Start
|
Unknown
|
| 218
|
Wired Equivalent Privacy
|
3,769
|
125
|
C
|
Mid
|
| 219
|
The Doughnut
|
3,737
|
124
|
GA
|
High
|
| 220
|
RSA Factoring Challenge
|
3,722
|
124
|
Start
|
Low
|
| 221
|
List of bitcoin forks
|
3,722
|
124
|
List
|
Low
|
| 222
|
Bitcoin Core
|
3,713
|
123
|
Start
|
Low
|
| 223
|
Cipher suite
|
3,691
|
123
|
C
|
Top
|
| 224
|
Quantum network
|
3,671
|
122
|
C
|
Low
|
| 225
|
RSA Security
|
3,612
|
120
|
C
|
Unknown
|
| 226
|
Initialization vector
|
3,592
|
119
|
C
|
High
|
| 227
|
NSAKEY
|
3,581
|
119
|
C
|
High
|
| 228
|
Digest access authentication
|
3,579
|
119
|
B
|
Low
|
| 229
|
Dilly Knox
|
3,567
|
118
|
B
|
Unknown
|
| 230
|
Key (cryptography)
|
3,562
|
118
|
Start
|
Unknown
|
| 231
|
Certificate revocation list
|
3,512
|
117
|
C
|
Low
|
| 232
|
Stream cipher
|
3,488
|
116
|
Start
|
Top
|
| 233
|
Timing attack
|
3,484
|
116
|
C
|
High
|
| 234
|
Boolean function
|
3,467
|
115
|
Start
|
Mid
|
| 235
|
Diplomatic bag
|
3,457
|
115
|
Start
|
Low
|
| 236
|
Rijndael S-box
|
3,423
|
114
|
Start
|
Low
|
| 237
|
NIST Post-Quantum Cryptography Standardization
|
3,419
|
113
|
C
|
Mid
|
| 238
|
Deniable encryption
|
3,409
|
113
|
Start
|
High
|
| 239
|
Datagram Transport Layer Security
|
3,398
|
113
|
C
|
Mid
|
| 240
|
Type B Cipher Machine
|
3,376
|
112
|
Start
|
Low
|
| 241
|
Cold boot attack
|
3,355
|
111
|
C
|
Low
|
| 242
|
Atbash
|
3,321
|
110
|
Stub
|
Low
|
| 243
|
Confidentiality
|
3,310
|
110
|
C
|
Low
|
| 244
|
Peter Todd (programmer)
|
3,300
|
110
|
Start
|
Unknown
|
| 245
|
Supply chain attack
|
3,263
|
108
|
C
|
Low
|
| 246
|
Privacy-Enhanced Mail
|
3,236
|
107
|
Start
|
Low
|
| 247
|
Web of trust
|
3,221
|
107
|
C
|
High
|
| 248
|
AES instruction set
|
3,216
|
107
|
C
|
Low
|
| 249
|
History of cryptography
|
3,207
|
106
|
C
|
High
|
| 250
|
Bomba (cryptography)
|
3,198
|
106
|
Start
|
Low
|
| 251
|
Frequency analysis
|
3,187
|
106
|
C
|
High
|
| 252
|
Feistel cipher
|
3,186
|
106
|
Start
|
Unknown
|
| 253
|
BB84
|
3,182
|
106
|
Start
|
Low
|
| 254
|
Ciphertext
|
3,166
|
105
|
Start
|
High
|
| 255
|
Fork (blockchain)
|
3,160
|
105
|
Start
|
Mid
|
| 256
|
List of ciphertexts
|
3,159
|
105
|
List
|
Low
|
| 257
|
Coppersmith's attack
|
3,156
|
105
|
B
|
High
|
| 258
|
TrueCrypt
|
3,107
|
103
|
C
|
Mid
|
| 259
|
Root certificate
|
3,076
|
102
|
Start
|
Low
|
| 260
|
Whonix
|
3,038
|
101
|
Start
|
Mid
|
| 261
|
Roger Dingledine
|
2,999
|
99
|
Start
|
Unknown
|
| 262
|
Polyalphabetic cipher
|
2,961
|
98
|
Start
|
Unknown
|
| 263
|
Filecoin
|
2,893
|
96
|
Start
|
Low
|
| 264
|
Whitfield Diffie
|
2,883
|
96
|
B
|
High
|
| 265
|
Australian Signals Directorate
|
2,874
|
95
|
C
|
Low
|
| 266
|
Self-signed certificate
|
2,871
|
95
|
Start
|
Unknown
|
| 267
|
PKCS
|
2,863
|
95
|
List
|
High
|
| 268
|
Rail fence cipher
|
2,858
|
95
|
Start
|
Low
|
| 269
|
Key exchange
|
2,855
|
95
|
Start
|
Unknown
|
| 270
|
K-anonymity
|
2,852
|
95
|
Start
|
Mid
|
| 271
|
Hill cipher
|
2,840
|
94
|
Unknown
|
Unknown
|
| 272
|
Jami (software)
|
2,839
|
94
|
Start
|
Unknown
|
| 273
|
Elizebeth Smith Friedman
|
2,828
|
94
|
C
|
Mid
|
| 274
|
Enigmail
|
2,784
|
92
|
Stub
|
Low
|
| 275
|
Book cipher
|
2,772
|
92
|
C
|
Low
|
| 276
|
Certificate Transparency
|
2,769
|
92
|
C
|
High
|
| 277
|
Cryptogram of Olivier Levasseur
|
2,766
|
92
|
Start
|
Unknown
|
| 278
|
SipHash
|
2,765
|
92
|
Start
|
Low
|
| 279
|
Electronic signature
|
2,759
|
91
|
C
|
Low
|
| 280
|
Crypto-anarchy
|
2,739
|
91
|
Start
|
High
|
| 281
|
One-way function
|
2,731
|
91
|
Start
|
Top
|
| 282
|
Merkle–Damgård construction
|
2,718
|
90
|
C
|
Unknown
|
| 283
|
Bitcoin scalability problem
|
2,705
|
90
|
C
|
Low
|
| 284
|
Digital watermarking
|
2,701
|
90
|
B
|
Mid
|
| 285
|
Cryptocurrency tumbler
|
2,688
|
89
|
Start
|
Unknown
|
| 286
|
Non-interactive zero-knowledge proof
|
2,680
|
89
|
Start
|
Low
|
| 287
|
Briar (software)
|
2,668
|
88
|
Start
|
Low
|
| 288
|
Challenge–response authentication
|
2,652
|
88
|
Start
|
Mid
|
| 289
|
HKDF
|
2,642
|
88
|
Start
|
Unknown
|
| 290
|
PKCS 11
|
2,627
|
87
|
Start
|
Low
|
| 291
|
Key encapsulation mechanism
|
2,580
|
86
|
Start
|
High
|
| 292
|
RSA SecurID
|
2,579
|
85
|
C
|
Low
|
| 293
|
Special Collection Service
|
2,559
|
85
|
C
|
Low
|
| 294
|
Alastair Denniston
|
2,521
|
84
|
Start
|
Unknown
|
| 295
|
Proton Drive
|
2,516
|
83
|
Start
|
Low
|
| 296
|
Non-repudiation
|
2,479
|
82
|
Start
|
Mid
|
| 297
|
Length extension attack
|
2,476
|
82
|
Start
|
Unknown
|
| 298
|
AES key schedule
|
2,452
|
81
|
Start
|
Low
|
| 299
|
Dictionary attack
|
2,444
|
81
|
C
|
Unknown
|
| 300
|
Collision attack
|
2,443
|
81
|
Start
|
High
|
| 301
|
Elliptic curve point multiplication
|
2,410
|
80
|
C
|
Mid
|
| 302
|
W. T. Tutte
|
2,406
|
80
|
C
|
Mid
|
| 303
|
I. J. Good
|
2,405
|
80
|
C
|
Low
|
| 304
|
Schnorr signature
|
2,399
|
79
|
C
|
High
|
| 305
|
Plaintext
|
2,371
|
79
|
Start
|
High
|
| 306
|
Algorand
|
2,360
|
78
|
B
|
Low
|
| 307
|
Copiale cipher
|
2,352
|
78
|
Start
|
Low
|
| 308
|
Crypto Wars
|
2,319
|
77
|
Start
|
High
|
| 309
|
Phil Zimmermann
|
2,318
|
77
|
Start
|
Mid
|
| 310
|
Charlie Lee (computer scientist)
|
2,307
|
76
|
Start
|
Low
|
| 311
|
PKCS 7
|
2,302
|
76
|
Start
|
Low
|
| 312
|
Disk encryption theory
|
2,300
|
76
|
C
|
Unknown
|
| 313
|
Martin Hellman
|
2,262
|
75
|
Start
|
High
|
| 314
|
Double Ratchet Algorithm
|
2,260
|
75
|
Start
|
Low
|
| 315
|
Optimal asymmetric encryption padding
|
2,210
|
73
|
Start
|
High
|
| 316
|
Magic (cryptography)
|
2,208
|
73
|
Start
|
Unknown
|
| 317
|
Format-preserving encryption
|
2,195
|
73
|
Start
|
High
|
| 318
|
Gordon Welchman
|
2,189
|
72
|
C
|
Low
|
| 319
|
PKCS 1
|
2,187
|
72
|
C
|
Mid
|
| 320
|
Hash chain
|
2,162
|
72
|
Start
|
Unknown
|
| 321
|
Key size
|
2,158
|
71
|
C
|
High
|
| 322
|
Orbot
|
2,155
|
71
|
Stub
|
Low
|
| 323
|
DNS-based Authentication of Named Entities
|
2,145
|
71
|
C
|
Mid
|
| 324
|
Ciphertext indistinguishability
|
2,135
|
71
|
C
|
High
|
| 325
|
Preimage attack
|
2,126
|
70
|
Stub
|
Unknown
|
| 326
|
Blockchain game
|
2,121
|
70
|
Start
|
Low
|
| 327
|
Export of cryptography from the United States
|
2,119
|
70
|
C
|
Unknown
|
| 328
|
William F. Friedman
|
2,099
|
69
|
Start
|
Unknown
|
| 329
|
FIPS 140-3
|
2,098
|
69
|
C
|
Low
|
| 330
|
Tox (protocol)
|
2,091
|
69
|
C
|
Low
|
| 331
|
Directory service
|
2,085
|
69
|
Start
|
Mid
|
| 332
|
Ralph Merkle
|
2,075
|
69
|
C
|
High
|
| 333
|
Affine cipher
|
2,059
|
68
|
C
|
Low
|
| 334
|
Bullrun (decryption program)
|
2,058
|
68
|
B
|
Low
|
| 335
|
Reception and criticism of WhatsApp security and privacy features
|
2,054
|
68
|
C
|
Low
|
| 336
|
Pepper (cryptography)
|
2,042
|
68
|
Start
|
Low
|
| 337
|
ADFGVX cipher
|
2,020
|
67
|
Unknown
|
Unknown
|
| 338
|
Comparison of disk encryption software
|
2,011
|
67
|
List
|
High
|
| 339
|
Mumble (software)
|
2,001
|
66
|
C
|
Unknown
|
| 340
|
FIPS 140
|
1,997
|
66
|
Start
|
Mid
|
| 341
|
Cryptomator
|
1,989
|
66
|
C
|
Unknown
|
| 342
|
S-box
|
1,981
|
66
|
Start
|
Top
|
| 343
|
Trusted Computing
|
1,968
|
65
|
C
|
Mid
|
| 344
|
Women in Bletchley Park
|
1,947
|
64
|
C
|
Unknown
|
| 345
|
CBC-MAC
|
1,933
|
64
|
C
|
High
|
| 346
|
Content Authenticity Initiative
|
1,916
|
63
|
C
|
Low
|
| 347
|
Bitcoin Satoshi Vision
|
1,905
|
63
|
Start
|
Low
|
| 348
|
Communications security
|
1,898
|
63
|
Start
|
Mid
|
| 349
|
Off-the-record messaging
|
1,897
|
63
|
Start
|
Unknown
|
| 350
|
Physical unclonable function
|
1,888
|
62
|
Start
|
Unknown
|
| 351
|
Black Chamber
|
1,870
|
62
|
Unknown
|
Unknown
|
| 352
|
WebTorrent
|
1,869
|
62
|
Start
|
Unknown
|
| 353
|
Disk encryption
|
1,858
|
61
|
C
|
High
|
| 354
|
Entrust
|
1,857
|
61
|
Start
|
Low
|
| 355
|
Avalanche effect
|
1,848
|
61
|
Start
|
High
|
| 356
|
Retroshare
|
1,832
|
61
|
C
|
Low
|
| 357
|
Bernstein v. United States
|
1,821
|
60
|
Start
|
Mid
|
| 358
|
Opportunistic TLS
|
1,820
|
60
|
Start
|
Mid
|
| 359
|
Berlekamp–Massey algorithm
|
1,816
|
60
|
Start
|
Unknown
|
| 360
|
Comparison of SSH clients
|
1,806
|
60
|
List
|
Low
|
| 361
|
SegWit
|
1,796
|
59
|
C
|
Low
|
| 362
|
Code signing
|
1,791
|
59
|
C
|
Low
|
| 363
|
Arthur Scherbius
|
1,786
|
59
|
Start
|
Mid
|
| 364
|
Authenticator
|
1,778
|
59
|
B
|
Low
|
| 365
|
William Binney (intelligence official)
|
1,775
|
59
|
C
|
Mid
|
| 366
|
Diehard tests
|
1,768
|
58
|
C
|
Low
|
| 367
|
Scrambler
|
1,764
|
58
|
C
|
Unknown
|
| 368
|
C-36 (cipher machine)
|
1,749
|
58
|
Start
|
Low
|
| 369
|
UltraViolet (website)
|
1,722
|
57
|
C
|
Low
|
| 370
|
Trapdoor function
|
1,719
|
57
|
Start
|
High
|
| 371
|
Secret sharing
|
1,708
|
56
|
C
|
High
|
| 372
|
Dm-crypt
|
1,705
|
56
|
Start
|
Low
|
| 373
|
Cryptographic protocol
|
1,702
|
56
|
Start
|
High
|
| 374
|
Cryptanalysis of the Lorenz cipher
|
1,698
|
56
|
C
|
High
|
| 375
|
Leo Marks
|
1,692
|
56
|
B
|
Unknown
|
| 376
|
The Code Book
|
1,687
|
56
|
Start
|
Low
|
| 377
|
Chosen-plaintext attack
|
1,682
|
56
|
Stub
|
Unknown
|
| 378
|
Shugborough inscription
|
1,682
|
56
|
Start
|
Low
|
| 379
|
Lenstra elliptic-curve factorization
|
1,681
|
56
|
C
|
Low
|
| 380
|
Bouncy Castle (cryptography)
|
1,680
|
56
|
Start
|
Unknown
|
| 381
|
Baby-step giant-step
|
1,675
|
55
|
C
|
Unknown
|
| 382
|
Anonymous P2P
|
1,667
|
55
|
C
|
Low
|
| 383
|
Cryptographic Message Syntax
|
1,646
|
54
|
Stub
|
Mid
|
| 384
|
Secret decoder ring
|
1,641
|
54
|
Start
|
Low
|
| 385
|
Cryptographic primitive
|
1,625
|
54
|
Start
|
Top
|
| 386
|
Enigma rotor details
|
1,622
|
54
|
Start
|
Mid
|
| 387
|
SIGABA
|
1,620
|
54
|
C
|
High
|
| 388
|
IEEE 802.11i-2004
|
1,618
|
53
|
C
|
Mid
|
| 389
|
BTCC (company)
|
1,617
|
53
|
Start
|
Low
|
| 390
|
Key stretching
|
1,615
|
53
|
Start
|
Unknown
|
| 391
|
Kasiski examination
|
1,614
|
53
|
Unknown
|
Unknown
|
| 392
|
Secure cryptoprocessor
|
1,593
|
53
|
C
|
Mid
|
| 393
|
Two-square cipher
|
1,587
|
52
|
Start
|
Unknown
|
| 394
|
Interactive proof system
|
1,580
|
52
|
Start
|
High
|
| 395
|
Data anonymization
|
1,569
|
52
|
Start
|
Mid
|
| 396
|
Blum Blum Shub
|
1,536
|
51
|
C
|
High
|
| 397
|
CCM mode
|
1,528
|
50
|
Start
|
High
|
| 398
|
Tabula recta
|
1,522
|
50
|
Unknown
|
Unknown
|
| 399
|
HTTP Public Key Pinning
|
1,520
|
50
|
C
|
Mid
|
| 400
|
Nothing-up-my-sleeve number
|
1,518
|
50
|
C
|
Low
|
| 401
|
PKCS 8
|
1,513
|
50
|
Stub
|
Unknown
|
| 402
|
Autokey cipher
|
1,504
|
50
|
C
|
Mid
|
| 403
|
Information-theoretic security
|
1,502
|
50
|
Start
|
Top
|
| 404
|
Classical cipher
|
1,498
|
49
|
Start
|
Top
|
| 405
|
Crypt (C)
|
1,498
|
49
|
C
|
High
|
| 406
|
ZeroNet
|
1,496
|
49
|
Start
|
Low
|
| 407
|
Comparison of cryptography libraries
|
1,478
|
49
|
List
|
Unknown
|
| 408
|
Poly1305
|
1,469
|
48
|
Start
|
Top
|
| 409
|
Multiple encryption
|
1,453
|
48
|
Unknown
|
Unknown
|
| 410
|
Meet-in-the-middle attack
|
1,452
|
48
|
C
|
High
|
| 411
|
BLS digital signature
|
1,452
|
48
|
Start
|
Mid
|
| 412
|
Clock drift
|
1,439
|
47
|
C
|
Low
|
| 413
|
Taher Elgamal
|
1,438
|
47
|
C
|
Unknown
|
| 414
|
McEliece cryptosystem
|
1,434
|
47
|
C
|
High
|
| 415
|
Comparison of TLS implementations
|
1,420
|
47
|
List
|
High
|
| 416
|
Michael O. Rabin
|
1,419
|
47
|
C
|
Low
|
| 417
|
David Wheeler (computer scientist)
|
1,414
|
47
|
C
|
Low
|
| 418
|
Pre-shared key
|
1,414
|
47
|
Start
|
Mid
|
| 419
|
Integer factorization records
|
1,409
|
46
|
Start
|
Unknown
|
| 420
|
A5/1
|
1,407
|
46
|
B
|
High
|
| 421
|
Robert Morris (cryptographer)
|
1,399
|
46
|
Stub
|
Low
|
| 422
|
Confusion and diffusion
|
1,397
|
46
|
Start
|
Mid
|
| 423
|
SIGSALY
|
1,397
|
46
|
C
|
Low
|
| 424
|
DeCSS
|
1,393
|
46
|
C
|
Mid
|
| 425
|
Paillier cryptosystem
|
1,393
|
46
|
Start
|
High
|
| 426
|
Red/black concept
|
1,393
|
46
|
Stub
|
Unknown
|
| 427
|
Musical cryptogram
|
1,391
|
46
|
C
|
Low
|
| 428
|
Snake oil (cryptography)
|
1,388
|
46
|
Unknown
|
Unknown
|
| 429
|
Advanced Access Content System
|
1,386
|
46
|
C
|
Mid
|
| 430
|
Dorabella Cipher
|
1,382
|
46
|
Unknown
|
Unknown
|
| 431
|
Encrypting File System
|
1,371
|
45
|
B
|
Unknown
|
| 432
|
Differential cryptanalysis
|
1,368
|
45
|
B
|
High
|
| 433
|
Operation Rubicon
|
1,367
|
45
|
C
|
Low
|
| 434
|
Content Scramble System
|
1,364
|
45
|
Start
|
Mid
|
| 435
|
Guardian Project (software)
|
1,362
|
45
|
Start
|
Mid
|
| 436
|
Trusted timestamping
|
1,360
|
45
|
Start
|
Unknown
|
| 437
|
Null cipher
|
1,355
|
45
|
Stub
|
Low
|
| 438
|
Boris Hagelin
|
1,350
|
45
|
Start
|
Mid
|
| 439
|
FreeOTP
|
1,343
|
44
|
Start
|
Low
|
| 440
|
Security level
|
1,343
|
44
|
Stub
|
Mid
|
| 441
|
Always-on DRM
|
1,342
|
44
|
Start
|
Low
|
| 442
|
Bitcoin Gold
|
1,341
|
44
|
Start
|
Low
|
| 443
|
Jefferson disk
|
1,328
|
44
|
Start
|
Unknown
|
| 444
|
Blind signature
|
1,327
|
44
|
C
|
Mid
|
| 445
|
DES supplementary material
|
1,327
|
44
|
C
|
Low
|
| 446
|
Wildcard certificate
|
1,327
|
44
|
Redirect
|
NA
|
| 447
|
List of cryptographers
|
1,326
|
44
|
List
|
Low
|
| 448
|
Comparison of cryptographic hash functions
|
1,313
|
43
|
List
|
Low
|
| 449
|
Banburismus
|
1,307
|
43
|
C
|
Low
|
| 450
|
Jim Bell
|
1,295
|
43
|
GA
|
Low
|
| 451
|
Station HYPO
|
1,293
|
43
|
Start
|
Low
|
| 452
|
Supersingular isogeny key exchange
|
1,287
|
42
|
Start
|
Low
|
| 453
|
Ascon (cipher)
|
1,283
|
42
|
C
|
Low
|
| 454
|
Great Cipher
|
1,282
|
42
|
Start
|
Mid
|
| 455
|
GNUnet
|
1,281
|
42
|
B
|
Low
|
| 456
|
Tor2web
|
1,281
|
42
|
Start
|
Low
|
| 457
|
Private set intersection
|
1,277
|
42
|
Unknown
|
Unknown
|
| 458
|
Word square
|
1,266
|
42
|
C
|
Low
|
| 459
|
Twisted Edwards curve
|
1,265
|
42
|
C
|
Low
|
| 460
|
Snowflake (software)
|
1,265
|
42
|
Start
|
Low
|
| 461
|
RSA problem
|
1,264
|
42
|
Start
|
Top
|
| 462
|
Tiny Encryption Algorithm
|
1,256
|
41
|
Unknown
|
Unknown
|
| 463
|
FileVault
|
1,255
|
41
|
C
|
Mid
|
| 464
|
Indistinguishability obfuscation
|
1,255
|
41
|
C
|
Mid
|
| 465
|
SecureDrop
|
1,250
|
41
|
Start
|
Mid
|
| 466
|
International Association for Cryptologic Research
|
1,240
|
41
|
Start
|
Low
|
| 467
|
Beaufort cipher
|
1,235
|
41
|
Start
|
Low
|
| 468
|
Eli Ben-Sasson
|
1,235
|
41
|
Start
|
Mid
|
| 469
|
MD4
|
1,228
|
40
|
Start
|
Low
|
| 470
|
Encryption software
|
1,228
|
40
|
Start
|
Top
|
| 471
|
Proof of authority
|
1,226
|
40
|
Start
|
Low
|
| 472
|
Privacy and blockchain
|
1,224
|
40
|
C
|
Low
|
| 473
|
Arlington Hall
|
1,223
|
40
|
C
|
High
|
| 474
|
Hybrid cryptosystem
|
1,222
|
40
|
Start
|
High
|
| 475
|
Rijndael MixColumns
|
1,216
|
40
|
Start
|
Low
|
| 476
|
GOST (block cipher)
|
1,215
|
40
|
Start
|
Mid
|
| 477
|
Cipher Bureau (Poland)
|
1,214
|
40
|
GA
|
Low
|
| 478
|
Max Newman
|
1,208
|
40
|
B
|
Low
|
| 479
|
Open Whisper Systems
|
1,206
|
40
|
B
|
Unknown
|
| 480
|
Government Communications Security Bureau
|
1,205
|
40
|
B
|
Low
|
| 481
|
Random oracle
|
1,202
|
40
|
Start
|
Low
|
| 482
|
ElGamal signature scheme
|
1,194
|
39
|
Start
|
Top
|
| 483
|
AES implementations
|
1,180
|
39
|
List
|
Low
|
| 484
|
Code (cryptography)
|
1,177
|
39
|
Start
|
Top
|
| 485
|
One-key MAC
|
1,172
|
39
|
Start
|
Low
|
| 486
|
Cryptovirology
|
1,172
|
39
|
Start
|
Mid
|
| 487
|
Integrated Encryption Scheme
|
1,170
|
39
|
Start
|
Low
|
| 488
|
Key management
|
1,166
|
38
|
C
|
Low
|
| 489
|
National Cryptologic Museum
|
1,164
|
38
|
C
|
Mid
|
| 490
|
Electronic Signatures in Global and National Commerce Act
|
1,163
|
38
|
C
|
Unknown
|
| 491
|
Key disclosure law
|
1,154
|
38
|
C
|
Low
|
| 492
|
M-209
|
1,153
|
38
|
Start
|
Unknown
|
| 493
|
Frank Terpil
|
1,148
|
38
|
Start
|
Low
|
| 494
|
Temporal Key Integrity Protocol
|
1,147
|
38
|
C
|
Low
|
| 495
|
SYN cookies
|
1,146
|
38
|
Start
|
Unknown
|
| 496
|
Generic Security Services Application Programming Interface
|
1,142
|
38
|
Start
|
Low
|
| 497
|
Mix network
|
1,140
|
38
|
C
|
Low
|
| 498
|
Hash-based cryptography
|
1,135
|
37
|
Start
|
Low
|
| 499
|
Advanced Encryption Standard process
|
1,133
|
37
|
C
|
Mid
|
| 500
|
Pseudorandom function family
|
1,133
|
37
|
Start
|
Low
|