MyWiki:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

Period: 2025-11-01 to 2025-11-30

Total views: 5,069,053

Updated: 10:03, 7 December 2025 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 457,426 15,247 B High
2 Telegram (software) 298,646 9,954 B Mid
3 Alan Turing 179,810 5,993 GA Top
4 Bitcoin 150,410 5,013 B High
5 Voynich manuscript 91,440 3,048 B Low
6 Changpeng Zhao 72,848 2,428 Start Low
7 Tor (network) 72,363 2,412 B Mid
8 The Imitation Game 71,385 2,379 C Mid
9 Cryptocurrency 70,950 2,365 C High
10 WikiLeaks 61,280 2,042 B Low
11 Transport Layer Security 53,908 1,796 B Top
12 Blockchain 50,596 1,686 B High
13 National Security Agency 47,701 1,590 C High
14 Enigma machine 46,479 1,549 C High
15 HTTPS 45,790 1,526 C High
16 Digital rights management 45,140 1,504 C High
17 History of bitcoin 42,909 1,430 B Low
18 Secure Shell 40,474 1,349 C High
19 RSA cryptosystem 40,316 1,343 C Top
20 Virtual private network 37,753 1,258 C Mid
21 Signal (software) 36,083 1,202 C Mid
22 Advanced Encryption Standard 35,339 1,177 B Top
23 Diffie–Hellman key exchange 33,848 1,128 C Top
24 Kryptos 33,698 1,123 C Low
25 Vitalik Buterin 33,327 1,110 C Low
26 HTTP Strict Transport Security 31,454 1,048 C Low
27 Cryptography 30,825 1,027 C Top
28 Zcash 30,327 1,010 Start Low
29 SHA-2 29,835 994 C Top
30 Proton Mail 28,643 954 C Low
31 Letter frequency 28,165 938 B Low
32 Vault 7 27,320 910 C Mid
33 Caesar cipher 26,983 899 FA High
34 Dogecoin 26,792 893 C Low
35 Darknet market 26,487 882 B Mid
36 Lavarand 25,509 850 B Mid
37 Claude Shannon 25,089 836 C Top
38 Zimmermann telegram 24,351 811 B High
39 Code talker 24,319 810 B Low
40 Vigenère cipher 24,254 808 B Low
41 Post-quantum cryptography 23,512 783 C High
42 Password 23,429 780 C Top
43 Zero-knowledge proof 22,695 756 C Top
44 Public-key cryptography 22,077 735 C Top
45 Block cipher mode of operation 22,056 735 C Top
46 GCHQ 21,067 702 B Low
47 Information theory 20,271 675 B Top
48 Man-in-the-middle attack 19,836 661 C Mid
49 One-time password 19,643 654 B Mid
50 Trusted Platform Module 19,541 651 C Mid
51 Bletchley Park 19,316 643 B High
52 Merkle tree 19,236 641 C Mid
53 NordVPN 18,725 624 C Mid
54 MD5 18,695 623 C Top
55 Sator Square 18,671 622 B Low
56 Joan Clarke 18,598 619 C Mid
57 HMAC 18,098 603 C High
58 Knapsack problem 17,661 588 C Mid
59 ROT13 17,278 575 C Mid
60 Steganography 17,125 570 C High
61 Pretty Good Privacy 16,765 558 B High
62 Cryptographic hash function 16,187 539 C Top
63 Elliptic-curve cryptography 15,895 529 C High
64 Adam Back 15,571 519 C Low
65 Cipher 15,211 507 C Top
66 Bitwarden 14,944 498 C Low
67 Digital signature 14,682 489 C Top
68 Encryption 14,579 485 C Top
69 One-time pad 14,134 471 C Top
70 Cryptanalysis of the Enigma 13,878 462 C Mid
71 Rainbow table 13,831 461 C High
72 Grover's algorithm 13,823 460 C Mid
73 OpenVPN 13,806 460 C Mid
74 SHA-1 13,787 459 C Top
75 Password manager 13,255 441 C Low
76 Babington Plot 13,225 440 C Low
77 Certificate authority 13,088 436 C High
78 Wi-Fi Protected Access 12,312 410 C Mid
79 Information security 11,963 398 B Top
80 Kerberos (protocol) 11,929 397 C High
81 Litecoin 11,762 392 Start Low
82 Mullvad 11,621 387 Start Low
83 Public key certificate 11,180 372 C Top
84 Tails (operating system) 11,175 372 Start Low
85 Active Directory 11,148 371 C Low
86 Bombe 10,755 358 B Mid
87 Automatic Certificate Management Environment 10,745 358 Start Low
88 Decentralized finance 10,701 356 Start Low
89 Homomorphic encryption 10,516 350 C High
90 Mersenne Twister 10,418 347 C Low
91 Brute-force attack 10,095 336 C High
92 Galois/Counter Mode 10,069 335 C Mid
93 Bcrypt 10,053 335 C Mid
94 .onion 9,966 332 C Low
95 Colossus computer 9,729 324 B Mid
96 Elliptic Curve Digital Signature Algorithm 9,626 320 C High
97 Public key infrastructure 9,612 320 C Top
98 VeraCrypt 9,572 319 C Mid
99 Shamir's secret sharing 9,485 316 C High
100 KeePass 9,389 312 C Low
101 Ultra (cryptography) 9,291 309 C High
102 Salt (cryptography) 9,192 306 Start High
103 Substitution cipher 9,126 304 C Low
104 SHA-3 9,087 302 C Mid
105 SSH File Transfer Protocol 8,971 299 C Low
106 Alice and Bob 8,816 293 Start High
107 Phone hacking 8,715 290 Start Mid
108 Data Encryption Standard 8,713 290 C Top
109 End-to-end encryption 8,603 286 C High
110 Integer factorization 8,532 284 B Mid
111 Secure Hash Algorithms 8,482 282 Start High
112 Pay television 8,464 282 Start Unknown
113 OpenSSL 8,441 281 B High
114 Cypherpunk 8,298 276 C Mid
115 Matrix (protocol) 8,216 273 B Unknown
116 I2P 8,105 270 B Low
117 ChaCha20-Poly1305 8,080 269 C Low
118 Authentication 8,069 268 C High
119 InterPlanetary File System 8,064 268 C Low
120 Keygen 7,809 260 C Low
121 Forward secrecy 7,772 259 C High
122 EdDSA 7,579 252 C High
123 Hashcash 7,564 252 Start Unknown
124 Cryptonomicon 7,473 249 C Low
125 Proof of stake 7,458 248 C Low
126 Fort Meade 7,422 247 C Low
127 Qubes OS 7,402 246 C Mid
128 Threema 7,323 244 C Unknown
129 Quantum key distribution 7,314 243 B Mid
130 PBKDF2 7,219 240 C Low
131 Differential privacy 7,211 240 C Mid
132 Argon2 7,111 237 C Mid
133 Apple–FBI encryption dispute 7,016 233 C Low
134 Curve25519 7,000 233 C High
135 Comparison of BitTorrent clients 6,955 231 List Low
136 Theoretical computer science 6,942 231 B Low
137 Elliptic-curve Diffie–Hellman 6,887 229 Start Mid
138 Cryptographic nonce 6,725 224 Start High
139 Link 16 6,708 223 Start Low
140 Symmetric-key algorithm 6,705 223 Start Top
141 Message authentication code 6,628 220 C Top
142 Authenticated encryption 6,573 219 C Mid
143 The Tor Project 6,553 218 C Mid
144 Beale ciphers 6,527 217 B Low
145 IMSI-catcher 6,525 217 Start Mid
146 Cryptanalysis 6,481 216 C High
147 Bitcoin Cash 6,314 210 Start Low
148 Playfair cipher 6,312 210 Unknown Unknown
149 Commitment scheme 6,240 208 C High
150 Salsa20 6,138 204 C Top
151 Len Sassaman 6,069 202 C Unknown
152 Bitconnect 6,068 202 C Low
153 Hyphanet 6,055 201 B Mid
154 Daniel J. Bernstein 6,055 201 C Mid
155 KeePassXC 5,995 199 Start Low
156 Crypto AG 5,849 194 C High
157 Signal Protocol 5,834 194 C High
158 Birthday attack 5,822 194 C High
159 Harvest now, decrypt later 5,788 192 Start Low
160 Keychain (software) 5,784 192 Start Unknown
161 Password cracking 5,754 191 C Mid
162 Discrete logarithm 5,645 188 C Mid
163 Lorenz cipher 5,431 181 C Top
164 Quantum cryptography 5,406 180 C High
165 Transposition cipher 5,337 177 Unknown Unknown
166 RC4 5,316 177 B Top
167 Illegal number 5,301 176 C Low
168 DNS Certification Authority Authorization 5,274 175 GA Low
169 Units of information 5,230 174 C Unknown
170 Session (software) 5,221 174 Start Low
171 Cryptographically secure pseudorandom number generator 5,170 172 C Top
172 Shiba Inu (cryptocurrency) 5,087 169 Start Low
173 Side-channel attack 5,038 167 C High
174 Zerocoin protocol 4,988 166 C Low
175 PKCS 12 4,858 161 Start Low
176 Lattice-based cryptography 4,842 161 Start Low
177 Key derivation function 4,793 159 C Low
178 Kerckhoffs's principle 4,791 159 Start Mid
179 Citizenfour 4,742 158 C Low
180 Padding oracle attack 4,735 157 Start Low
181 Adi Shamir 4,734 157 C Unknown
182 GNU Privacy Guard 4,674 155 C Unknown
183 BLAKE (hash function) 4,671 155 C Mid
184 Password strength 4,628 154 C High
185 Mutual authentication 4,568 152 Stub Low
186 Dual EC DRBG 4,554 151 C High
187 Conel Hugh O'Donel Alexander 4,496 149 Start Low
188 3-D Secure 4,481 149 C Low
189 Twofish 4,442 148 Start High
190 Certificate signing request 4,430 147 C Low
191 Polkadot (blockchain platform) 4,415 147 Start Low
192 Ricky McCormick's encrypted notes 4,378 145 B Low
193 Cryptogram 4,365 145 C Mid
194 11B-X-1371 4,353 145 GA Low
195 Triple DES 4,313 143 Start Unknown
196 Block cipher 4,248 141 C Top
197 Digital renminbi 4,245 141 B High
198 Utah Data Center 4,240 141 C Mid
199 Digital Signature Algorithm 4,119 137 C Top
200 Marian Rejewski 4,111 137 FA Mid
201 ElGamal encryption 4,083 136 Start Top
202 Known-plaintext attack 4,032 134 Start High
203 Polybius square 4,030 134 Start Mid
204 Secure multi-party computation 4,021 134 Start High
205 Communications Security Establishment 3,964 132 C Mid
206 Clipper chip 3,963 132 C High
207 Bruce Schneier 3,936 131 Start High
208 Bacon's cipher 3,917 130 Start Low
209 David Chaum 3,904 130 C Low
210 OpenSSH 3,877 129 C High
211 Blowfish (cipher) 3,865 128 B High
212 FIPS 140-2 3,839 127 C Mid
213 Tap code 3,819 127 Start Low
214 Richard Teng 3,817 127 Start Low
215 XOR cipher 3,802 126 Stub Mid
216 Replay attack 3,799 126 C Top
217 Padding (cryptography) 3,775 125 Start Unknown
218 Wired Equivalent Privacy 3,769 125 C Mid
219 The Doughnut 3,737 124 GA High
220 RSA Factoring Challenge 3,722 124 Start Low
221 List of bitcoin forks 3,722 124 List Low
222 Bitcoin Core 3,713 123 Start Low
223 Cipher suite 3,691 123 C Top
224 Quantum network 3,671 122 C Low
225 RSA Security 3,612 120 C Unknown
226 Initialization vector 3,592 119 C High
227 NSAKEY 3,581 119 C High
228 Digest access authentication 3,579 119 B Low
229 Dilly Knox 3,567 118 B Unknown
230 Key (cryptography) 3,562 118 Start Unknown
231 Certificate revocation list 3,512 117 C Low
232 Stream cipher 3,488 116 Start Top
233 Timing attack 3,484 116 C High
234 Boolean function 3,467 115 Start Mid
235 Diplomatic bag 3,457 115 Start Low
236 Rijndael S-box 3,423 114 Start Low
237 NIST Post-Quantum Cryptography Standardization 3,419 113 C Mid
238 Deniable encryption 3,409 113 Start High
239 Datagram Transport Layer Security 3,398 113 C Mid
240 Type B Cipher Machine 3,376 112 Start Low
241 Cold boot attack 3,355 111 C Low
242 Atbash 3,321 110 Stub Low
243 Confidentiality 3,310 110 C Low
244 Peter Todd (programmer) 3,300 110 Start Unknown
245 Supply chain attack 3,263 108 C Low
246 Privacy-Enhanced Mail 3,236 107 Start Low
247 Web of trust 3,221 107 C High
248 AES instruction set 3,216 107 C Low
249 History of cryptography 3,207 106 C High
250 Bomba (cryptography) 3,198 106 Start Low
251 Frequency analysis 3,187 106 C High
252 Feistel cipher 3,186 106 Start Unknown
253 BB84 3,182 106 Start Low
254 Ciphertext 3,166 105 Start High
255 Fork (blockchain) 3,160 105 Start Mid
256 List of ciphertexts 3,159 105 List Low
257 Coppersmith's attack 3,156 105 B High
258 TrueCrypt 3,107 103 C Mid
259 Root certificate 3,076 102 Start Low
260 Whonix 3,038 101 Start Mid
261 Roger Dingledine 2,999 99 Start Unknown
262 Polyalphabetic cipher 2,961 98 Start Unknown
263 Filecoin 2,893 96 Start Low
264 Whitfield Diffie 2,883 96 B High
265 Australian Signals Directorate 2,874 95 C Low
266 Self-signed certificate 2,871 95 Start Unknown
267 PKCS 2,863 95 List High
268 Rail fence cipher 2,858 95 Start Low
269 Key exchange 2,855 95 Start Unknown
270 K-anonymity 2,852 95 Start Mid
271 Hill cipher 2,840 94 Unknown Unknown
272 Jami (software) 2,839 94 Start Unknown
273 Elizebeth Smith Friedman 2,828 94 C Mid
274 Enigmail 2,784 92 Stub Low
275 Book cipher 2,772 92 C Low
276 Certificate Transparency 2,769 92 C High
277 Cryptogram of Olivier Levasseur 2,766 92 Start Unknown
278 SipHash 2,765 92 Start Low
279 Electronic signature 2,759 91 C Low
280 Crypto-anarchy 2,739 91 Start High
281 One-way function 2,731 91 Start Top
282 Merkle–Damgård construction 2,718 90 C Unknown
283 Bitcoin scalability problem 2,705 90 C Low
284 Digital watermarking 2,701 90 B Mid
285 Cryptocurrency tumbler 2,688 89 Start Unknown
286 Non-interactive zero-knowledge proof 2,680 89 Start Low
287 Briar (software) 2,668 88 Start Low
288 Challenge–response authentication 2,652 88 Start Mid
289 HKDF 2,642 88 Start Unknown
290 PKCS 11 2,627 87 Start Low
291 Key encapsulation mechanism 2,580 86 Start High
292 RSA SecurID 2,579 85 C Low
293 Special Collection Service 2,559 85 C Low
294 Alastair Denniston 2,521 84 Start Unknown
295 Proton Drive 2,516 83 Start Low
296 Non-repudiation 2,479 82 Start Mid
297 Length extension attack 2,476 82 Start Unknown
298 AES key schedule 2,452 81 Start Low
299 Dictionary attack 2,444 81 C Unknown
300 Collision attack 2,443 81 Start High
301 Elliptic curve point multiplication 2,410 80 C Mid
302 W. T. Tutte 2,406 80 C Mid
303 I. J. Good 2,405 80 C Low
304 Schnorr signature 2,399 79 C High
305 Plaintext 2,371 79 Start High
306 Algorand 2,360 78 B Low
307 Copiale cipher 2,352 78 Start Low
308 Crypto Wars 2,319 77 Start High
309 Phil Zimmermann 2,318 77 Start Mid
310 Charlie Lee (computer scientist) 2,307 76 Start Low
311 PKCS 7 2,302 76 Start Low
312 Disk encryption theory 2,300 76 C Unknown
313 Martin Hellman 2,262 75 Start High
314 Double Ratchet Algorithm 2,260 75 Start Low
315 Optimal asymmetric encryption padding 2,210 73 Start High
316 Magic (cryptography) 2,208 73 Start Unknown
317 Format-preserving encryption 2,195 73 Start High
318 Gordon Welchman 2,189 72 C Low
319 PKCS 1 2,187 72 C Mid
320 Hash chain 2,162 72 Start Unknown
321 Key size 2,158 71 C High
322 Orbot 2,155 71 Stub Low
323 DNS-based Authentication of Named Entities 2,145 71 C Mid
324 Ciphertext indistinguishability 2,135 71 C High
325 Preimage attack 2,126 70 Stub Unknown
326 Blockchain game 2,121 70 Start Low
327 Export of cryptography from the United States 2,119 70 C Unknown
328 William F. Friedman 2,099 69 Start Unknown
329 FIPS 140-3 2,098 69 C Low
330 Tox (protocol) 2,091 69 C Low
331 Directory service 2,085 69 Start Mid
332 Ralph Merkle 2,075 69 C High
333 Affine cipher 2,059 68 C Low
334 Bullrun (decryption program) 2,058 68 B Low
335 Reception and criticism of WhatsApp security and privacy features 2,054 68 C Low
336 Pepper (cryptography) 2,042 68 Start Low
337 ADFGVX cipher 2,020 67 Unknown Unknown
338 Comparison of disk encryption software 2,011 67 List High
339 Mumble (software) 2,001 66 C Unknown
340 FIPS 140 1,997 66 Start Mid
341 Cryptomator 1,989 66 C Unknown
342 S-box 1,981 66 Start Top
343 Trusted Computing 1,968 65 C Mid
344 Women in Bletchley Park 1,947 64 C Unknown
345 CBC-MAC 1,933 64 C High
346 Content Authenticity Initiative 1,916 63 C Low
347 Bitcoin Satoshi Vision 1,905 63 Start Low
348 Communications security 1,898 63 Start Mid
349 Off-the-record messaging 1,897 63 Start Unknown
350 Physical unclonable function 1,888 62 Start Unknown
351 Black Chamber 1,870 62 Unknown Unknown
352 WebTorrent 1,869 62 Start Unknown
353 Disk encryption 1,858 61 C High
354 Entrust 1,857 61 Start Low
355 Avalanche effect 1,848 61 Start High
356 Retroshare 1,832 61 C Low
357 Bernstein v. United States 1,821 60 Start Mid
358 Opportunistic TLS 1,820 60 Start Mid
359 Berlekamp–Massey algorithm 1,816 60 Start Unknown
360 Comparison of SSH clients 1,806 60 List Low
361 SegWit 1,796 59 C Low
362 Code signing 1,791 59 C Low
363 Arthur Scherbius 1,786 59 Start Mid
364 Authenticator 1,778 59 B Low
365 William Binney (intelligence official) 1,775 59 C Mid
366 Diehard tests 1,768 58 C Low
367 Scrambler 1,764 58 C Unknown
368 C-36 (cipher machine) 1,749 58 Start Low
369 UltraViolet (website) 1,722 57 C Low
370 Trapdoor function 1,719 57 Start High
371 Secret sharing 1,708 56 C High
372 Dm-crypt 1,705 56 Start Low
373 Cryptographic protocol 1,702 56 Start High
374 Cryptanalysis of the Lorenz cipher 1,698 56 C High
375 Leo Marks 1,692 56 B Unknown
376 The Code Book 1,687 56 Start Low
377 Chosen-plaintext attack 1,682 56 Stub Unknown
378 Shugborough inscription 1,682 56 Start Low
379 Lenstra elliptic-curve factorization 1,681 56 C Low
380 Bouncy Castle (cryptography) 1,680 56 Start Unknown
381 Baby-step giant-step 1,675 55 C Unknown
382 Anonymous P2P 1,667 55 C Low
383 Cryptographic Message Syntax 1,646 54 Stub Mid
384 Secret decoder ring 1,641 54 Start Low
385 Cryptographic primitive 1,625 54 Start Top
386 Enigma rotor details 1,622 54 Start Mid
387 SIGABA 1,620 54 C High
388 IEEE 802.11i-2004 1,618 53 C Mid
389 BTCC (company) 1,617 53 Start Low
390 Key stretching 1,615 53 Start Unknown
391 Kasiski examination 1,614 53 Unknown Unknown
392 Secure cryptoprocessor 1,593 53 C Mid
393 Two-square cipher 1,587 52 Start Unknown
394 Interactive proof system 1,580 52 Start High
395 Data anonymization 1,569 52 Start Mid
396 Blum Blum Shub 1,536 51 C High
397 CCM mode 1,528 50 Start High
398 Tabula recta 1,522 50 Unknown Unknown
399 HTTP Public Key Pinning 1,520 50 C Mid
400 Nothing-up-my-sleeve number 1,518 50 C Low
401 PKCS 8 1,513 50 Stub Unknown
402 Autokey cipher 1,504 50 C Mid
403 Information-theoretic security 1,502 50 Start Top
404 Classical cipher 1,498 49 Start Top
405 Crypt (C) 1,498 49 C High
406 ZeroNet 1,496 49 Start Low
407 Comparison of cryptography libraries 1,478 49 List Unknown
408 Poly1305 1,469 48 Start Top
409 Multiple encryption 1,453 48 Unknown Unknown
410 Meet-in-the-middle attack 1,452 48 C High
411 BLS digital signature 1,452 48 Start Mid
412 Clock drift 1,439 47 C Low
413 Taher Elgamal 1,438 47 C Unknown
414 McEliece cryptosystem 1,434 47 C High
415 Comparison of TLS implementations 1,420 47 List High
416 Michael O. Rabin 1,419 47 C Low
417 David Wheeler (computer scientist) 1,414 47 C Low
418 Pre-shared key 1,414 47 Start Mid
419 Integer factorization records 1,409 46 Start Unknown
420 A5/1 1,407 46 B High
421 Robert Morris (cryptographer) 1,399 46 Stub Low
422 Confusion and diffusion 1,397 46 Start Mid
423 SIGSALY 1,397 46 C Low
424 DeCSS 1,393 46 C Mid
425 Paillier cryptosystem 1,393 46 Start High
426 Red/black concept 1,393 46 Stub Unknown
427 Musical cryptogram 1,391 46 C Low
428 Snake oil (cryptography) 1,388 46 Unknown Unknown
429 Advanced Access Content System 1,386 46 C Mid
430 Dorabella Cipher 1,382 46 Unknown Unknown
431 Encrypting File System 1,371 45 B Unknown
432 Differential cryptanalysis 1,368 45 B High
433 Operation Rubicon 1,367 45 C Low
434 Content Scramble System 1,364 45 Start Mid
435 Guardian Project (software) 1,362 45 Start Mid
436 Trusted timestamping 1,360 45 Start Unknown
437 Null cipher 1,355 45 Stub Low
438 Boris Hagelin 1,350 45 Start Mid
439 FreeOTP 1,343 44 Start Low
440 Security level 1,343 44 Stub Mid
441 Always-on DRM 1,342 44 Start Low
442 Bitcoin Gold 1,341 44 Start Low
443 Jefferson disk 1,328 44 Start Unknown
444 Blind signature 1,327 44 C Mid
445 DES supplementary material 1,327 44 C Low
446 Wildcard certificate 1,327 44 Redirect NA
447 List of cryptographers 1,326 44 List Low
448 Comparison of cryptographic hash functions 1,313 43 List Low
449 Banburismus 1,307 43 C Low
450 Jim Bell 1,295 43 GA Low
451 Station HYPO 1,293 43 Start Low
452 Supersingular isogeny key exchange 1,287 42 Start Low
453 Ascon (cipher) 1,283 42 C Low
454 Great Cipher 1,282 42 Start Mid
455 GNUnet 1,281 42 B Low
456 Tor2web 1,281 42 Start Low
457 Private set intersection 1,277 42 Unknown Unknown
458 Word square 1,266 42 C Low
459 Twisted Edwards curve 1,265 42 C Low
460 Snowflake (software) 1,265 42 Start Low
461 RSA problem 1,264 42 Start Top
462 Tiny Encryption Algorithm 1,256 41 Unknown Unknown
463 FileVault 1,255 41 C Mid
464 Indistinguishability obfuscation 1,255 41 C Mid
465 SecureDrop 1,250 41 Start Mid
466 International Association for Cryptologic Research 1,240 41 Start Low
467 Beaufort cipher 1,235 41 Start Low
468 Eli Ben-Sasson 1,235 41 Start Mid
469 MD4 1,228 40 Start Low
470 Encryption software 1,228 40 Start Top
471 Proof of authority 1,226 40 Start Low
472 Privacy and blockchain 1,224 40 C Low
473 Arlington Hall 1,223 40 C High
474 Hybrid cryptosystem 1,222 40 Start High
475 Rijndael MixColumns 1,216 40 Start Low
476 GOST (block cipher) 1,215 40 Start Mid
477 Cipher Bureau (Poland) 1,214 40 GA Low
478 Max Newman 1,208 40 B Low
479 Open Whisper Systems 1,206 40 B Unknown
480 Government Communications Security Bureau 1,205 40 B Low
481 Random oracle 1,202 40 Start Low
482 ElGamal signature scheme 1,194 39 Start Top
483 AES implementations 1,180 39 List Low
484 Code (cryptography) 1,177 39 Start Top
485 One-key MAC 1,172 39 Start Low
486 Cryptovirology 1,172 39 Start Mid
487 Integrated Encryption Scheme 1,170 39 Start Low
488 Key management 1,166 38 C Low
489 National Cryptologic Museum 1,164 38 C Mid
490 Electronic Signatures in Global and National Commerce Act 1,163 38 C Unknown
491 Key disclosure law 1,154 38 C Low
492 M-209 1,153 38 Start Unknown
493 Frank Terpil 1,148 38 Start Low
494 Temporal Key Integrity Protocol 1,147 38 C Low
495 SYN cookies 1,146 38 Start Unknown
496 Generic Security Services Application Programming Interface 1,142 38 Start Low
497 Mix network 1,140 38 C Low
498 Hash-based cryptography 1,135 37 Start Low
499 Advanced Encryption Standard process 1,133 37 C Mid
500 Pseudorandom function family 1,133 37 Start Low