User Tools

Site Tools


crypto_dictionary

Crypto Dictionary by Jean-Philippe Aumasson

Return to Bibliography

Crypto Dictionary - ! Jean-Philippe Aumasson.txt

Contents

65537

A A5/0

A5/1

A5/2

A5/3

A5/4

Adaptive attack

AEAD (authenticated encryption with associated data)

AES (Advanced Encryption Standard)

AES-CCM

AES-GCM

AES-GCM-SIV

AES-NI

AES-SIV

AIM (Advanced INFOSEC Machine)

AKA

AKS (Agrawal–Kayal–Saxena)

Algebraic cryptanalysis

Alice

All-or-nothing transform (AONT)

Anonymous signature

Applied Cryptography

Applied cryptography

ARC4

Argon2

ARX (Add-Rotate-XOR)

ASIACRYPT

Asymmetric cryptography

Attack

Attribute-based encryption (ABE)

Authenticated cipher

Axolotl

B Backdoor

Backtracking resistance

Backward secrecy

Base64

BassOmatic

BB84

bcrypt

Biclique cryptanalysis

BIKE (Bit Flipping Key Encapsulation)

BIP (Bitcoin improvement proposal)

Bit Gold

Bitcoin

Black

BLAKE

BLAKE2

BLAKE3

Bleichenbacher attack

Blind signature

Block cipher

Blockchain

Blockcipher

Blowfish

BLS (Boneh-Lynn-Shacham) signature

Bob

Boolean function

Boomerang attack

BQP (bounded-error quantum polynomial time)

Braid group cryptography

Brainpool curves

Break-in recovery

Broadcast encryption

Brute-force attack

Bulletproof

Byzantine fault tolerance

C CAESAR

Caesar’s cipher

CAVP (Cryptographic Algorithm Validation Program)

CBC (cipher block chaining)

CECPQ (combined elliptic-curve and post-quantum)

Cellular automata

Ceremony

Certificate

Certificate authority (CA)

Certificate transparency (CT)

ChaCha20

CHES (Conference on Cryptographic Hardware and Embedded Systems)

CIA

Ciphertext stealing

Clipper

CMVP (Cryptographic Module Validation Program)

Code-based cryptography

Commitment

Concurrent zero-knowledge

Consensus protocol

Control word

COPACOBANA (Cost-Optimized PArallel COde Breaker)

Cothority (collective authority)

Cryptanalysis

Cryptids

Crypto

CRYPTO

Crypto AG

Crypto period

Crypto variable

Crypto wars

Cryptobiosis

Cryptocurrency

Crypto-Gram

Cryptography

Cryptologia

Cryptology

Cryptonomicon

Cryptorchidism

Cryptovirology

CRYPTREC

CSIDH (Commutative Supersingular Isogeny Diffie–Hellman)

CTF (capture the flag)

Cube attack

Curve25519

Curve448

Cypher

D Daemon

Davies–Meyer

Decentralized private computation

Déchiffrer

crypter

Deniable encryption

DES (Data Encryption Standard)

Dictionary

Dictionary attack

Differential cryptanalysis

Diffie–Hellman

Disclosure

Discrete logarithm problem

Distinguisher

Distributed randomness

Dolev–Yao model

Double ratchet

Dragonfly

DRBG (deterministic random bit generator)

DSA (Digital Signature Algorithm)

DSS (Digital Signature Standard)

DVB-CSA

E E0

ECB (electronic codebook)

ECC

ECDLP (Elliptic-curve discrete logarithm problem)

ECDSA (Elliptic-curve DSA)

ECIES (Elliptic-curve IES)

Ed25519

EdDSA

EKMS (Electronic Key Management System)

Electronic codebook

ElGamal

Elligator

Elliptic curve

Elliptic-curve cryptography

Encipherment

End-to-end encryption (E2EE)

Enigma

Entropy

ePrint

Erathosthenes’ sieve

eSTREAM

Ethereum

Eurocrypt

Eve

E-voting

F Factoring problem

Feedback shift register

Feistel network

Fialka (Фиалка)

Fiat–Shamir

FIPS 140-2

FIPS 140-3

Forgery

Formal verification

Format-preserving encryption

Forward secrecy

FOX

FSE (Fast Software Encryption)

Fully homomorphic encryption

Functional encryption

Future secrecy

Fuzzy extractor

G Generalized birthday problem

GNFS (General Number Field Sieve)

GOST

Grain

Gröbner basis

Group signature

Grover’s algorithm

H Hardcore predicate

Hash function

Hash-based cryptography

Heartbleed

Hedged signature

HFE (Hidden Field Equations)

HMAC (Hash-based MAC)

Homomorphic encryption

HPC (Hasty Pudding Cipher)

HSM (hardware security module)

HTTP/3

Hyperelliptic-curve cryptography

I IACR (International Association for Cryptologic Research)

IDEA (International Data Encryption Algorithm)

IDEA NXT

Identity-based encryption

IES (Integrated Encryption Scheme)

Impatient saboteur

Impossibility

Impossible differential attack

IND-CCA

IND-CPA

Indelibility

Indifferentiability

Indistinguishability

Indistinguishability obfuscation (iO)

Information-theoretic security

INT-CTXT

Invisible signature

IOTA

IPES (Improved Proposed Encryption Standard)

IPSec

ISO standard

Isogeny-based cryptography

J Journal of Cryptology (JoC)

K KASUMI

Keccak

KeeLoq

KEM (key encapsulation mechanism)

Kerberos

Kerckhoffs’ principles

Key derivation function (KDF)

Key escrow

Key management

Key wrapping

Kleptography

Known-key attack

Kupyna (Купина)

L Laconic zero-knowledge proof

Lai–Massey

Lamport signature

Lattice-based cryptography

Le Chiffre

Leakage-resilient cryptography

Learning with errors (LWE)

Length extension attack

Length-preserving encryption

LFSR (linear feedback shift register)

Lightweight cryptography

Linear cryptanalysis

Linkability

LM hash

Luby–Rackoff

Lucifer

M MAC (message authentication code)

MAGENTA

Malleability

Manger attack

Man-in-the-middle

MASH (Modular Arithmetic Secure Hash)

McEliece encryption scheme

MD4

MD5

MDC (Message Digest Cipher)

MDC-2 (Modification Detection Code 2)

Meet-in-the-middle

Merkle puzzle

Merkle tree

Merkle–Damgård construction

Mersenne twister

Message franking

Miller–Rabin

MINERVA

Mining

Misuse resistance

Mixnet

MQV (Menezes–Qu–Vanstone)

Multicollision

Multi-party computation (MPC)

Multivariate cryptography

N NBS (National Bureau of Standards)

NESSIE (New European Schemes for Signatures, Integrity, and Encryption)

“New Directions in Cryptography”

NFSR (nonlinear feedback shift register)

NIST (National Institute of Standards and Technology)

NIZK (non-interactive zero-knowledge)

Noekeon

Noise

Nonce

Non-committing encryption

Non-outsourceability

Non-slanderability

NSA (National Security Agency)

NT hash

NTRU (Nth degree Truncated polynomial Ring Units)

Null cipher

O OAEP (Optimal Asymmetric Encryption Padding)

Oblivious key management system (OKMS)

Oblivious PRF (OPRF)

Oblivious RAM (ORAM)

Oblivious transfer

Obscurity

OCB (offset codebook mode)

One-time pad

One-way function

Onion-AE

OPAQUE

OpenSSL

Oracle

OTR (Off-the-Record)

P Padding oracle attack

Paillier cryptosystem

Pairing

Pairing-based cryptography

PAKE (password-authenticated key exchange)

Paradigm

Password hash function

PBKDF2 (Password-Based Key Derivation Function 2)

PCT (Private Communications Technology)

PEP (Plaintext equivalence proof)

Perfect forward secrecy

Permutation-based cryptography

PES (Proposed Encryption Standard)

PET (Plaintext equivalence test)

PFS

PGP (Pretty Good Privacy)

Photuris

Picnic

PKC

PKCS (Public]] Key Cryptography Standards)

Poly1305

Polynomial complexity

Post-compromise security

Post-quantum cryptography

Post-quantum RSA

Prediction resistance

Preimage

PRESENT

PRIMES

Privacy-preserving

Private information retrieval (PIR)

Proof of burn

Proof of catalytic space

Proof of human work

Proof of replication

Proof of reserve

Proof of security

Proof of sequential work

Proof of space

Proof of spacetime

Proof of stake

Proof of storage

Proof of useful work

Proof of work

Provable security

Provably secure

Proxy re-encryption

Pseudo-random

Pseudorandom function (PRF)

Pseudorandom number generator (PRNG)

Pseudorandom permutation (PRP)

Public]]-key cryptography

PUF (physically unclonable function)

Puncturable encryption

Puncturable pseudorandom function (PPRF)

Q Quantum compute]]r

Quantum cryptography

Quantum encryption

Quantum key distribution

Quantum signature

QUIC (Quick UDP Internet Connections)

R Rabin cryptosystem

Rainbow tables

Random bits

Random oracle

Randomness

Range proof

RC4

RC5

RC6

Real world

Real World Crypto (RWC)

Rectangle attack

Related-key attack

Research papers

Revocation

Rijndael

Ring signature

RIPEMD-160

Rivest–Shamir–Adleman

ROBOT (Return Of Bleichenbacher’s Oracle Threat)

ROS

RSA

Rubber-hose cryptanalysis

Rumba20

S SAEP (Simplified OAEP)

Salsa20

Sandwich attack

S-box

Scalar

sci.crypt

Scrambler

scrypt

Searchable encryption

secp256k1

Secret sharing

Security

Security proof

Semantic security

Serious Cryptography

Serpent

SHA-0

SHA-1

SHA-2

SHA-3

SHA-3 competition

SHACAL

Shamir’s secret database

Shor’s algorithm

SHS (Secure Hash Standard)

Side channel

Side-channel attack

Sigaba

Signal protocol

Signature

Signcryption

SIKE (Supersingular Isogeny Key Encapsulation)

SIMECK

SIMON

SipHash

SIV-AES

Skipjack

Slide attack

SM

Smart contract

Snake-oil

SNARK (succinct non-interactive argument of knowledge)

SNIP (secret-shared non-interactive proof)

SNOW 3G

Solitaire

SPECK

SPEKE (Simple Password Exponential Key Exchange)

SPHINCS

Sponge function

SRP (Secure Remote Password)

SSH (Secure Shell)

SSL (Secure Socket Layer)

STARK (scalable transparent arguments of knowledge)

Steganography

Stream cipher

Substitution-permutation network (SPN)

Sugar beet auctions

Suite A

SUPERCOP

Superpolynomial complexity

SVP (shortest vector problem)

Symmetric-key cryptography

T TCC

Test vectors

Threefish

Threshold encryption

Threshold secret-sharing

Threshold signature

Time AI™

Time-lock encryption

Time-lock puzzle

Timing attack

TLS (Transport Layer Security)

Tor

Traitor tracing

Transfinite cryptography

Trapdoor

Triple DES

Trivium

True random number generator (TRNG)

Trusted third party

Tweakable block cipher

Twitter

Twofish

U Undeniable signature

Universal composability

Universal hash function

Updatable encryption

V Verifiable delay function (VDF)

Verifiable random function (VRF)

Verifiable unpredictable function (VUF)

Vigenère cipher

VSH (Very Smooth Hash)

W Wallet

Watermarking

White-box cryptography

Winternitz signature

WireGuard

X X25519

X3DH

XMSS (eXtended Merkle Signature Scheme)

XOF (extendable output function)

XOR

XOR encryption

Z Zerocash

ZKP (zero-knowledge proof)

ZRTP

Crypto Dictionary by Jean-Philippe Aumasson

Crypto Dictionary - ! Jean-Philippe Aumasson.txt

Contents

65537

A A5/0

A5/1

A5/2

A5/3

A5/4

Adaptive attack

AEAD (authenticated encryption with associated data)

AES (Advanced Encryption Standard)

AES-CCM

AES-GCM

AES-GCM-SIV

AES-NI

AES-SIV

AIM (Advanced INFOSEC Machine)

AKA

AKS (Agrawal–Kayal–Saxena)

Algebraic cryptanalysis

Alice

All-or-nothing transform (AONT)

Anonymous signature

Applied Cryptography

Applied cryptography

ARC4

Argon2

ARX (Add-Rotate-XOR)

ASIACRYPT

Asymmetric cryptography

Attack

Attribute-based encryption (ABE)

Authenticated cipher

Axolotl

B Backdoor

Backtracking resistance

Backward secrecy

Base64

BassOmatic

BB84

bcrypt

Biclique cryptanalysis

BIKE (Bit Flipping Key Encapsulation)

BIP (Bitcoin improvement proposal)

Bit Gold

Bitcoin

Black

BLAKE

BLAKE2

BLAKE3

Bleichenbacher attack

Blind signature

Block cipher

Blockchain

Blockcipher

Blowfish

BLS (Boneh-Lynn-Shacham) signature

Bob

Boolean function

Boomerang attack

BQP (bounded-error quantum polynomial time)

Braid group cryptography

Brainpool curves

Break-in recovery

Broadcast encryption

Brute-force attack

Bulletproof

Byzantine fault tolerance

C CAESAR

Caesar’s cipher

CAVP (Cryptographic Algorithm Validation Program)

CBC (cipher block chaining)

CECPQ (combined elliptic-curve and post-quantum)

Cellular automata

Ceremony

Certificate

Certificate authority (CA)

Certificate transparency (CT)

ChaCha20

CHES (Conference on Cryptographic Hardware and Embedded Systems)

CIA

Ciphertext stealing

Clipper

CMVP (Cryptographic Module Validation Program)

Code-based cryptography

Commitment

Concurrent zero-knowledge

Consensus protocol

Control word

COPACOBANA (Cost-Optimized PArallel COde Breaker)

Cothority (collective authority)

Cryptanalysis

Cryptids

Crypto

CRYPTO

Crypto AG

Crypto period

Crypto variable

Crypto wars

Cryptobiosis

Cryptocurrency

Crypto-Gram

Cryptography

Cryptologia

Cryptology

Cryptonomicon

Cryptorchidism

Cryptovirology

CRYPTREC

CSIDH (Commutative Supersingular Isogeny Diffie–Hellman)

CTF (capture the flag)

Cube attack

Curve25519

Curve448

Cypher

D Daemon

Davies–Meyer

Decentralized private computation

Déchiffrer

crypter

Deniable encryption

DES (Data Encryption Standard)

Dictionary

Dictionary attack

Differential cryptanalysis

Diffie–Hellman

Disclosure

Discrete logarithm problem

Distinguisher

Distributed randomness

Dolev–Yao model

Double ratchet

Dragonfly

DRBG (deterministic random bit generator)

DSA (Digital Signature Algorithm)

DSS (Digital Signature Standard)

DVB-CSA

E E0

ECB (electronic codebook)

ECC

ECDLP (Elliptic-curve discrete logarithm problem)

ECDSA (Elliptic-curve DSA)

ECIES (Elliptic-curve IES)

Ed25519

EdDSA

EKMS (Electronic Key Management System)

Electronic codebook

ElGamal

Elligator

Elliptic curve

Elliptic-curve cryptography

Encipherment

End-to-end encryption (E2EE)

Enigma

Entropy

ePrint

Erathosthenes’ sieve

eSTREAM

Ethereum

Eurocrypt

Eve

E-voting

F Factoring problem

Feedback shift register

Feistel network

Fialka (Фиалка)

Fiat–Shamir

FIPS 140-2

FIPS 140-3

Forgery

Formal verification

Format-preserving encryption

Forward secrecy

FOX

FSE (Fast Software Encryption)

Fully homomorphic encryption

Functional encryption

Future secrecy

Fuzzy extractor

G Generalized birthday problem

GNFS (General Number Field Sieve)

GOST

Grain

Gröbner basis

Group signature

Grover’s algorithm

H Hardcore predicate

Hash function

Hash-based cryptography

Heartbleed

Hedged signature

HFE (Hidden Field Equations)

HMAC (Hash-based MAC)

Homomorphic encryption

HPC (Hasty Pudding Cipher)

HSM (hardware security module)

HTTP/3

Hyperelliptic-curve cryptography

I IACR (International Association for Cryptologic Research)

IDEA (International Data Encryption Algorithm)

IDEA NXT

Identity-based encryption

IES (Integrated Encryption Scheme)

Impatient saboteur

Impossibility

Impossible differential attack

IND-CCA

IND-CPA

Indelibility

Indifferentiability

Indistinguishability

Indistinguishability obfuscation (iO)

Information-theoretic security

INT-CTXT

Invisible signature

IOTA

IPES (Improved Proposed Encryption Standard)

IPSec

ISO standard

Isogeny-based cryptography

J Journal of Cryptology (JoC)

K KASUMI

Keccak

KeeLoq

KEM (key encapsulation mechanism)

Kerberos

Kerckhoffs’ principles

Key derivation function (KDF)

Key escrow

Key management

Key wrapping

Kleptography

Known-key attack

Kupyna (Купина)

L Laconic zero-knowledge proof

Lai–Massey

Lamport signature

Lattice-based cryptography

Le Chiffre

Leakage-resilient cryptography

Learning with errors (LWE)

Length extension attack

Length-preserving encryption

LFSR (linear feedback shift register)

Lightweight cryptography

Linear cryptanalysis

Linkability

LM hash

Luby–Rackoff

Lucifer

M MAC (message authentication code)

MAGENTA

Malleability

Manger attack

Man-in-the-middle

MASH (Modular Arithmetic Secure Hash)

McEliece encryption scheme

MD4

MD5

MDC (Message Digest Cipher)

MDC-2 (Modification Detection Code 2)

Meet-in-the-middle

Merkle puzzle

Merkle tree

Merkle–Damgård construction

Mersenne twister

Message franking

Miller–Rabin

MINERVA

Mining

Misuse resistance

Mixnet

MQV (Menezes–Qu–Vanstone)

Multicollision

Multi-party computation (MPC)

Multivariate cryptography

N NBS (National Bureau of Standards)

NESSIE (New European Schemes for Signatures, Integrity, and Encryption)

“New Directions in Cryptography”

NFSR (nonlinear feedback shift register)

NIST (National Institute of Standards and Technology)

NIZK (non-interactive zero-knowledge)

Noekeon

Noise

Nonce

Non-committing encryption

Non-outsourceability

Non-slanderability

NSA (National Security Agency)

NT hash

NTRU (Nth degree Truncated polynomial Ring Units)

Null cipher

O OAEP (Optimal Asymmetric Encryption Padding)

Oblivious key management system (OKMS)

Oblivious PRF (OPRF)

Oblivious RAM (ORAM)

Oblivious transfer

Obscurity

OCB (offset codebook mode)

One-time pad

One-way function

Onion-AE

OPAQUE

OpenSSL

Oracle

OTR (Off-the-Record)

P Padding oracle attack

Paillier cryptosystem

Pairing

Pairing-based cryptography

PAKE (password-authenticated key exchange)

Paradigm

Password hash function

PBKDF2 (Password-Based Key Derivation Function 2)

PCT (Private Communications Technology)

PEP (Plaintext equivalence proof)

Perfect forward secrecy

Permutation-based cryptography

PES (Proposed Encryption Standard)

PET (Plaintext equivalence test)

PFS

PGP (Pretty Good Privacy)

Photuris

Picnic

PKC

PKCS (Public]] Key Cryptography Standards)

Poly1305

Polynomial complexity

Post-compromise security

Post-quantum cryptography

Post-quantum RSA

Prediction resistance

Preimage

PRESENT

PRIMES

Privacy-preserving

Private information retrieval (PIR)

Proof of burn

Proof of catalytic space

Proof of human work

Proof of replication

Proof of reserve

Proof of security

Proof of sequential work

Proof of space

Proof of spacetime

Proof of stake

Proof of storage

Proof of useful work

Proof of work

Provable security

Provably secure

Proxy re-encryption

Pseudo-random

Pseudorandom function (PRF)

Pseudorandom number generator (PRNG)

Pseudorandom permutation (PRP)

Public]]-key cryptography

PUF (physically unclonable function)

Puncturable encryption

Puncturable pseudorandom function (PPRF)

Q Quantum compute]]r

Quantum cryptography

Quantum encryption

Quantum key distribution

Quantum signature

QUIC (Quick UDP Internet Connections)

R Rabin cryptosystem

Rainbow tables

Random bits

Random oracle

Randomness

Range proof

RC4

RC5

RC6

Real world

Real World Crypto (RWC)

Rectangle attack

Related-key attack

Research papers

Revocation

Rijndael

Ring signature

RIPEMD-160

Rivest–Shamir–Adleman

ROBOT (Return Of Bleichenbacher’s Oracle Threat)

ROS

RSA

Rubber-hose cryptanalysis

Rumba20

S SAEP (Simplified OAEP)

Salsa20

Sandwich attack

S-box

Scalar

sci.crypt

Scrambler

scrypt

Searchable encryption

secp256k1

Secret sharing

Security

Security proof

Semantic security

Serious Cryptography

Serpent

SHA-0

SHA-1

SHA-2

SHA-3

SHA-3 competition

SHACAL

Shamir’s secret database

Shor’s algorithm

SHS (Secure Hash Standard)

Side channel

Side-channel attack

Sigaba

Signal protocol

Signature

Signcryption

SIKE (Supersingular Isogeny Key Encapsulation)

SIMECK

SIMON

SipHash

SIV-AES

Skipjack

Slide attack

SM

Smart contract

Snake-oil

SNARK (succinct non-interactive argument of knowledge)

SNIP (secret-shared non-interactive proof)

SNOW 3G

Solitaire

SPECK

SPEKE (Simple Password Exponential Key Exchange)

SPHINCS

Sponge function

SRP (Secure Remote Password)

SSH (Secure Shell)

SSL (Secure Socket Layer)

STARK (scalable transparent arguments of knowledge)

Steganography

Stream cipher

Substitution-permutation network (SPN)

Suck

Sugar beet auctions

Suite A

SUPERCOP

Superpolynomial complexity

SVP (shortest vector problem)

Symmetric-key cryptography

T TCC

Test vectors

Threefish

Threshold encryption

Threshold secret-sharing

Threshold signature

Time AI™

Time-lock encryption

Time-lock puzzle

Timing attack

TLS (Transport Layer Security)

Tor

Traitor tracing

Transfinite cryptography

Trapdoor

Triple DES

Trivium

True random number generator (TRNG)

Trusted third party

Tweakable block cipher

Twitter

Twofish

U Undeniable signature

Universal composability

Universal hash function

Updatable encryption

V Verifiable delay function (VDF)

Verifiable random function (VRF)

Verifiable unpredictable function (VUF)

Vigenère cipher

VSH (Very Smooth Hash)

W Wallet

Watermarking

White-box cryptography

Winternitz signature

WireGuard

X X25519

X3DH

XMSS (eXtended Merkle Signature Scheme)

XOF (extendable output function)

XOR

XOR encryption

Z Zerocash

ZKP (zero-knowledge proof)

ZRTP

crypto_dictionary.txt · Last modified: 2023/11/30 16:19 by Losang Jinpa PhD MCSE/MCT Python-DevOps