Crypto Dictionary by Jean-Philippe Aumasson
Return to Bibliography
Crypto Dictionary - ! Jean-Philippe Aumasson.txt
65537
A A5/0
A5/1
A5/2
A5/3
A5/4
AEAD (authenticated encryption with associated data)
AES (Advanced Encryption Standard)
AES-CCM
AES-NI
AES-SIV
AIM (Advanced INFOSEC Machine)
AKA
AKS (Agrawal–Kayal–Saxena)
Alice
All-or-nothing transform (AONT)
Anonymous signature
Applied Cryptography
Applied cryptography
ARC4
Argon2
ARX (Add-Rotate-XOR)
ASIACRYPT
Asymmetric cryptography
Attribute-based encryption (ABE)
Authenticated cipher
Axolotl
B Backdoor
Backward secrecy
Base64
BassOmatic
BB84
BIKE (Bit Flipping Key Encapsulation)
BIP (Bitcoin improvement proposal)
Bit Gold
Bitcoin
BLAKE
BLAKE2
BLAKE3
Bleichenbacher attack
Blind signature
Block cipher
Blockchain
Blockcipher
Blowfish
BLS (Boneh-Lynn-Shacham) signature
Bob
Boomerang attack
BQP (bounded-error quantum polynomial time)
Braid group cryptography
Brainpool curves
Break-in recovery
Broadcast encryption
Brute-force attack
Bulletproof
Byzantine fault tolerance
C CAESAR
Caesar’s cipher
CAVP (Cryptographic Algorithm Validation Program)
CBC (cipher block chaining)
CECPQ (combined elliptic-curve and post-quantum)
Cellular automata
Ceremony
Certificate
Certificate transparency (CT)
ChaCha20
CHES (Conference on Cryptographic Hardware and Embedded Systems)
CIA
Ciphertext stealing
Clipper
CMVP (Cryptographic Module Validation Program)
Commitment
Concurrent zero-knowledge
Consensus protocol
COPACOBANA (Cost-Optimized PArallel COde Breaker)
Cothority (collective authority)
Cryptids
CRYPTO
Crypto AG
Crypto period
Crypto wars
Cryptobiosis
Cryptonomicon
Cryptorchidism
CRYPTREC
CSIDH (Commutative Supersingular Isogeny Diffie–Hellman)
Cube attack
Curve25519
Curve448
Cypher
D Daemon
Davies–Meyer
Decentralized private computation
Déchiffrer
Décrypter
Deniable encryption
DES (Data Encryption Standard)
Diffie–Hellman
Disclosure
Distinguisher
Dolev–Yao model
Double ratchet
Dragonfly
DRBG (deterministic random bit generator)
DSA (Digital Signature Algorithm)
DSS (Digital Signature Standard)
DVB-CSA
E E0
ECC
ECDLP (Elliptic-curve discrete logarithm problem)
ECDSA (Elliptic-curve DSA)
ECIES (Elliptic-curve IES)
Ed25519
EdDSA
EKMS (Electronic Key Management System)
ElGamal
Elligator
Elliptic curve
Elliptic-curve cryptography
Encipherment
End-to-end encryption (E2EE)
Enigma
Entropy
Erathosthenes’ sieve
eSTREAM
Ethereum
Eurocrypt
Eve
E-voting
F Factoring problem
Feistel network
Fialka (Фиалка)
Fiat–Shamir
FIPS 140-2
FIPS 140-3
Forgery
Formal verification
Format-preserving encryption
Forward secrecy
FOX
FSE (Fast Software Encryption)
Fully homomorphic encryption
Future secrecy
Fuzzy extractor
G Generalized birthday problem
GNFS (General Number Field Sieve)
GOST
Grain
Gröbner basis
Grover’s algorithm
Heartbleed
HFE (Hidden Field Equations)
Homomorphic encryption
HPC (Hasty Pudding Cipher)
HSM (hardware security module)
HTTP/3
Hyperelliptic-curve cryptography
I IACR (International Association for Cryptologic Research)
IDEA (International Data Encryption Algorithm)
IDEA NXT
Identity-based encryption
IES (Integrated Encryption Scheme)
Impatient saboteur
Impossibility
Impossible differential attack
IND-CCA
IND-CPA
Indelibility
Indifferentiability
Indistinguishability obfuscation (iO)
Information-theoretic security
Invisible signature
IOTA
IPES (Improved Proposed Encryption Standard)
IPSec
ISO standard
Isogeny-based cryptography
K KASUMI
Keccak
KeeLoq
KEM (key encapsulation mechanism)
Kerberos
Kerckhoffs’ principles
Kleptography
Kupyna (Купина)
L Laconic zero-knowledge proof
Lai–Massey
Lattice-based cryptography
Le Chiffre
Leakage-resilient cryptography
Learning with errors (LWE)
Length-preserving encryption
LFSR (linear feedback shift register)
Lightweight cryptography
LM hash
Luby–Rackoff
Lucifer
M MAC (message authentication code)
MAGENTA
Malleability
Manger attack
Man-in-the-middle
MASH (Modular Arithmetic Secure Hash)
McEliece encryption scheme
MD4
MD5
MDC (Message Digest Cipher)
MDC-2 (Modification Detection Code 2)
Meet-in-the-middle
Merkle puzzle
Merkle tree
Merkle–Damgård construction
Mersenne twister
Message franking
Miller–Rabin
MINERVA
Mining
Misuse resistance
Mixnet
MQV (Menezes–Qu–Vanstone)
Multicollision
Multi-party computation (MPC)
Multivariate cryptography
N NBS (National Bureau of Standards)
NESSIE (New European Schemes for Signatures, Integrity, and Encryption)
“New Directions in Cryptography”
NFSR (nonlinear feedback shift register)
NIST (National Institute of Standards and Technology)
NIZK (non-interactive zero-knowledge)
Noekeon
Noise
Nonce
Non-committing encryption
Non-slanderability
NSA (National Security Agency)
NT hash
NTRU (Nth degree Truncated polynomial Ring Units)
Null cipher
O OAEP (Optimal Asymmetric Encryption Padding)
Oblivious key management system (OKMS)
Oblivious PRF (OPRF)
Oblivious RAM (ORAM)
Oblivious transfer
Obscurity
One-time pad
One-way function
Onion-AE
OPAQUE
OTR (Off-the-Record)
Pairing
Pairing-based cryptography
PAKE (password-authenticated key exchange)
PBKDF2 (Password-Based Key Derivation Function 2)
PCT (Private Communications Technology)
PEP (Plaintext equivalence proof)
Perfect forward secrecy
Permutation-based cryptography
PES (Proposed Encryption Standard)
PET (Plaintext equivalence test)
PFS
PGP (Pretty Good Privacy)
Photuris
Picnic
PKC
PKCS (Public]] Key Cryptography Standards)
Poly1305
Post-quantum cryptography
Post-quantum RSA
Prediction resistance
Preimage
PRESENT
PRIMES
Private information retrieval (PIR)
Proof of burn
Proof of catalytic space
Proof of replication
Proof of reserve
Proof of security
Proof of space
Proof of stake
Proof of storage
Proof of useful work
Proof of work
Provable security
Provably secure
Proxy re-encryption
Pseudorandom number generator (PRNG)
Pseudorandom permutation (PRP)
Public]]-key cryptography
PUF (physically unclonable function)
Puncturable encryption
Puncturable pseudorandom function (PPRF)
Q Quantum compute]]r
Quantum cryptography
Quantum encryption
Quantum signature
QUIC (Quick UDP Internet Connections)
Rainbow tables
Randomness
Range proof
RC4
RC5
RC6
Rectangle attack
Revocation
Rijndael
RIPEMD-160
Rivest–Shamir–Adleman
ROBOT (Return Of Bleichenbacher’s Oracle Threat)
ROS
RSA
Rumba20
S SAEP (Simplified OAEP)
Salsa20
Sandwich attack
S-box
sci.crypt
Scrambler
Searchable encryption
secp256k1
Secret sharing
Security proof
Semantic security
Serious Cryptography
Serpent
SHA-0
SHA-1
SHA-2
SHA-3
SHA-3 competition
SHACAL
Shor’s algorithm
Side channel
Side-channel attack
Sigaba
Signature
SIKE (Supersingular Isogeny Key Encapsulation)
SIMECK
SIMON
SipHash
SIV-AES
Skipjack
Slide attack
SM
Smart contract
Snake-oil
SNARK (succinct non-interactive argument of knowledge)
SNIP (secret-shared non-interactive proof)
SNOW 3G
Solitaire
SPECK
SPEKE (Simple Password Exponential Key Exchange)
SPHINCS
Sponge function
STARK (scalable transparent arguments of knowledge)
Steganography
Stream cipher
Substitution-permutation network (SPN)
Sugar beet auctions
Suite A
SUPERCOP
Symmetric-key cryptography
T TCC
Threefish
Threshold encryption
Threshold secret-sharing
Threshold signature
Time AI™
Timing attack
TLS (Transport Layer Security)
Tor
Traitor tracing
Transfinite cryptography
Trapdoor
Triple DES
Trivium
True random number generator (TRNG)
Twofish
U Undeniable signature
Updatable encryption
V Verifiable delay function (VDF)
Verifiable random function (VRF)
Verifiable unpredictable function (VUF)
Vigenère cipher
VSH (Very Smooth Hash)
W Wallet
Watermarking
Winternitz signature
WireGuard
X X25519
X3DH
XMSS (eXtended Merkle Signature Scheme)
XOF (extendable output function)
XOR
XOR encryption
Z Zerocash
ZRTP
Crypto Dictionary by Jean-Philippe Aumasson
Crypto Dictionary - ! Jean-Philippe Aumasson.txt
65537
A A5/0
A5/1
A5/2
A5/3
A5/4
AEAD (authenticated encryption with associated data)
AES (Advanced Encryption Standard)
AES-CCM
AES-NI
AES-SIV
AIM (Advanced INFOSEC Machine)
AKA
AKS (Agrawal–Kayal–Saxena)
Alice
All-or-nothing transform (AONT)
Anonymous signature
Applied Cryptography
Applied cryptography
ARC4
Argon2
ARX (Add-Rotate-XOR)
ASIACRYPT
Asymmetric cryptography
Attribute-based encryption (ABE)
Authenticated cipher
Axolotl
B Backdoor
Backward secrecy
Base64
BassOmatic
BB84
BIKE (Bit Flipping Key Encapsulation)
BIP (Bitcoin improvement proposal)
Bit Gold
Bitcoin
BLAKE
BLAKE2
BLAKE3
Bleichenbacher attack
Blind signature
Block cipher
Blockchain
Blockcipher
Blowfish
BLS (Boneh-Lynn-Shacham) signature
Bob
Boomerang attack
BQP (bounded-error quantum polynomial time)
Braid group cryptography
Brainpool curves
Break-in recovery
Broadcast encryption
Brute-force attack
Bulletproof
Byzantine fault tolerance
C CAESAR
Caesar’s cipher
CAVP (Cryptographic Algorithm Validation Program)
CBC (cipher block chaining)
CECPQ (combined elliptic-curve and post-quantum)
Cellular automata
Ceremony
Certificate
Certificate transparency (CT)
ChaCha20
CHES (Conference on Cryptographic Hardware and Embedded Systems)
CIA
Ciphertext stealing
Clipper
CMVP (Cryptographic Module Validation Program)
Commitment
Concurrent zero-knowledge
Consensus protocol
COPACOBANA (Cost-Optimized PArallel COde Breaker)
Cothority (collective authority)
Cryptids
CRYPTO
Crypto AG
Crypto period
Crypto wars
Cryptobiosis
Cryptonomicon
Cryptorchidism
CRYPTREC
CSIDH (Commutative Supersingular Isogeny Diffie–Hellman)
Cube attack
Curve25519
Curve448
Cypher
D Daemon
Davies–Meyer
Decentralized private computation
Déchiffrer
Décrypter
Deniable encryption
DES (Data Encryption Standard)
Diffie–Hellman
Disclosure
Distinguisher
Dolev–Yao model
Double ratchet
Dragonfly
DRBG (deterministic random bit generator)
DSA (Digital Signature Algorithm)
DSS (Digital Signature Standard)
DVB-CSA
E E0
ECC
ECDLP (Elliptic-curve discrete logarithm problem)
ECDSA (Elliptic-curve DSA)
ECIES (Elliptic-curve IES)
Ed25519
EdDSA
EKMS (Electronic Key Management System)
ElGamal
Elligator
Elliptic curve
Elliptic-curve cryptography
Encipherment
End-to-end encryption (E2EE)
Enigma
Entropy
Erathosthenes’ sieve
eSTREAM
Ethereum
Eurocrypt
Eve
E-voting
F Factoring problem
Feistel network
Fialka (Фиалка)
Fiat–Shamir
FIPS 140-2
FIPS 140-3
Forgery
Formal verification
Format-preserving encryption
Forward secrecy
FOX
FSE (Fast Software Encryption)
Fully homomorphic encryption
Future secrecy
Fuzzy extractor
G Generalized birthday problem
GNFS (General Number Field Sieve)
GOST
Grain
Gröbner basis
Grover’s algorithm
Heartbleed
HFE (Hidden Field Equations)
Homomorphic encryption
HPC (Hasty Pudding Cipher)
HSM (hardware security module)
HTTP/3
Hyperelliptic-curve cryptography
I IACR (International Association for Cryptologic Research)
IDEA (International Data Encryption Algorithm)
IDEA NXT
Identity-based encryption
IES (Integrated Encryption Scheme)
Impatient saboteur
Impossibility
Impossible differential attack
IND-CCA
IND-CPA
Indelibility
Indifferentiability
Indistinguishability obfuscation (iO)
Information-theoretic security
Invisible signature
IOTA
IPES (Improved Proposed Encryption Standard)
IPSec
ISO standard
Isogeny-based cryptography
K KASUMI
Keccak
KeeLoq
KEM (key encapsulation mechanism)
Kerberos
Kerckhoffs’ principles
Kleptography
Kupyna (Купина)
L Laconic zero-knowledge proof
Lai–Massey
Lattice-based cryptography
Le Chiffre
Leakage-resilient cryptography
Learning with errors (LWE)
Length-preserving encryption
LFSR (linear feedback shift register)
Lightweight cryptography
LM hash
Luby–Rackoff
Lucifer
M MAC (message authentication code)
MAGENTA
Malleability
Manger attack
Man-in-the-middle
MASH (Modular Arithmetic Secure Hash)
McEliece encryption scheme
MD4
MD5
MDC (Message Digest Cipher)
MDC-2 (Modification Detection Code 2)
Meet-in-the-middle
Merkle puzzle
Merkle tree
Merkle–Damgård construction
Mersenne twister
Message franking
Miller–Rabin
MINERVA
Mining
Misuse resistance
Mixnet
MQV (Menezes–Qu–Vanstone)
Multicollision
Multi-party computation (MPC)
Multivariate cryptography
N NBS (National Bureau of Standards)
NESSIE (New European Schemes for Signatures, Integrity, and Encryption)
“New Directions in Cryptography”
NFSR (nonlinear feedback shift register)
NIST (National Institute of Standards and Technology)
NIZK (non-interactive zero-knowledge)
Noekeon
Noise
Nonce
Non-committing encryption
Non-slanderability
NSA (National Security Agency)
NT hash
NTRU (Nth degree Truncated polynomial Ring Units)
Null cipher
O OAEP (Optimal Asymmetric Encryption Padding)
Oblivious key management system (OKMS)
Oblivious PRF (OPRF)
Oblivious RAM (ORAM)
Oblivious transfer
Obscurity
One-time pad
One-way function
Onion-AE
OPAQUE
OTR (Off-the-Record)
Pairing
Pairing-based cryptography
PAKE (password-authenticated key exchange)
PBKDF2 (Password-Based Key Derivation Function 2)
PCT (Private Communications Technology)
PEP (Plaintext equivalence proof)
Perfect forward secrecy
Permutation-based cryptography
PES (Proposed Encryption Standard)
PET (Plaintext equivalence test)
PFS
PGP (Pretty Good Privacy)
Photuris
Picnic
PKC
PKCS (Public]] Key Cryptography Standards)
Poly1305
Post-quantum cryptography
Post-quantum RSA
Prediction resistance
Preimage
PRESENT
PRIMES
Private information retrieval (PIR)
Proof of burn
Proof of catalytic space
Proof of replication
Proof of reserve
Proof of security
Proof of space
Proof of stake
Proof of storage
Proof of useful work
Proof of work
Provable security
Provably secure
Proxy re-encryption
Pseudorandom number generator (PRNG)
Pseudorandom permutation (PRP)
Public]]-key cryptography
PUF (physically unclonable function)
Puncturable encryption
Puncturable pseudorandom function (PPRF)
Q Quantum compute]]r
Quantum cryptography
Quantum encryption
Quantum signature
QUIC (Quick UDP Internet Connections)
Rainbow tables
Randomness
Range proof
RC4
RC5
RC6
Rectangle attack
Revocation
Rijndael
RIPEMD-160
Rivest–Shamir–Adleman
ROBOT (Return Of Bleichenbacher’s Oracle Threat)
ROS
RSA
Rumba20
S SAEP (Simplified OAEP)
Salsa20
Sandwich attack
S-box
sci.crypt
Scrambler
Searchable encryption
secp256k1
Secret sharing
Security proof
Semantic security
Serious Cryptography
Serpent
SHA-0
SHA-1
SHA-2
SHA-3
SHA-3 competition
SHACAL
Shor’s algorithm
Side channel
Side-channel attack
Sigaba
Signature
SIKE (Supersingular Isogeny Key Encapsulation)
SIMECK
SIMON
SipHash
SIV-AES
Skipjack
Slide attack
SM
Smart contract
Snake-oil
SNARK (succinct non-interactive argument of knowledge)
SNIP (secret-shared non-interactive proof)
SNOW 3G
Solitaire
SPECK
SPEKE (Simple Password Exponential Key Exchange)
SPHINCS
Sponge function
STARK (scalable transparent arguments of knowledge)
Steganography
Stream cipher
Substitution-permutation network (SPN)
Suck
Sugar beet auctions
Suite A
SUPERCOP
Symmetric-key cryptography
T TCC
Threefish
Threshold encryption
Threshold secret-sharing
Threshold signature
Time AI™
Timing attack
TLS (Transport Layer Security)
Tor
Traitor tracing
Transfinite cryptography
Trapdoor
Triple DES
Trivium
True random number generator (TRNG)
Twofish
U Undeniable signature
Updatable encryption
V Verifiable delay function (VDF)
Verifiable random function (VRF)
Verifiable unpredictable function (VUF)
Vigenère cipher
VSH (Very Smooth Hash)
W Wallet
Watermarking
Winternitz signature
WireGuard
X X25519
X3DH
XMSS (eXtended Merkle Signature Scheme)
XOF (extendable output function)
XOR
XOR encryption
Z Zerocash
ZRTP