Category:Cryptographic algorithms
Appearance
process of hiding information, which is conversion of the original representation of the information, known as plaintext, into an alternative form known as ciphertext | |||||
Upload media | |||||
Instance of |
| ||||
---|---|---|---|---|---|
Subclass of |
| ||||
Part of | |||||
Facet of |
| ||||
Has use |
| ||||
| |||||
![]() |
Subcategories
This category has the following 7 subcategories, out of 7 total.
Media in category "Cryptographic algorithms"
The following 62 files are in this category, out of 62 total.
-
5D3L9633 (13189960294).jpg 5,760 × 3,840; 6.19 MB
-
Advantage of IND-CPA Guess Game.svg 267 × 41; 31 KB
-
Aks comparison log.jpg 689 × 379; 157 KB
-
Asymmetric signature algorithms.svg 248 × 125; 26 KB
-
Back ward.png 819 × 646; 30 KB
-
BerlekampMasseyAlgorithm.png 1,776 × 3,223; 44 KB
-
BerlekampMasseyExample01.png 269 × 80; 430 bytes
-
Carré de Polybe avec chiffres et symboles.png 384 × 347; 10 KB
-
Carré de Polybe avec chiffres.png 201 × 205; 6 KB
-
Carré de Polybe Wikipédia.png 171 × 175; 4 KB
-
Carré de Polybe.png 170 × 177; 4 KB
-
Cascade MAC algorithm.svg 406 × 295; 39 KB
-
Cast-256.png 193 × 345; 39 KB
-
Codifica wep.jpg 845 × 350; 22 KB
-
Cryptiom core.png 962 × 722; 153 KB
-
Cryptographic Hash Function.svg 740 × 536; 15 KB
-
CubeHash FlowChart.svg 1,098 × 1,453; 8 KB
-
Decryption.svg 136 × 115; 32 KB
-
Digital signature attacker.svg 173 × 292; 41 KB
-
Dvbcsa block encrypt.svg 1,140 × 790; 34 KB
-
Dvbcsa stream.svg 2,420 × 1,320; 115 KB
-
E-function.png 930 × 682; 142 KB
-
Encryption.svg 136 × 115; 31 KB
-
Entschlüsselung (symmetrisches und asymmetrisches Kryptosystem).png 1,400 × 700; 16 KB
-
Forward layer.png 858 × 722; 130 KB
-
GOST-hash-calculation.gif 810 × 112; 2 KB
-
GOST-hash-calculation.svg 810 × 112; 14 KB
-
GOST-psi-function.gif 325 × 196; 3 KB
-
GOST-psi-function.svg 336 × 196; 10 KB
-
GOST-R-34.11-94-shuffle-transformation.gif 518 × 49; 1,007 bytes
-
GOST-R-34.11-94-shuffle-transformation.svg 518 × 49; 12 KB
-
GOST-step-hash-function.gif 184 × 60; 540 bytes
-
GOST-step-hash-function.svg 164 × 60; 6 KB
-
Hash function el.svg 520 × 352; 88 KB
-
Hasq hash chains.png 487 × 377; 26 KB
-
HMACFig2.jpg 684 × 712; 85 KB
-
Homophone Verschluesselung.jpg 858 × 725; 115 KB
-
IND-CPA Guess Cryptographic Game.svg 175 × 175; 61 KB
-
JacobianQuartic.svg 600 × 500; 20 KB
-
Kura 2.jpg 996 × 828; 144 KB
-
Layer up.png 919 × 682; 176 KB
-
Le chiffrement, maintenant.pdf 1,239 × 1,754, 32 pages; 567 KB
-
LEA enc round function.png 1,228 × 694; 36 KB
-
LFSR-F4.GIF 500 × 300; 13 KB
-
MAC algorithms.svg 248 × 182; 20 KB
-
MAC attacker.svg 173 × 292; 34 KB
-
Offsystem.mainline.logo1.png 450 × 300; 59 KB
-
Open TDF Icon.png 98 × 129; 14 KB
-
Permutation finale.svg 1,301 × 707; 241 KB
-
Phelix InfoBox Diagram.png 762 × 246; 8 KB
-
Pohlig-Hellman-Diagram.svg 234 × 142; 40 KB
-
Randu.png 1,280 × 705; 18 KB
-
Randu2.png 239 × 287; 6 KB
-
Ring-signature.svg 259 × 180; 46 KB
-
Rsaalternatives.jpg 780 × 338; 49 KB
-
Sha-family.svg 403 × 507; 27 KB
-
Signature attacker reduction.svg 228 × 289; 70 KB
-
Structure layer.png 962 × 722; 183 KB
-
Tripling oriented.svg 600 × 500; 21 KB
-
Verschlüsselung.ogg 11 min 6 s; 7.48 MB
-
Протокол Т-12.jpg 1,024 × 651; 122 KB
-
クイズ (13189970174).jpg 5,760 × 3,840; 7.51 MB