Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Cryptography
An Entity of Type:
Concept
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
692160
(xsd:integer)
dbo:
wikiPageRevisionID
1060931574
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Commons_category
dbt
:See_also
dbt
:CatAutoTOC
dbt
:Cat_main
dbt
:Category_diffuse
rdf:
type
skos
:Concept
rdfs:
label
Cryptography
(en)
skos:
broader
dbc
:Military_communications
dbc
:Cyberwarfare
dbc
:Secrecy
dbc
:Espionage_techniques
dbc
:Applied_mathematics
dbc
:Secure_communication
dbc
:Computer_security
skos:
prefLabel
Cryptography
(en)
prov:
wasDerivedFrom
wikipedia-en
:Category:Cryptography?oldid=1060931574&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:Bcrypt
dbr
:PrivateCore
dbr
:Quark_(hash_function)
dbr
:Electronic_signature
dbr
:Encrypted_function
dbr
:Encryption
dbr
:End-to-end_encryption
dbr
:Enhanced_privacy_ID
dbr
:Entropic_security
dbr
:Ephemeral_key
dbr
:List_of_cryptosystems
dbr
:NIPRNet
dbr
:S/MIME
dbr
:MDS_matrix
dbr
:Symmetric_Boolean_function
dbr
:Online_credentials_for_learning
dbr
:Password-authenticated_key_agreement
dbr
:Password-based_cryptography
dbr
:Password_Authenticated_Key_Exchange_by_Juggling
dbr
:Private_set_intersection
dbr
:Bitcoin_Gold
dbr
:Anonymous_matching
dbr
:Anonymous_remailer
dbr
:Human_rights_and_encryption
dbr
:Hyper-encryption
dbr
:Undeniable_signature
dbr
:Unicity_distance
dbr
:Decipherment
dbr
:Designated_verifier_signature
dbr
:Device-independent_quantum_cryptography
dbr
:ESign_(India)
dbr
:Index_of_coincidence
dbr
:Information_leakage
dbr
:Information_security
dbr
:Initialization_vector
dbr
:Kurzsignale
dbr
:Letter_frequency
dbr
:Signals_intelligence
dbr
:Proof_of_Space_and_Time
dbr
:Proof_of_identity_(blockchain_consensus)
dbr
:Proof_of_knowledge
dbr
:Proof_of_personhood
dbr
:Pseudorandom_ensemble
dbr
:Pseudorandom_generator
dbr
:Security_parameter
dbr
:Nothing-up-my-sleeve_number
dbr
:Zk_STARK
dbr
:123_Reg
dbr
:Comparison_of_cryptographic_hash_functions
dbr
:Computer_security
dbr
:Concrete_security
dbr
:CrypTool
dbr
:Cryptographic_hash_function
dbr
:Cryptography
dbr
:Mask_generation_function
dbr
:Memory-hard_function
dbr
:Salt_(cryptography)
dbr
:Generic_group_model
dbr
:One-time_pad
dbr
:One-way_function
dbr
:Onion_routing
dbr
:Security_through_obscurity
dbr
:Superincreasing_sequence
dbr
:Plaintext
dbr
:Secure_voice
dbr
:Quantum_Byzantine_agreement
dbr
:Quantum_key_distribution
dbr
:RSA_Award_for_Excellence_in_Mathematics
dbr
:Election_security
dbr
:Conjugate_coding
dbr
:Convergent_encryption
dbr
:Correlation_immunity
dbr
:Critical_security_parameter
dbr
:CrySyS_Lab
dbr
:Crypto-shredding
dbr
:CryptoParty
dbr
:Crypto_Wars
dbr
:Crypto_naming_controversy
dbr
:Cryptochannel
dbr
:Cryptographic_High_Value_Product
dbr
:Cryptographic_Module_Testing_Laboratory
dbr
:Cryptographic_Service_Provider
dbr
:Cryptographic_multilinear_map
dbr
:Cryptographic_nonce
dbr
:Cryptosystem
dbr
:Cryptovirology
dbr
:Mimic_function
dbr
:Transmission_security
dbr
:Batch_cryptography
dbr
:Subliminal_channel
dbr
:Client-side_encryption
dbr
:CloudMask
dbr
:Colored_Coins
dbr
:Communications_security
dbr
:Completeness_(cryptography)
dbr
:Deniable_encryption
dbr
:Zcash
dbr
:Feistel_cipher
dbr
:Hardware-based_encryption
dbr
:Hardware_random_number_generator
dbr
:Key-agreement_protocol
dbr
:Key-based_routing
dbr
:Key_(cryptography)
dbr
:Key_Management_Interoperability_Protocol
dbr
:Key_checksum_value
dbr
:Key_derivation_function
dbr
:Key_distribution_in_wireless_sensor_networks
dbr
:Keyring_(cryptography)
dbr
:Normal_basis
dbr
:Security_association
dbr
:Padding_(cryptography)
dbr
:Pepper_(cryptography)
dbr
:Polygraphic_substitution
dbr
:Post-quantum_cryptography
dbr
:Prince_(cipher)
dbr
:Privilege_Management_Infrastructure
dbr
:Probabilistic_signature_scheme
dbr
:Proof_of_space
dbr
:Proof_of_stake
dbr
:Proof_of_work
dbr
:Public-key_cryptography
dbr
:STARK_(cryptography)
dbr
:Standard_model_(cryptography)
dbr
:Substitution_cipher
dbr
:Trusted_third_party
dbr
:Master/Session
dbr
:Musical_cryptogram
dbr
:Tor_(network)
dbr
:Trace_zero_cryptography
dbr
:Trusted_Computing
dbr
:Data_at_rest
dbr
:Data_in_use
dbr
:Database_encryption
dbr
:Garlic_routing
dbr
:HKDF
dbr
:HTTP_Strict_Transport_Security
dbr
:HashClash
dbr
:Hashgraph
dbr
:Lattice-based_cryptography
dbr
:Lattice_problem
dbr
:Lattice_reduction
dbr
:Learning_with_errors
dbr
:Link_encryption
dbr
:Secure_two-party_computation
dbr
:Three-stage_quantum_cryptography_protocol
dbr
:Protocol_composition_logic
dbr
:Texas_Instruments_signing_key_controversy
dbr
:Voice_inversion
dbr
:Adaptive_Redaction
dbr
:Advanced_Encryption_Standard
dbr
:Cypherpunks_(book)
dbr
:Factorization_of_polynomials_over_finite_fields
dbr
:Forward_anonymity
dbr
:Bring_your_own_encryption
dbr
:Non-commutative_cryptography
dbr
:POODLE
dbr
:DigiDoc
dbr
:Digital_credential
dbr
:Dining_cryptographers_problem
dbr
:Diplomatic_bag
dbr
:Direct_Anonymous_Attestation
dbr
:Discrete_logarithm
dbr
:Discriminant_Book
dbr
:Floradora
dbr
:Forking_lemma
dbr
:Format-preserving_encryption
dbr
:Format-transforming_encryption
dbr
:KLJN_Secure_Key_Exchange
dbr
:Provable_security
dbr
:Quantum_cryptography
dbr
:RCCA_security
dbr
:Randomness
dbr
:Ring_learning_with_errors
dbr
:BREACH
dbr
:Backdoor_(computing)
dbr
:Cover-coding
dbr
:Cover_(telecommunications)
dbr
:Hybrid_argument_(Cryptography)
dbr
:Hybrid_cryptosystem
dbr
:Yao's_test
dbr
:TRESOR
dbr
:Software_token
dbr
:Accumulator_(cryptography)
dbr
:Chaos_Communication_Congress
dbr
:Kerckhoffs's_principle
dbr
:Key_ceremony
dbr
:Blacker_(security)
dbr
:Blinding_(cryptography)
dbr
:Blocknots
dbr
:Blom's_scheme
dbr
:Code_(cryptography)
dbr
:Code_word
dbr
:Codebook
dbr
:Codress_message
dbr
:Honey_encryption
dbr
:Tokenization_(data_security)
dbr
:Trapdoor_function
dbr
:YAK_(cryptography)
dbr
:Mix_network
dbr
:Mlecchita_vikalpa
dbr
:Noisy-storage_model
dbr
:Pizzino
dbr
:Self-shrinking_generator
dbr
:Relativistic_quantum_cryptography
dbr
:Array_controller_based_encryption
dbr
:Bus_encryption
dbr
:Cipher
dbr
:Ciphertext
dbr
:Ciphertext_expansion
dbr
:Ciphertext_indistinguishability
dbr
:Group_key
dbr
:I2P
dbr
:Offensive_Security
dbr
:Red/black_concept
dbr
:Chaffing_and_winnowing
dbr
:Chaotic_cryptology
dbr
:Secret_sharing
dbr
:Knapsack_cryptosystems
dbr
:Knapsack_problem
dbr
:MIME_Object_Security_Services
dbr
:Messaging_Layer_Security
dbr
:Microsoft_Security_Development_Lifecycle
dbr
:Searchable_symmetric_encryption
dbr
:Server-Gated_Cryptography
dbr
:SFINKS
dbr
:Scrambler
dbr
:Secure_Hash_Algorithms
dbr
:Snake_oil_(cryptography)
dbr
:Verifiable_secret_sharing
dbr
:Niederreiter_cryptosystem
dbr
:Strong_secrecy
dbr
:Strong_cryptography
dbr
:Short_Weather_Cipher
dbr
:Point-to-point_encryption
dbr
:Malleability_(cryptography)
dbr
:Sacher_hexachord
dbr
:NTRUSign
dbr
:Naor–Reingold_pseudorandom_function
dbr
:Schlüsselgerät_41
dbr
:Proxy_re-encryption
dbr
:Security_protocol_notation
dbr
:Password_strength
dbr
:SIPRNet
dbr
:Mulabhadra
dbr
:Multiple_encryption
dbr
:PhotoDNA
dbr
:SPKAC
dbr
:Tamper_resistance
dbr
:Signatures_with_efficient_protocols
dbr
:Secure_channel
dbr
:Security_level
dbr
:SegWit
dbr
:Server-based_signatures
dbr
:WYSIWYS
dbr
:Philco_computers
dbr
:Passphrase
dbr
:Outline_of_cryptography
dbr
:PGP_word_list
dbr
:PKIoverheid
dbr
:PRESENT
dbr
:PURB_(cryptography)
dbr
:Smart-ID
dbr
:Random_oracle
dbr
:Statistically_close
dbr
:SIGINT_Activity_Designator
dbr
:Unknown_key-share_attack
dbr
:Visual_cryptography
dbr
:Ring_learning_with_errors_signature
dbr
:Tropical_cryptography
dbr
:Stencil_Subtractor
dbr
:Structured_encryption
is
dcterms:
subject
of
dbr
:Bcrypt
dbr
:PrivateCore
dbr
:Quark_(hash_function)
dbr
:Electronic_signature
dbr
:Encrypted_function
dbr
:Encryption
dbr
:End-to-end_encryption
dbr
:Enhanced_privacy_ID
dbr
:Entropic_security
dbr
:Ephemeral_key
dbr
:List_of_cryptosystems
dbr
:NIPRNet
dbr
:S/MIME
dbr
:MDS_matrix
dbr
:Symmetric_Boolean_function
dbr
:Online_credentials_for_learning
dbr
:Password-authenticated_key_agreement
dbr
:Password-based_cryptography
dbr
:Password_Authenticated_Key_Exchange_by_Juggling
dbr
:Private_set_intersection
dbr
:Bitcoin_Gold
dbr
:Anonymous_matching
dbr
:Anonymous_remailer
dbr
:Human_rights_and_encryption
dbr
:Hyper-encryption
dbr
:Undeniable_signature
dbr
:Unicity_distance
dbr
:Decipherment
dbr
:Designated_verifier_signature
dbr
:Device-independent_quantum_cryptography
dbr
:ESign_(India)
dbr
:Index_of_coincidence
dbr
:Information_leakage
dbr
:Information_security
dbr
:Initialization_vector
dbr
:Kurzsignale
dbr
:Letter_frequency
dbr
:Signals_intelligence
dbr
:Proof_of_Space_and_Time
dbr
:Proof_of_identity_(blockchain_consensus)
dbr
:Proof_of_knowledge
dbr
:Proof_of_personhood
dbr
:Pseudorandom_ensemble
dbr
:Pseudorandom_generator
dbr
:Security_parameter
dbr
:Nothing-up-my-sleeve_number
dbr
:Zk_STARK
dbr
:123_Reg
dbr
:Comparison_of_cryptographic_hash_functions
dbr
:Computer_security
dbr
:Concrete_security
dbr
:CrypTool
dbr
:Cryptographic_hash_function
dbr
:Cryptography
dbr
:Mask_generation_function
dbr
:Memory-hard_function
dbr
:Salt_(cryptography)
dbr
:Generic_group_model
dbr
:One-time_pad
dbr
:One-way_function
dbr
:Onion_routing
dbr
:Security_through_obscurity
dbr
:Superincreasing_sequence
dbr
:Plaintext
dbr
:Secure_voice
dbr
:Quantum_Byzantine_agreement
dbr
:Quantum_key_distribution
dbr
:RSA_Award_for_Excellence_in_Mathematics
dbr
:Election_security
dbr
:Conjugate_coding
dbr
:Convergent_encryption
dbr
:Correlation_immunity
dbr
:Critical_security_parameter
dbr
:CrySyS_Lab
dbr
:Crypto-shredding
dbr
:CryptoParty
dbr
:Crypto_Wars
dbr
:Crypto_naming_controversy
dbr
:Cryptochannel
dbr
:Cryptographic_High_Value_Product
dbr
:Cryptographic_Module_Testing_Laboratory
dbr
:Cryptographic_Service_Provider
dbr
:Cryptographic_multilinear_map
dbr
:Cryptographic_nonce
dbr
:Cryptosystem
dbr
:Cryptovirology
dbr
:Mimic_function
dbr
:Transmission_security
dbr
:Batch_cryptography
dbr
:Subliminal_channel
dbr
:Client-side_encryption
dbr
:CloudMask
dbr
:Colored_Coins
dbr
:Communications_security
dbr
:Completeness_(cryptography)
dbr
:Deniable_encryption
dbr
:Zcash
dbr
:Feistel_cipher
dbr
:Hardware-based_encryption
dbr
:Hardware_random_number_generator
dbr
:Key-agreement_protocol
dbr
:Key-based_routing
dbr
:Key_(cryptography)
dbr
:Key_Management_Interoperability_Protocol
dbr
:Key_checksum_value
dbr
:Key_derivation_function
dbr
:Key_distribution_in_wireless_sensor_networks
dbr
:Keyring_(cryptography)
dbr
:Normal_basis
dbr
:Security_association
dbr
:Padding_(cryptography)
dbr
:Pepper_(cryptography)
dbr
:Polygraphic_substitution
dbr
:Post-quantum_cryptography
dbr
:Prince_(cipher)
dbr
:Privilege_Management_Infrastructure
dbr
:Probabilistic_signature_scheme
dbr
:Proof_of_space
dbr
:Proof_of_stake
dbr
:Proof_of_work
dbr
:Public-key_cryptography
dbr
:STARK_(cryptography)
dbr
:Standard_model_(cryptography)
dbr
:Substitution_cipher
dbr
:Trusted_third_party
dbr
:Master/Session
dbr
:Musical_cryptogram
dbr
:Tor_(network)
dbr
:Trace_zero_cryptography
dbr
:Trusted_Computing
dbr
:Data_at_rest
dbr
:Data_in_use
dbr
:Database_encryption
dbr
:Garlic_routing
dbr
:HKDF
dbr
:HTTP_Strict_Transport_Security
dbr
:HashClash
dbr
:Hashgraph
dbr
:Lattice-based_cryptography
dbr
:Lattice_problem
dbr
:Lattice_reduction
dbr
:Learning_with_errors
dbr
:Link_encryption
dbr
:Secure_two-party_computation
dbr
:Three-stage_quantum_cryptography_protocol
dbr
:Protocol_composition_logic
dbr
:Texas_Instruments_signing_key_controversy
dbr
:Voice_inversion
dbr
:Adaptive_Redaction
dbr
:Advanced_Encryption_Standard
dbr
:Cypherpunks_(book)
dbr
:Factorization_of_polynomials_over_finite_fields
dbr
:Forward_anonymity
dbr
:Bring_your_own_encryption
dbr
:Non-commutative_cryptography
dbr
:POODLE
dbr
:DigiDoc
dbr
:Digital_credential
dbr
:Dining_cryptographers_problem
dbr
:Diplomatic_bag
dbr
:Direct_Anonymous_Attestation
dbr
:Discrete_logarithm
dbr
:Discriminant_Book
dbr
:Floradora
dbr
:Forking_lemma
dbr
:Format-preserving_encryption
dbr
:Format-transforming_encryption
dbr
:KLJN_Secure_Key_Exchange
dbr
:Provable_security
dbr
:Quantum_cryptography
dbr
:RCCA_security
dbr
:Randomness
dbr
:Ring_learning_with_errors
dbr
:BREACH
dbr
:Backdoor_(computing)
dbr
:Cover-coding
dbr
:Cover_(telecommunications)
dbr
:Hybrid_argument_(Cryptography)
dbr
:Hybrid_cryptosystem
dbr
:Yao's_test
dbr
:TRESOR
dbr
:Software_token
dbr
:Accumulator_(cryptography)
dbr
:Chaos_Communication_Congress
dbr
:Kerckhoffs's_principle
dbr
:Key_ceremony
dbr
:Blacker_(security)
dbr
:Blinding_(cryptography)
dbr
:Blocknots
dbr
:Blom's_scheme
dbr
:Code_(cryptography)
dbr
:Code_word
dbr
:Codebook
dbr
:Codress_message
dbr
:Honey_encryption
dbr
:Tokenization_(data_security)
dbr
:Trapdoor_function
dbr
:YAK_(cryptography)
dbr
:Mix_network
dbr
:Mlecchita_vikalpa
dbr
:Noisy-storage_model
dbr
:Pizzino
dbr
:Self-shrinking_generator
dbr
:Relativistic_quantum_cryptography
dbr
:Array_controller_based_encryption
dbr
:Bus_encryption
dbr
:Cipher
dbr
:Ciphertext
dbr
:Ciphertext_expansion
dbr
:Ciphertext_indistinguishability
dbr
:Group_key
dbr
:I2P
dbr
:Offensive_Security
dbr
:Red/black_concept
dbr
:Chaffing_and_winnowing
dbr
:Chaotic_cryptology
dbr
:Secret_sharing
dbr
:Knapsack_cryptosystems
dbr
:Knapsack_problem
dbr
:MIME_Object_Security_Services
dbr
:Messaging_Layer_Security
dbr
:Microsoft_Security_Development_Lifecycle
dbr
:Searchable_symmetric_encryption
dbr
:Server-Gated_Cryptography
dbr
:SFINKS
dbr
:Scrambler
dbr
:Secure_Hash_Algorithms
dbr
:Snake_oil_(cryptography)
dbr
:Verifiable_secret_sharing
dbr
:Niederreiter_cryptosystem
dbr
:Strong_secrecy
dbr
:Strong_cryptography
dbr
:Short_Weather_Cipher
dbr
:Point-to-point_encryption
dbr
:Malleability_(cryptography)
dbr
:Sacher_hexachord
dbr
:NTRUSign
dbr
:Naor–Reingold_pseudorandom_function
dbr
:Schlüsselgerät_41
dbr
:Proxy_re-encryption
dbr
:Security_protocol_notation
dbr
:Password_strength
dbr
:SIPRNet
dbr
:Mulabhadra
dbr
:Multiple_encryption
dbr
:PhotoDNA
dbr
:SPKAC
dbr
:Tamper_resistance
dbr
:Signatures_with_efficient_protocols
dbr
:Secure_channel
dbr
:Security_level
dbr
:SegWit
dbr
:Server-based_signatures
dbr
:WYSIWYS
dbr
:Philco_computers
dbr
:Passphrase
dbr
:Outline_of_cryptography
dbr
:PGP_word_list
dbr
:PKIoverheid
dbr
:PRESENT
dbr
:PURB_(cryptography)
dbr
:Smart-ID
dbr
:Random_oracle
dbr
:Statistically_close
dbr
:SIGINT_Activity_Designator
dbr
:Unknown_key-share_attack
dbr
:Visual_cryptography
dbr
:Ring_learning_with_errors_signature
dbr
:Tropical_cryptography
dbr
:Stencil_Subtractor
dbr
:Structured_encryption
is
skos:
broader
of
dbc
:Applications_of_cryptography
dbc
:Public-key_cryptography
dbc
:Disk_encryption
dbc
:Cryptologic_education
dbc
:Cryptography_publications
dbc
:National_Security_Agency_cryptography
dbc
:Cryptographers
dbc
:Cryptographic_attacks
dbc
:Cryptographic_protocols
dbc
:History_of_cryptography
dbc
:Security_engineering
dbc
:Steganography
dbc
:Symmetric-key_cryptography
dbc
:Cryptographic_software
dbc
:Cryptography_law
dbc
:Cryptography_standards
dbc
:Key_management
dbc
:Cryptography_organizations
dbc
:Cryptography_contests
dbc
:Theory_of_cryptography
dbc
:Classical_cryptography
dbc
:Cryptographic_primitives
dbc
:Cryptographic_algorithms
dbc
:Cryptographic_hardware
dbc
:Post-quantum_cryptography
dbc
:Quantum_cryptography
dbc
:Cryptography_lists_and_comparisons
is
skos:
related
of
dbc
:WikiProject_Cryptography
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License