Jump to content
Wikipedia The Free Encyclopedia

User:Matt Crypto/Crypto hits March-2004

From Wikipedia, the free encyclopedia

Page accesses for articles in cryptography, sorted by number of hits, in March 2004. Counts for redirects have been absorbed into that of the main article.

Hits Article name
-------------------------------------
3794 Cryptography
2160 Alan Turing
1743 Digital rights management
1477 Zimmermann Telegram
1437 RSA
1368 Public-key cryptography
1272 Steganography
1254 Enigma machine
1175 One-time pad
1123 Knapsack problem
1118 Polyalphabetic cipher
1099 Data Encryption Standard
1036 Pseudorandom number generator
1035 National Security Agency
1013 Code
1006 Advanced Encryption Standard
954 Digital signature
928 RC4 cipher
916 Voynich Manuscript
876 ROT13
873 Man in the middle attack
872 Transport Layer Security
830 DeCSS
827 ECHELON
826 MD5
802 Encryption
795 Asymmetric key algorithm
792 Diffie-Hellman key exchange
791 Dictionary attack
791 Exclusive disjunction
782 Topics in cryptography
738 Key signature
728 Cipher
717 Zimmermann Telegram
704 Symmetric key algorithm
702 Secure shell
697 Quantum cryptography
679 Wired Equivalent Privacy
651 IPSec
638 Triple DES
615 Substitution cipher
610 SHA-1
609 Cryptanalysis
599 List of cryptography topics
596 Wi-Fi Protected Access
592 Illegal prime
566 Fritz-chip
563 Block cipher
555 Elliptic curve cryptography
547 Password cracking
545 Invisible ink
540 ElGamal discrete log cryptosystem
538 Feistel cipher
505 Discrete logarithm
497 Colossus computer
484 Birthday attack
482 Information security
474 HTTPS
448 Digital Signature Algorithm
448 Brute force attack
448 Caesar cipher
447 Hardware random number generator
445 Content-scrambling system
442 TEMPEST
426 Claude Shannon
424 Purple code
423 Stream cipher
409 Security through obscurity
397 Frequency analysis
396 Babington plot
386 Encode
384 Authentication
377 Adi Shamir
373 Cryptographic key
370 International Data Encryption Algorithm
365 Kerckhoffs' law
362 Bletchley Park
357 Blum Blum Shub
357 Electronic voting
348 Cryptonomicon
343 Plaintext
336 Differential cryptanalysis
335 Crypto-anarchism
331 Atbash cipher
324 Government Communications Headquarters
321 Ron Rivest
318 Rijndael
314 VENONA project
313 Block cipher modes of operation
313 Ultra
311 Cryptographic hash function
311 Linear feedback shift register
303 Electronic money
303 Password
300 Leonard Adleman
299 SIGINT
294 Pretty Good Privacy
288 X.509
284 William F. Friedman
280 Kerberos
279 GNU Privacy Guard
277 Snake oil
275 List of cryptographers
274 Polybius square
273 Cryptographically secure pseudo-random number generator
270 Leone Battista Alberti
265 Decipherment
259 Blowfish encryption algorithm
245 Message digest
243 Substitution box
231 Public key infrastructure
226 Cypherpunk
215 Certificate authority
214 Security engineering
213 RC5
212 Secure cryptoprocessor
212 Computer surveillance
210 Cyphertext
208 DigiCipher 2
204 Linear cryptanalysis
199 Computer insecurity
194 Bruce Schneier
188 Key size
186 OpenSSH
185 Transposition cipher
175 Marian Rejewski
170 Pseudonymity
168 Playfair cipher
168 Keyed-hash message authentication code
165 RC6
163 PKI
161 Secret sharing
160 Daniel J. Bernstein
159 Whitfield Diffie
158 Microdot
157 Scytale
156 SIGABA
148 RIPEMD-160
148 Code talkers
146 JN-25
146 Public key certificate
146 Rotor machine
145 Dmitry Sklyarov
144 Typex
139 Twofish
138 Index of coincidence
137 Famous ciphertexts
136 Autokey cipher
134 History of cryptography
132 Covert channel
131 Crypto system
131 Phil Zimmermann
131 Zero-knowledge proof
129 Null cipher
126 Chaffing and winnowing
124 Anonymous remailer
122 Internet key exchange
122 Message Authentication Code
122 Web of trust
119 Ross Anderson
114 Lucifer cipher
113 Tiger hash function
112 MD5CRK
112 Kryptos
112 Cryptogram
111 Cryptographic engineering
110 Initialization vector
108 Books on cryptography
106 One way function
105 Key escrow
103 Merkle-Hellman
101 Chosen plaintext attack
100 Advanced Encryption Standard process
100 Meet-in-the-middle attack
99 Arne Beurling
98 CAST-128
96 OpenPGP
94 Financial cryptography
93 Lorenz cypher
89 Burrows-Abadi-Needham logic
89 Physical security
88 Confidentiality
87 Ralph Merkle
87 Clipper chip
86 CRYPTREC
85 Known-plaintext attack
80 Affine cipher
80 Beale ciphers
79 Martin Hellman
78 Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
78 The Gold Bug
77 Max Newman
77 Herbert Yardley
76 Traffic analysis
75 NESSIE
75 Distributed.net
74 Vincent Rijmen
74 Unicity distance
73 Permutation cipher
71 The Magic Words are Squeamish Ossifrage
71 40-bit encryption
70 Communication Theory of Secrecy Systems
70 Communications security
70 Geheimfernschreiber
70 Iraqi block cipher
70 RSA Security
68 Codebook
67 Auguste Kerckhoffs
66 Regulation of Investigatory Powers Act 2000
65 Dorabella Cipher
65 Skipjack encryption algorithm
63 Friedrich Kasiski
63 Tamper resistance
61 ADFGVX cipher
61 Ciphertext-only attack
61 Leo Marks
58 Cipherspace
57 Hebern Rotor Machine
57 Privacy-enhanced Electronic Mail
56 Crypto-society
55 Abraham Sinkov
55 Substitution-permutation network
54 Book cipher
54 OpenSSL
53 Eli Biham
53 Digital timestamping
53 Arlington Hall
52 Bernstein v. United States
52 W. T. Tutte
51 David Wagner
51 LibTom Project
50 Tabula recta
50 Security protocol notation
50 Chosen ciphertext attack
50 Tiny Encryption Algorithm
49 Elliptic Curve DSA
49 Confusion and diffusion
48 Yarrow algorithm
48 MARS
47 The Codebreakers
46 VIC cipher
46 Random oracle
45 Rubber-hose cryptanalysis
45 Adaptive chosen ciphertext attack
45 3-Way
45 Certificate Revocation List
44 Visual cryptography
44 Frank Rowlett
44 David Chaum
43 Scrambler
42 Henryk Zygalski
41 Session key
41 Paillier cryptosystem
41 Key authentication
41 Elizebeth Friedman
40 Pass phrase
40 Hushmail
40 Glossary of telecommunications encryption terms
40 Decrypt
40 Blind credential
40 Attacker
40 Agnes Meyer Driscoll
40 Zeroise
39 XTEA
38 S-1
37 Poem code
37 Niels Ferguson
37 CAcert
37 International Association for Cryptologic Research
36 Straddling checkerboard
36 Schnorr signature
36 GOST
36 Cryptome
35 Key derivation function
35 Jerzy Rozycki
35 Self-certifying key
34 Trapdoor function
34 Rabin cryptosystem
34 Certificate-based encryption
34 Serpent encryption algorithm
33 Passive attack
33 NTRUEncrypt
32 Shrinking generator
31 David Wheeler
31 Commitment scheme
30 Key distribution center
29 Don Coppersmith
29 CRYPTO
26 SYSKEY
26 Blind signature
26 Bit-flipping attack
26 Dining cryptographers protocol
25 Timing attack
25 Running key cipher
25 Key signing party
25 Hyperelliptic curve cryptography
25 Horst Feistel
24 COMSEC equipment
24 Snefru
23 Needham-Schroeder
23 Key-agreement protocol
23 Cipher Block Chaining
23 ID-based cryptography
22 Root certificate
22 KY-57
21 Solomon Kullback
21 Joan Daemen
21 Enigmail
20 Oblivious transfer
20 Cryptomathic
19 Undeniable signature
19 Garble
18 Laurence Safford
18 Journal of Cryptology
18 Magic cryptography
17 Cryptographically strong
17 Baby-step giant-step
15 Wide Mouth Frog
15 WHIRLPOOL
15 Otway-Rees
15 Type 1 product
13 A5/1
9 Red pike
7 Taher ElGamal
7 Trusted third party

AltStyle によって変換されたページ (->オリジナル) /