Jump to content

Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2024-09-01 to 2024-09-30

Total views: 5,856,047

Updated: 01:47, 6 October 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 742,689 24,756 B High
2 Telegram (software) 333,184 11,106 B Mid
3 Alan Turing 180,706 6,023 GA Top
4 Bitcoin 157,136 5,237 B High
5 Cryptocurrency 119,447 3,981 C High
6 Tor (network) 101,011 3,367 B Mid
7 WikiLeaks 97,486 3,249 B Low
8 Voynich manuscript 95,281 3,176 B Low
9 The Imitation Game 76,407 2,546 C Mid
10 Blockchain 72,434 2,414 B High
11 Transport Layer Security 71,956 2,398 B Top
12 National Security Agency 64,114 2,137 C High
13 HTTPS 61,447 2,048 C High
14 Signal (software) 57,591 1,919 C Mid
15 Enigma machine 53,333 1,777 C High
16 RSA (cryptosystem) 47,911 1,597 C Top
17 Virtual private network 45,325 1,510 C Mid
18 HTTP Strict Transport Security 42,600 1,420 C Low
19 Advanced Encryption Standard 42,007 1,400 B Top
20 Diffie–Hellman key exchange 40,034 1,334 C Top
21 Cryptography 38,967 1,298 C Top
22 Secure Shell 38,427 1,280 C High
23 SHA-2 38,126 1,270 C Top
24 Changpeng Zhao 37,362 1,245 Start Low
25 Caesar cipher 35,840 1,194 FA High
26 Vigenère cipher 35,514 1,183 B Low
27 Vitalik Buterin 34,388 1,146 C Low
28 History of bitcoin 34,166 1,138 C Low
29 Public-key cryptography 33,525 1,117 C Top
30 Darknet market 31,179 1,039 B Mid
31 Dogecoin 28,461 948 C Low
32 Block cipher mode of operation 27,555 918 C Top
33 Man-in-the-middle attack 26,658 888 C Mid
34 MD5 25,788 859 C Top
35 GCHQ 24,705 823 B Low
36 Claude Shannon 24,416 813 C Top
37 Information theory 24,043 801 B Top
38 Cryptographic hash function 23,958 798 C Top
39 Joan Clarke 23,590 786 C Mid
40 Password 23,473 782 C Top
41 Proton Mail 23,354 778 C Low
42 HMAC 22,789 759 C High
43 Zimmermann telegram 22,742 758 B High
44 Digital signature 22,722 757 C Top
45 Steganography 22,193 739 B High
46 Active Directory 21,671 722 C Low
47 NordVPN 21,255 708 C Mid
48 Pretty Good Privacy 21,133 704 B High
49 Knapsack problem 21,074 702 C Mid
50 Bletchley Park 19,510 650 B High
51 Elliptic-curve cryptography 19,479 649 C High
52 Sator Square 19,449 648 B Low
53 Keychain (software) 19,397 646 Start Unknown
54 Kryptos 19,143 638 C Low
55 Encryption 18,858 628 C Top
56 Information security 18,812 627 B Top
57 SHA-1 18,658 621 C Top
58 Letter frequency 18,551 618 B Low
59 Wi-Fi Protected Access 18,219 607 C Mid
60 Cipher 18,163 605 C Top
61 Trusted Platform Module 18,136 604 C Mid
62 ROT13 17,879 595 C Mid
63 Certificate authority 17,448 581 C High
64 Post-quantum cryptography 17,417 580 C High
65 Vault 7 17,277 575 C Mid
66 Merkle tree 17,034 567 C Mid
67 Zero-knowledge proof 16,590 553 C Top
68 One-time pad 15,926 530 C Top
69 Rainbow table 15,624 520 C High
70 Kerberos (protocol) 15,376 512 C High
71 Elliptic Curve Digital Signature Algorithm 14,961 498 C High
72 Public key certificate 14,765 492 C Top
73 Digital rights management 14,765 492 B High
74 Phone hacking 14,643 488 Start Mid
75 Proof of stake 14,611 487 Start Low
76 One-time password 14,182 472 C Mid
77 Beale ciphers 14,166 472 B Low
78 I2P 13,961 465 B Low
79 OpenVPN 13,663 455 C Mid
80 Public key infrastructure 13,662 455 C Top
81 Colossus computer 13,361 445 B Mid
82 Salt (cryptography) 13,251 441 Start High
83 Bcrypt 13,227 440 C Mid
84 Cryptanalysis of the Enigma 12,859 428 C Mid
85 Illegal number 12,579 419 C Low
86 Code talker 12,531 417 B Low
87 OpenSSL 12,444 414 B High
88 Tails (operating system) 12,384 412 Start Low
89 Pay television 12,345 411 Start Unknown
90 Secure Hash Algorithms 12,092 403 Start High
91 SSH File Transfer Protocol 12,071 402 Start Unknown
92 Brute-force attack 11,988 399 C High
93 Cryptographic nonce 11,958 398 Start High
94 Authentication 11,607 386 C High
95 Integer factorization 11,458 381 B Mid
96 .onion 11,420 380 C Low
97 Bombe 11,411 380 B Mid
98 Galois/Counter Mode 11,269 375 C Mid
99 Homomorphic encryption 11,263 375 C High
100 Data Encryption Standard 11,252 375 C Top
101 Shiba Inu (cryptocurrency) 11,244 374 Start Low
102 SHA-3 10,998 366 Start Mid
103 Substitution cipher 10,880 362 Unknown Unknown
104 Alice and Bob 10,385 346 Start High
105 Symmetric-key algorithm 10,318 343 Start Top
106 Decentralized finance 10,028 334 Start Low
107 Units of information 10,021 334 C Unknown
108 Comparison of BitTorrent clients 9,908 330 List Low
109 Theoretical computer science 9,788 326 B Low
110 Nyctography 9,684 322 Unknown Unknown
111 The Tor Project 9,675 322 C Mid
112 Babington Plot 9,435 314 C Low
113 ChaCha20-Poly1305 9,412 313 C Low
114 Mullvad 9,399 313 Start Low
115 Cypherpunk 9,326 310 C Mid
116 Apple–FBI encryption dispute 9,248 308 C Low
117 Ultra (cryptography) 9,178 305 C High
118 Forward secrecy 9,171 305 C High
119 Grover's algorithm 9,147 304 C Mid
120 Cryptonomicon 9,054 301 C Low
121 Side-channel attack 9,031 301 C High
122 InterPlanetary File System 8,949 298 C Low
123 PBKDF2 8,863 295 C Low
124 Link 16 8,719 290 Start Low
125 Fort Meade 8,646 288 C Low
126 Authenticated encryption 8,636 287 C Mid
127 Bitcoin Cash 8,629 287 Start Low
128 Shamir's secret sharing 8,544 284 C High
129 Playfair cipher 8,315 277 Unknown Unknown
130 VeraCrypt 8,313 277 C Mid
131 EdDSA 8,272 275 C High
132 Curve25519 8,071 269 C High
133 Birthday attack 8,007 266 C High
134 Differential privacy 7,940 264 C Mid
135 3-D Secure 7,919 263 Start Low
136 Bitwarden 7,914 263 C Low
137 Cryptanalysis 7,892 263 C High
138 Password cracking 7,861 262 C Mid
139 Message authentication code 7,856 261 C Top
140 Litecoin 7,834 261 Start Low
141 Matrix (protocol) 7,823 260 Start Unknown
142 Signal Protocol 7,696 256 C High
143 Quantum key distribution 7,402 246 B Mid
144 Certificate signing request 7,205 240 C Low
145 Argon2 7,202 240 C Mid
146 IMSI-catcher 7,180 239 Start Mid
147 Elliptic-curve Diffie–Hellman 6,945 231 Start Mid
148 Fork (blockchain) 6,748 224 Start Mid
149 Hyphanet 6,703 223 B Mid
150 Cryptographically secure pseudorandom number generator 6,580 219 C Top
151 Password manager 6,571 219 C Low
152 Frequency analysis 6,566 218 C High
153 KeePass 6,488 216 C Low
154 Discrete logarithm 6,479 215 C Mid
155 Triple DES 6,397 213 Start Unknown
156 PKCS 12 6,393 213 Start Unknown
157 Bitconnect 6,317 210 C Low
158 Salsa20 6,267 208 C Top
159 Password strength 6,239 207 C High
160 Quantum cryptography 6,220 207 C High
161 Richard Teng 6,178 205 Start Low
162 RC4 6,120 204 B Top
163 Digest access authentication 6,088 202 B Low
164 Confidentiality 6,070 202 C Low
165 Utah Data Center 6,064 202 C Mid
166 Self-signed certificate 6,037 201 Start Unknown
167 GNU Privacy Guard 5,996 199 C Unknown
168 Supply chain attack 5,991 199 C Low
169 Key derivation function 5,838 194 C Low
170 FIPS 140-2 5,727 190 C Mid
171 Block cipher 5,722 190 C Top
172 Kerckhoffs's principle 5,673 189 Start Mid
173 Citizenfour 5,672 189 C Low
174 Qubes OS 5,630 187 C Mid
175 Digital Signature Algorithm 5,581 186 C Top
176 Tap code 5,559 185 Start Low
177 Polkadot (blockchain platform) 5,528 184 Start Low
178 Cipher suite 5,486 182 C Top
179 Transposition cipher 5,485 182 Unknown Unknown
180 Crypto AG 5,464 182 C High
181 Lorenz cipher 5,449 181 C Top
182 Mutual authentication 5,406 180 Stub Low
183 OpenSSH 5,363 178 C High
184 11B-X-1371 5,349 178 GA Low
185 The Doughnut 5,334 177 GA High
186 Automatic Certificate Management Environment 5,327 177 Start Low
187 Cryptogram 5,268 175 C Mid
188 Web of trust 5,253 175 C High
189 Reception and criticism of WhatsApp security and privacy features 5,251 175 C Low
190 Stream cipher 5,234 174 Start Top
191 Root certificate 5,139 171 Start Low
192 Blowfish (cipher) 5,125 170 B High
193 Bacon's cipher 5,118 170 Start Low
194 Threema 5,083 169 C Unknown
195 Conel Hugh O'Donel Alexander 5,001 166 Start Low
196 List of bitcoin forks 4,966 165 List Low
197 Rijndael S-box 4,930 164 Start Low
198 Wired Equivalent Privacy 4,905 163 C Mid
199 Lavarand 4,857 161 Start Mid
200 RSA Security 4,840 161 C Unknown
201 DNS-based Authentication of Named Entities 4,839 161 C Mid
202 Bitcoin Core 4,839 161 Start Low
203 Electronic signature 4,797 159 C Low
204 Certificate revocation list 4,779 159 C Low
205 Blockchain game 4,765 158 Start Low
206 Deniable encryption 4,739 157 Start High
207 BLAKE (hash function) 4,692 156 C Mid
208 Hill cipher 4,669 155 Unknown Unknown
209 Adam Back 4,667 155 Start Low
210 Session (software) 4,664 155 Start Low
211 KeePassXC 4,651 155 Start Low
212 Lattice-based cryptography 4,650 155 Start Low
213 Boolean function 4,632 154 Start Mid
214 Key (cryptography) 4,616 153 Start Unknown
215 Datagram Transport Layer Security 4,577 152 C Mid
216 XOR cipher 4,539 151 Stub Mid
217 Crypto-anarchy 4,442 148 Start High
218 Initialization vector 4,425 147 C High
219 Affine cipher 4,391 146 C Low
220 Secure multi-party computation 4,385 146 Start High
221 Rail fence cipher 4,308 143 Start Low
222 Dual EC DRBG 4,306 143 C High
223 Cold boot attack 4,289 142 C Low
224 Bruce Schneier 4,269 142 Start High
225 SegWit 4,258 141 Start Low
226 Adi Shamir 4,234 141 Start Unknown
227 Padding (cryptography) 4,188 139 Start Unknown
228 ElGamal encryption 4,167 138 Start Top
229 Hashcash 4,164 138 Start Unknown
230 Privacy-Enhanced Mail 4,159 138 Start Low
231 Atbash 4,154 138 Stub Low
232 Ciphertext 4,129 137 Start High
233 Cryptocurrency tumbler 4,126 137 Start Unknown
234 RSA SecurID 4,118 137 Unknown Unknown
235 AES instruction set 4,106 136 C Low
236 Replay attack 4,041 134 C Top
237 History of cryptography 4,020 134 Start High
238 David Chaum 4,014 133 C Low
239 Padding oracle attack 4,002 133 Start Low
240 Marian Rejewski 3,989 132 FA Mid
241 Feistel cipher 3,955 131 Start Unknown
242 Zcash 3,895 129 Start Low
243 Polybius square 3,870 129 Start Mid
244 Filecoin 3,854 128 Start Low
245 Communications Security Establishment 3,852 128 C Mid
246 PKCS 3,835 127 List High
247 Diplomatic bag 3,834 127 Start Low
248 Daniel J. Bernstein 3,812 127 C Mid
249 Alberti cipher 3,780 126 C Low
250 TrueCrypt 3,733 124 C Mid
251 Schnorr signature 3,727 124 C High
252 Ricky McCormick's encrypted notes 3,698 123 B Low
253 Random number book 3,681 122 Stub Low
254 Challenge–response authentication 3,668 122 Start Mid
255 Directory service 3,650 121 Start Mid
256 One-way function 3,644 121 Start Top
257 SipHash 3,577 119 Start Low
258 Commitment scheme 3,540 118 C High
259 Harvest now, decrypt later 3,508 116 Start Low
260 PKCS 7 3,442 114 Start Low
261 Non-repudiation 3,436 114 Start Mid
262 Trusted timestamping 3,433 114 Start Unknown
263 Bitcoin scalability problem 3,421 114 C Low
264 Len Sassaman 3,408 113 Start Unknown
265 Polyalphabetic cipher 3,382 112 Start Unknown
266 List of ciphertexts 3,337 111 List Low
267 Special Collection Service 3,331 111 C Low
268 Length extension attack 3,301 110 Start Unknown
269 Timing attack 3,241 108 C High
270 Known-plaintext attack 3,212 107 Start High
271 PKCS 11 3,211 107 Unknown Unknown
272 Key size 3,196 106 C High
273 Whonix 3,177 105 Start Mid
274 Algorand 3,119 103 B Low
275 Book cipher 3,110 103 C Low
276 Australian Signals Directorate 3,075 102 C Low
277 Encryption software 3,074 102 Start Top
278 Bomba (cryptography) 3,057 101 Start Low
279 Disk encryption 3,041 101 C High
280 Digital watermarking 3,032 101 B Mid
281 NIST Post-Quantum Cryptography Standardization 3,004 100 C Mid
282 K-anonymity 2,990 99 Start Mid
283 Quantum network 2,989 99 C Low
284 PKCS 1 2,968 98 C Mid
285 Proof of authority 2,946 98 Start Low
286 Type B Cipher Machine 2,942 98 Start Low
287 Criticism of Dropbox 2,890 96 B Low
288 Keygen 2,841 94 C Low
289 Dictionary attack 2,834 94 C Unknown
290 Merkle–Damgård construction 2,833 94 C Unknown
291 Gordon Welchman 2,800 93 C Low
292 AES key schedule 2,793 93 Start Low
293 Elizebeth Smith Friedman 2,783 92 C Mid
294 Whitfield Diffie 2,779 92 B High
295 Disk encryption theory 2,779 92 C Unknown
296 S-box 2,770 92 Start Top
297 Authenticator 2,754 91 Start Unknown
298 Code signing 2,732 91 C Low
299 RSA Factoring Challenge 2,731 91 Start Low
300 Plaintext 2,709 90 Start High
301 Pre-shared key 2,704 90 Start Mid
302 Entrust 2,681 89 Start Low
303 Collision attack 2,666 88 Start High
304 Digital renminbi 2,641 88 B High
305 Cryptographic protocol 2,631 87 Start High
306 Certificate Transparency 2,624 87 C High
307 BTCC (company) 2,623 87 Start Low
308 PKCS 8 2,614 87 Stub Unknown
309 Key exchange 2,600 86 Start Unknown
310 Comparison of SSH clients 2,594 86 List Low
311 Elliptic curve point multiplication 2,594 86 C Mid
312 Scrambler 2,584 86 C Unknown
313 Operation Rubicon 2,547 84 C Low
314 Bitcoin Gold 2,544 84 Start Low
315 Avalanche effect 2,541 84 Start High
316 BB84 2,516 83 Start Low
317 Classical cipher 2,464 82 Start Top
318 Double Ratchet Algorithm 2,442 81 Start Low
319 Proof of space 2,431 81 Start Low
320 Dilly Knox 2,427 80 B Unknown
321 FIPS 140 2,424 80 Start Mid
322 Key disclosure law 2,406 80 C Low
323 William Binney (intelligence official) 2,406 80 Start Mid
324 Preimage attack 2,396 79 Stub Unknown
325 Twofish 2,377 79 Start High
326 Optimal asymmetric encryption padding 2,370 79 Start High
327 HKDF 2,360 78 Start Unknown
328 Quahl 2,354 78 C Low
329 Crypt (C) 2,327 77 C High
330 Tox (protocol) 2,319 77 C Low
331 Data at rest 2,318 77 C Mid
332 Chosen-plaintext attack 2,313 77 Stub Unknown
333 Export of cryptography from the United States 2,312 77 C Unknown
334 Communications security 2,298 76 Start Mid
335 Autokey cipher 2,288 76 C Mid
336 Off-the-record messaging 2,287 76 Start Unknown
337 Data anonymization 2,276 75 Start Mid
338 Hash chain 2,255 75 Start Unknown
339 Ciphertext indistinguishability 2,253 75 C High
340 Peercoin 2,253 75 Stub Low
341 Phil Zimmermann 2,250 75 Start Mid
342 Privacy and blockchain 2,249 74 C Low
343 Martin Hellman 2,230 74 Start High
344 Comparison of cryptography libraries 2,223 74 List Unknown
345 NEO (cryptocurrency) 2,217 73 Start Low
346 Kasiski examination 2,214 73 Unknown Unknown
347 IEEE 802.11i-2004 2,208 73 C Mid
348 Key encapsulation mechanism 2,202 73 Start High
349 Clipper chip 2,201 73 C High
350 Magic (cryptography) 2,199 73 Start Unknown
351 FIPS 140-3 2,183 72 C Low
352 HTTP Public Key Pinning 2,182 72 C Mid
353 DNS Certification Authority Authorization 2,182 72 GA Low
354 Ralph Merkle 2,161 72 C High
355 Trusted Computing 2,142 71 C Mid
356 Comparison of disk encryption software 2,127 70 List High
357 William F. Friedman 2,123 70 C Unknown
358 Bouncy Castle (cryptography) 2,088 69 Start Unknown
359 Briar (software) 2,084 69 Start Low
360 Alastair Denniston 2,072 69 Start Unknown
361 Dm-crypt 2,055 68 Start Low
362 Pepper (cryptography) 2,042 68 Start Low
363 Nothing-up-my-sleeve number 2,039 67 C Low
364 Baby-step giant-step 2,027 67 C Unknown
365 Open Whisper Systems 2,021 67 B Unknown
366 Coinye 2,008 66 Start Low
367 Encrypting File System 2,007 66 B Unknown
368 Non-interactive zero-knowledge proof 1,994 66 Start Low
369 Opportunistic TLS 1,975 65 Start Mid
370 ShapeShift 1,971 65 Start Low
371 Key management 1,951 65 Unknown Unknown
372 Mumble (software) 1,951 65 C Unknown
373 Generic Security Services Application Program Interface 1,941 64 Start Low
374 Physical unclonable function 1,937 64 Start Unknown
375 CCM mode 1,933 64 Start High
376 Secret sharing 1,902 63 C High
377 Confusion and diffusion 1,886 62 Start Mid
378 Trapdoor function 1,883 62 Start High
379 I. J. Good 1,875 62 C Low
380 Beaufort cipher 1,865 62 Start Low
381 Bullrun (decryption program) 1,847 61 B Low
382 Copiale cipher 1,838 61 Start Low
383 Clock drift 1,827 60 C Low
384 WebTorrent 1,824 60 Start Unknown
385 Leo Marks 1,820 60 B Unknown
386 DeCSS 1,811 60 C Mid
387 Poly1305 1,811 60 Start Top
388 Charlie Lee (computer scientist) 1,799 59 Start Low
389 Cryptographic primitive 1,782 59 Start Top
390 ADFGVX cipher 1,759 58 Unknown Unknown
391 Lenstra elliptic-curve factorization 1,751 58 C Low
392 Primecoin 1,742 58 Start Unknown
393 Orbot 1,735 57 Stub Low
394 FileVault 1,728 57 C Mid
395 Comparison of TLS implementations 1,727 57 List High
396 Jami (software) 1,707 56 Start Unknown
397 Security level 1,705 56 Stub Mid
398 Anonymous P2P 1,690 56 C Low
399 Enigma rotor details 1,677 55 Start Mid
400 Government Communications Security Bureau 1,655 55 B Low
401 Ricochet (software) 1,645 54 Start Low
402 Coppersmith's attack 1,642 54 B High
403 MD4 1,640 54 Start Low
404 Crypto Wars 1,634 54 Start High
405 Paillier cryptosystem 1,632 54 Start High
406 Black Chamber 1,624 54 Unknown Unknown
407 Differential cryptanalysis 1,621 54 B High
408 ROCA vulnerability 1,620 54 Start Mid
409 Meet-in-the-middle attack 1,611 53 C High
410 Key stretching 1,607 53 Start Unknown
411 Four-square cipher 1,602 53 C Unknown
412 UltraViolet (website) 1,598 53 C Low
413 Tabula recta 1,592 53 Unknown Unknown
414 Null cipher 1,585 52 Stub Low
415 Red/black concept 1,585 52 Stub Unknown
416 Integrated Encryption Scheme 1,584 52 Start Low
417 SecureDrop 1,576 52 Start Mid
418 Roger Dingledine 1,575 52 Start Unknown
419 Advanced Access Content System 1,572 52 C Mid
420 SIGSALY 1,571 52 C Low
421 Tiny Encryption Algorithm 1,560 52 Unknown Unknown
422 Cryptanalysis of the Lorenz cipher 1,557 51 C High
423 W. T. Tutte 1,549 51 C Mid
424 NSAKEY 1,547 51 C High
425 Strong cryptography 1,546 51 Unknown Unknown
426 Arthur Scherbius 1,537 51 Start Mid
427 Code (cryptography) 1,536 51 Start Top
428 CBC-MAC 1,532 51 C High
429 Open Technology Fund 1,512 50 Start Unknown
430 Tor2web 1,511 50 Start Low
431 FreeOTP 1,501 50 Start Low
432 One-key MAC 1,500 50 Start Low
433 ZeroNet 1,487 49 Start Low
434 Secret decoder ring 1,482 49 Start Low
435 Dorabella Cipher 1,482 49 Unknown Unknown
436 A5/1 1,476 49 B High
437 Comparison of cryptographic hash functions 1,476 49 List Low
438 SYN cookies 1,473 49 Start Unknown
439 Public key fingerprint 1,449 48 Start Mid
440 Pseudorandom function family 1,435 47 Start Low
441 Codebook 1,423 47 Stub Unknown
442 BLS digital signature 1,420 47 Start Mid
443 Information-theoretic security 1,413 47 Start Top
444 Opportunistic Wireless Encryption 1,413 47 Stub Low
445 Pollard's kangaroo algorithm 1,412 47 C Low
446 DES supplementary material 1,411 47 C Low
447 Simultaneous Authentication of Equals 1,404 46 Start High
448 National Cryptologic Museum 1,399 46 C Mid
449 Challenge-Handshake Authentication Protocol 1,397 46 Start Low
450 Rotor machine 1,395 46 Unknown Unknown
451 Wiener's attack 1,393 46 B High
452 Format-preserving encryption 1,392 46 Start High
453 GNUnet 1,388 46 B Low
454 Advanced Encryption Standard process 1,386 46 C Mid
455 Rijndael MixColumns 1,383 46 Start Low
456 Always-on DRM 1,383 46 Start Low
457 LibreSSL 1,383 46 Start High
458 SIGABA 1,375 45 C High
459 Blind signature 1,373 45 C Mid
460 List of cryptographers 1,362 45 List Low
461 NTRU 1,361 45 C Low
462 RIPEMD 1,351 45 C Unknown
463 Blum Blum Shub 1,350 45 Start High
464 CableCARD 1,349 44 B Unknown
465 Key server (cryptographic) 1,345 44 Start Mid
466 Content Scramble System 1,344 44 Start Mid
467 Wildcard certificate 1,340 44 Redirect NA
468 Word square 1,339 44 C Low
469 AES implementations 1,331 44 List Low
470 Steganographia 1,331 44 Start Low
471 Two-square cipher 1,329 44 Unknown Unknown
472 Temporal Key Integrity Protocol 1,328 44 C Low
473 David Wheeler (computer scientist) 1,323 44 Start Low
474 Downgrade attack 1,320 44 Start Mid
475 Electronic Signatures in Global and National Commerce Act 1,319 43 Stub Unknown
476 Secure cryptoprocessor 1,311 43 C Mid
477 Banburismus 1,305 43 C Low
478 McEliece cryptosystem 1,271 42 C High
479 Random oracle 1,266 42 Start Low
480 Hybrid cryptosystem 1,260 42 Start High
481 Shugborough inscription 1,259 41 Start Low
482 Serpent (cipher) 1,258 41 C Low
483 Berlekamp–Massey algorithm 1,255 41 Start Unknown
484 Collision resistance 1,247 41 Start High
485 Keybase 1,243 41 Start Low
486 Sponge function 1,237 41 Unknown Unknown
487 Proton Drive 1,235 41 Start Low
488 Karsten Nohl 1,234 41 Start Unknown
489 Max Newman 1,232 41 B Low
490 Key-agreement protocol 1,225 40 Start Top
491 Great Cipher 1,223 40 Start Mid
492 Fuzzy hashing 1,221 40 C Low
493 Ross J. Anderson 1,217 40 C Mid
494 Visual cryptography 1,216 40 Unknown Unknown
495 Power analysis 1,213 40 Unknown Unknown
496 Nihilist cipher 1,211 40 Unknown Unknown
497 Station HYPO 1,207 40 Start Low
498 MD6 1,205 40 Start High
499 Cryptovirology 1,199 39 Start Mid
500 Cipher runes 1,198 39 Start Unknown