# Cryptography

This category contains pages that are part of the * Cryptography* book. If a page of the book isn't showing here, please add text

`{{bookcat}}`

to the end of the page concerned. You can view a list of all subpages under the book main page (not including the book main page itself), regardless of whether they're categorized, here.## Related categories

The following 2 related categories may be of interest, out of 2 total.

More recent additions | More recent modifications |
---|---|

The following 80 pages are in this category, out of 80 total.

### A

### B

- Cryptography/Basic Code-Breaking Principles
- Cryptography/Basic Design Principles
- Cryptography/Beale cipher
- Cryptography/Biometrics
- Cryptography/Birthday Attack
- Cryptography/Blum-Goldwasser
- Cryptography/Breaking Caesar cipher
- Cryptography/Breaking Hash Algorithms
- Cryptography/Breaking transposition ciphers
- Cryptography/Breaking Vigenère cipher
- Cryptography/Brute force attack

### C

### D

### E

### P

- Cryptography/Permutation cipher
- Cryptography/Playfair cipher
- Cryptography/Polyalphabetic substitution
- Cryptography/Prime Curve/Affine Coordinates
- Cryptography/Prime Curve/Chudnovsky Coordinates
- Cryptography/Prime Curve/Jacobian Coordinates
- Cryptography/Prime Curve/Standard Projective Coordinates
- Cryptography/Proportionality of Secrecy
- Cryptography/Protocols
- Cryptography/Public Key Overview