Jump to content

Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2025-05-01 to 2025-05-31

Total views: 6,035,307

Updated: 13:31, 6 June 2025 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 611,450 19,724 B High
2 Telegram (software) 348,226 11,233 B Mid
3 Alan Turing 206,671 6,666 GA Top
4 Bitcoin 190,779 6,154 B High
5 Voynich manuscript 106,739 3,443 B Low
6 Cryptocurrency 99,136 3,197 C High
7 History of bitcoin 81,161 2,618 B Low
8 The Imitation Game 79,373 2,560 C Mid
9 WikiLeaks 76,564 2,469 B Low
10 Tor (network) 76,075 2,454 B Mid
11 $Trump 73,840 2,381 C Low
12 Transport Layer Security 68,154 2,198 B Top
13 National Security Agency 63,451 2,046 C High
14 Blockchain 63,177 2,037 B High
15 Signal (software) 51,740 1,669 C Mid
16 Enigma machine 50,275 1,621 C High
17 HTTP Strict Transport Security 49,575 1,599 C Low
18 HTTPS 46,883 1,512 C High
19 Darknet market 42,696 1,377 B Mid
20 RSA cryptosystem 42,651 1,375 C Top
21 Cryptography 40,370 1,302 C Top
22 Secure Shell 39,633 1,278 C High
23 Advanced Encryption Standard 39,189 1,264 B Top
24 Diffie–Hellman key exchange 38,991 1,257 C Top
25 Dogecoin 36,288 1,170 C Low
26 Virtual private network 34,812 1,122 C Mid
27 SHA-2 34,240 1,104 C Top
28 Changpeng Zhao 30,865 995 Start Low
29 Claude Shannon 29,287 944 C Top
30 Public-key cryptography 29,123 939 C Top
31 Letter frequency 28,834 930 B Low
32 Information theory 28,104 906 B Top
33 Grover's algorithm 27,200 877 C Mid
34 Man-in-the-middle attack 26,326 849 C Mid
35 Caesar cipher 26,279 847 FA High
36 Block cipher mode of operation 26,075 841 C Top
37 Vitalik Buterin 25,495 822 C Low
38 Phone hacking 25,051 808 Start Mid
39 Post-quantum cryptography 24,603 793 C High
40 Bletchley Park 24,513 790 B High
41 Zimmermann telegram 23,981 773 B High
42 Vigenère cipher 23,936 772 B Low
43 Proton Mail 23,816 768 C Low
44 Joan Clarke 23,600 761 C Mid
45 Digital signature 22,904 738 C Top
46 Zero-knowledge proof 22,427 723 C Top
47 Merkle tree 21,023 678 C Mid
48 ROT13 20,864 673 C Mid
49 Pretty Good Privacy 20,774 670 B High
50 Password 20,426 658 C Top
51 MD5 20,387 657 C Top
52 Steganography 20,245 653 C High
53 Encryption 20,160 650 C Top
54 Cryptographic hash function 19,820 639 C Top
55 HMAC 19,492 628 C High
56 Knapsack problem 19,423 626 C Mid
57 Code talker 19,165 618 B Low
58 Public key certificate 18,993 612 C Top
59 One-time pad 18,555 598 C Top
60 Elliptic-curve cryptography 18,486 596 C High
61 Integer factorization 17,978 579 B Mid
62 Cipher 17,961 579 C Top
63 GCHQ 17,866 576 B Low
64 Digital rights management 17,750 572 C High
65 Sator Square 17,609 568 B Low
66 NordVPN 17,356 559 C Mid
67 SHA-1 16,977 547 C Top
68 Rainbow table 16,659 537 C High
69 Trusted Platform Module 16,483 531 C Mid
70 Hashcash 15,830 510 Start Unknown
71 Information security 15,731 507 B Top
72 Lavarand 15,031 484 Start Mid
73 Kryptos 14,880 480 C Low
74 One-time password 14,710 474 B Mid
75 Kerberos (protocol) 14,598 470 C High
76 Cryptanalysis of the Enigma 14,113 455 C Mid
77 Certificate authority 14,101 454 C High
78 Wi-Fi Protected Access 13,978 450 C Mid
79 Salt (cryptography) 13,952 450 Start High
80 Active Directory 13,551 437 C Low
81 Automatic Certificate Management Environment 13,526 436 Start Low
82 Keychain (software) 13,488 435 Start Unknown
83 Pay television 13,417 432 Start Unknown
84 Babington Plot 13,010 419 C Low
85 Mullvad 12,891 415 Start Low
86 Authentication 12,886 415 C High
87 Brute-force attack 12,452 401 C High
88 Bombe 12,299 396 B Mid
89 Public key infrastructure 12,297 396 C Top
90 .onion 12,276 396 C Low
91 VeraCrypt 12,129 391 C Mid
92 Galois/Counter Mode 11,872 382 C Mid
93 Ultra (cryptography) 11,687 377 C High
94 OpenVPN 11,540 372 C Mid
95 Password manager 11,473 370 C Low
96 Tails (operating system) 11,389 367 Start Low
97 Mersenne Twister 11,280 363 C Low
98 Bcrypt 11,233 362 C Mid
99 Alice and Bob 11,104 358 Start High
100 Symmetric-key algorithm 10,788 348 Start Top
101 OpenSSL 10,665 344 B High
102 SHA-3 10,639 343 Start Mid
103 Substitution cipher 10,577 341 Unknown Unknown
104 Elliptic Curve Digital Signature Algorithm 10,527 339 C High
105 Vault 7 10,170 328 C Mid
106 Quantum key distribution 10,085 325 B Mid
107 Theoretical computer science 9,936 320 B Low
108 Link 16 9,922 320 Start Low
109 Bitwarden 9,832 317 C Low
110 Shiba Inu (cryptocurrency) 9,832 317 Start Low
111 IMSI-catcher 9,751 314 Start Mid
112 Cryptanalysis 9,681 312 C High
113 Colossus computer 9,649 311 B Mid
114 Adam Back 9,618 310 C Low
115 Cryptonomicon 9,577 308 C Low
116 Homomorphic encryption 9,533 307 C High
117 Birthday attack 9,474 305 C High
118 Secure Hash Algorithms 9,474 305 Start High
119 Forward secrecy 9,408 303 C High
120 Decentralized finance 9,338 301 Start Low
121 Shamir's secret sharing 9,241 298 C High
122 SSH File Transfer Protocol 9,214 297 C Low
123 Cryptographic nonce 8,964 289 Start High
124 Proof of stake 8,916 287 C Low
125 I2P 8,875 286 B Low
126 Message authentication code 8,820 284 C Top
127 Elliptic-curve Diffie–Hellman 8,816 284 Start Mid
128 Password strength 8,802 283 C High
129 Password cracking 8,731 281 C Mid
130 Fort Meade 8,709 280 C Low
131 InterPlanetary File System 8,601 277 C Low
132 Data Encryption Standard 8,586 276 C Top
133 Authenticated encryption 8,565 276 C Mid
134 Beale ciphers 8,174 263 B Low
135 ChaCha20-Poly1305 8,139 262 C Low
136 Comparison of BitTorrent clients 8,093 261 List Low
137 PBKDF2 7,967 257 C Low
138 KeePass 7,905 255 C Low
139 Matrix (protocol) 7,649 246 Start Unknown
140 Curve25519 7,605 245 C High
141 EdDSA 7,575 244 C High
142 Discrete logarithm 7,516 242 C Mid
143 Playfair cipher 7,469 240 Unknown Unknown
144 Litecoin 7,295 235 Start Low
145 Argon2 7,279 234 C Mid
146 Stream cipher 7,199 232 Start Top
147 Quantum cryptography 7,106 229 C High
148 Differential privacy 7,022 226 C Mid
149 TrueCrypt 6,972 224 C Mid
150 Deniable encryption 6,920 223 Start High
151 Cryptographically secure pseudorandom number generator 6,806 219 C Top
152 Side-channel attack 6,697 216 C High
153 Signal Protocol 6,637 214 C High
154 Hyphanet 6,593 212 B Mid
155 Bitcoin Cash 6,575 212 Start Low
156 Lorenz cipher 6,503 209 C Top
157 Cypherpunk 6,489 209 C Mid
158 Citizenfour 6,451 208 C Low
159 Key derivation function 6,375 205 C Low
160 The Tor Project 6,321 203 C Mid
161 Digest access authentication 6,272 202 B Low
162 Block cipher 6,222 200 C Top
163 Qubes OS 6,176 199 C Mid
164 Illegal number 6,107 197 C Low
165 Units of information 5,939 191 C Unknown
166 Apple–FBI encryption dispute 5,881 189 C Low
167 Cipher suite 5,781 186 C Top
168 Conel Hugh O'Donel Alexander 5,773 186 Start Low
169 Shugborough inscription 5,768 186 Start Low
170 Cryptogram 5,756 185 C Mid
171 Quantum network 5,691 183 C Low
172 Len Sassaman 5,669 182 Start Unknown
173 XOR cipher 5,664 182 Stub Mid
174 Certificate signing request 5,587 180 C Low
175 Kerckhoffs's principle 5,525 178 Start Mid
176 Transposition cipher 5,521 178 Unknown Unknown
177 Mutual authentication 5,512 177 Stub Low
178 Digital renminbi 5,506 177 B High
179 ElGamal encryption 5,486 176 Start Top
180 Known-plaintext attack 5,425 175 Start High
181 Cold boot attack 5,413 174 C Low
182 Challenge–response authentication 5,401 174 Start Mid
183 Lattice-based cryptography 5,357 172 Start Low
184 Triple DES 5,296 170 Start Unknown
185 GNU Privacy Guard 5,266 169 C Unknown
186 BLAKE (hash function) 5,265 169 C Mid
187 Feistel cipher 5,251 169 Start Unknown
188 RSA Security 5,250 169 C Unknown
189 NSAKEY 5,244 169 C High
190 Adi Shamir 5,223 168 C Unknown
191 Polkadot (blockchain platform) 5,223 168 Start Low
192 Salsa20 5,169 166 C Top
193 KeePassXC 5,162 166 Start Low
194 Session (software) 5,149 166 Start Low
195 NIST SP 800-90A 5,138 165 C Mid
196 Padding (cryptography) 5,089 164 Start Unknown
197 Tap code 5,065 163 Start Low
198 Bitconnect 5,056 163 C Low
199 Threema 5,020 161 C Unknown
200 RC4 4,997 161 B Top
201 Secure multi-party computation 4,987 160 Start High
202 Utah Data Center 4,980 160 C Mid
203 PKCS 12 4,920 158 Start Low
204 Digital Signature Algorithm 4,867 157 C Top
205 Key (cryptography) 4,840 156 Start Unknown
206 Plaintext 4,821 155 Start High
207 FIPS 140-2 4,732 152 C Mid
208 Wired Equivalent Privacy 4,671 150 C Mid
209 Ricky McCormick's encrypted notes 4,652 150 B Low
210 Replay attack 4,651 150 C Top
211 Privacy-Enhanced Mail 4,625 149 Start Low
212 Frequency analysis 4,614 148 C High
213 Collision attack 4,526 146 Start High
214 Key size 4,489 144 C High
215 Crypto-anarchy 4,462 143 Start High
216 Self-signed certificate 4,459 143 Start Unknown
217 OpenSSH 4,452 143 C High
218 Datagram Transport Layer Security 4,431 142 C Mid
219 One-way function 4,414 142 Start Top
220 Electronic signature 4,384 141 C Low
221 11B-X-1371 4,384 141 GA Low
222 Padding oracle attack 4,383 141 Start Low
223 Ciphertext 4,350 140 Start High
224 Lenstra elliptic-curve factorization 4,335 139 C Low
225 Timing attack 4,297 138 C High
226 Fork (blockchain) 4,293 138 Start Mid
227 Key exchange 4,249 137 Start Unknown
228 AES instruction set 4,209 135 C Low
229 Marian Rejewski 4,180 134 FA Mid
230 Disk encryption 4,135 133 C High
231 Initialization vector 4,105 132 C High
232 Harvest now, decrypt later 4,100 132 Start Low
233 Commitment scheme 4,074 131 C High
234 Polybius square 4,056 130 Start Mid
235 Keygen 4,041 130 C Low
236 Root certificate 4,037 130 Start Low
237 Bruce Schneier 4,023 129 Start High
238 Dictionary attack 4,016 129 C Unknown
239 Digital watermarking 4,005 129 B Mid
240 Diplomatic bag 4,002 129 Start Low
241 Confidentiality 4,001 129 C Low
242 Peter Todd (programmer) 3,991 128 Start Unknown
243 Type B Cipher Machine 3,963 127 Start Low
244 Blowfish (cipher) 3,961 127 B High
245 Web of trust 3,939 127 C High
246 Length extension attack 3,909 126 Start Unknown
247 Preimage attack 3,882 125 Stub Unknown
248 Book cipher 3,853 124 C Low
249 Code signing 3,843 123 C Low
250 Rijndael S-box 3,836 123 Start Low
251 David Chaum 3,771 121 C Low
252 NIST Post-Quantum Cryptography Standardization 3,726 120 C Mid
253 Disk encryption theory 3,716 119 C Unknown
254 Bomba (cryptography) 3,713 119 Start Low
255 Polyalphabetic cipher 3,706 119 Start Unknown
256 Non-interactive zero-knowledge proof 3,670 118 Start Low
257 Clipper chip 3,656 117 C High
258 SipHash 3,649 117 Start Low
259 Bacon's cipher 3,640 117 Start Low
260 History of cryptography 3,634 117 C High
261 Magic (cryptography) 3,623 116 Start Unknown
262 Cryptocurrency tumbler 3,618 116 Start Unknown
263 Communications Security Establishment 3,610 116 C Mid
264 Merkle–Damgård construction 3,609 116 C Unknown
265 Boolean function 3,596 116 Start Mid
266 RSA SecurID 3,582 115 C Low
267 Dual EC DRBG 3,579 115 C High
268 The Doughnut 3,576 115 GA High
269 RSA Factoring Challenge 3,538 114 Start Low
270 BB84 3,517 113 Start Low
271 Elliptic curve point multiplication 3,483 112 C Mid
272 Elizebeth Smith Friedman 3,471 111 C Mid
273 PKCS 3,461 111 List High
274 3-D Secure 3,433 110 Start Low
275 Atbash 3,432 110 Stub Low
276 Certificate revocation list 3,416 110 C Low
277 Key stretching 3,410 110 Start Unknown
278 Trusted Computing 3,403 109 C Mid
279 List of ciphertexts 3,346 107 List Low
280 Directory service 3,344 107 Start Mid
281 Hill cipher 3,326 107 Unknown Unknown
282 Daniel J. Bernstein 3,324 107 C Mid
283 List of bitcoin forks 3,303 106 List Low
284 Dilly Knox 3,280 105 B Unknown
285 Encryption software 3,266 105 Start Top
286 Richard Teng 3,266 105 Start Low
287 Australian Signals Directorate 3,254 104 C Low
288 Bitcoin Core 3,243 104 Start Low
289 S-box 3,216 103 Start Top
290 Integer factorization records 3,209 103 Start Unknown
291 Scrambler 3,201 103 C Unknown
292 Blockchain game 3,194 103 Start Low
293 Affine cipher 3,173 102 C Low
294 Crypto AG 3,160 101 C High
295 Double Ratchet Algorithm 3,130 100 Start Low
296 Bitcoin scalability problem 3,113 100 C Low
297 Rail fence cipher 3,110 100 Start Low
298 HKDF 3,102 100 Start Unknown
299 XiaoFeng Wang (computer scientist) 3,089 99 C Unknown
300 Non-repudiation 3,062 98 Start Mid
301 Pepper (cryptography) 3,058 98 Start Low
302 Algorand 3,041 98 B Low
303 PKCS 11 3,033 97 Unknown Unknown
304 DNS Certification Authority Authorization 3,011 97 GA Low
305 Code (cryptography) 2,998 96 Start Top
306 Avalanche effect 2,950 95 Start High
307 Classical cipher 2,937 94 Start Top
308 Whonix 2,920 94 Start Mid
309 SegWit 2,899 93 Start Low
310 Physical unclonable function 2,896 93 Start Unknown
311 W. T. Tutte 2,869 92 C Mid
312 Export of cryptography from the United States 2,862 92 C Unknown
313 Hash chain 2,862 92 Start Unknown
314 Phil Zimmermann 2,861 92 Start Mid
315 Special Collection Service 2,854 92 C Low
316 Secret sharing 2,840 91 C High
317 Random oracle 2,826 91 Start Low
318 K-anonymity 2,814 90 Start Mid
319 Tor2web 2,813 90 Start Low
320 Key encapsulation mechanism 2,797 90 Start High
321 Clock drift 2,792 90 C Low
322 Supply chain attack 2,784 89 C Low
323 Gordon Welchman 2,769 89 C Low
324 McEliece cryptosystem 2,755 88 C High
325 Certificate Transparency 2,748 88 C High
326 AES key schedule 2,741 88 Start Low
327 Comparison of cryptography libraries 2,721 87 List Unknown
328 Whitfield Diffie 2,720 87 B High
329 I. J. Good 2,669 86 C Low
330 Zcash 2,656 85 Start Low
331 Schnorr signature 2,651 85 C High
332 Alastair Denniston 2,649 85 Start Unknown
333 PKCS 1 2,639 85 C Mid
334 Security level 2,635 85 Stub Mid
335 Rotor machine 2,623 84 Unknown Unknown
336 Interactive proof system 2,621 84 Start High
337 Trapdoor function 2,589 83 Start High
338 Jami (software) 2,584 83 Start Unknown
339 Crypt (C) 2,570 82 C High
340 Cryptographic protocol 2,564 82 Start High
341 Autokey cipher 2,563 82 C Mid
342 Mumble (software) 2,556 82 C Unknown
343 Key disclosure law 2,554 82 C Low
344 PKCS 7 2,550 82 Start Low
345 SM4 (cipher) 2,534 81 Start Low
346 Off-the-record messaging 2,514 81 Start Unknown
347 Mix network 2,441 78 C Low
348 Chosen-plaintext attack 2,430 78 Stub Unknown
349 Confusion and diffusion 2,429 78 Start Mid
350 Jefferson disk 2,419 78 Start Unknown
351 Proof of authority 2,409 77 Start Low
352 Nothing-up-my-sleeve number 2,393 77 C Low
353 Authenticator 2,348 75 B Low
354 Optimal asymmetric encryption padding 2,346 75 Start High
355 SecureDrop 2,346 75 Start Mid
356 Cryptographic primitive 2,334 75 Start Top
357 FIPS 140 2,333 75 Start Mid
358 Copiale cipher 2,308 74 Start Low
359 ADFGVX cipher 2,303 74 Unknown Unknown
360 Collision resistance 2,302 74 Start High
361 PKCS 8 2,302 74 Stub Unknown
362 One-way compression function 2,295 74 C Top
363 Proof of space 2,255 72 Start Low
364 Multiple encryption 2,243 72 Unknown Unknown
365 Opportunistic TLS 2,236 72 Start Mid
366 Charlie Lee (computer scientist) 2,212 71 Start Low
367 Hidden message 2,203 71 Start Low
368 Proton Drive 2,200 70 Start Low
369 William Binney (intelligence official) 2,199 70 C Mid
370 IEEE 802.11i-2004 2,197 70 C Mid
371 VIC cipher 2,187 70 C Low
372 Tox (protocol) 2,185 70 C Low
373 Ralph Merkle 2,181 70 C High
374 Pseudorandom function family 2,175 70 Start Low
375 Blind signature 2,167 69 C Mid
376 FIPS 140-3 2,156 69 C Low
377 Tabula recta 2,154 69 Unknown Unknown
378 Filecoin 2,147 69 Start Low
379 Public key fingerprint 2,131 68 Start Mid
380 Entrust 2,130 68 Start Low
381 CCM mode 2,120 68 Start High
382 Baby-step giant-step 2,116 68 C Unknown
383 Leo Marks 2,115 68 B Unknown
384 Diehard tests 2,111 68 C Low
385 Information-theoretic security 2,108 68 Start Top
386 William F. Friedman 2,105 67 C Unknown
387 Four-square cipher 2,105 67 C Unknown
388 Cryptome 2,089 67 C Low
389 Format-preserving encryption 2,081 67 Start High
390 Ciphertext indistinguishability 2,079 67 C High
391 Communications security 2,076 66 Start Mid
392 Martin Hellman 2,073 66 Start High
393 Comparison of SSH clients 2,072 66 List Low
394 Dm-crypt 2,071 66 Start Low
395 Key server (cryptographic) 2,063 66 Start Mid
396 Kasiski examination 2,055 66 Unknown Unknown
397 DNS-based Authentication of Named Entities 2,041 65 C Mid
398 Supersingular isogeny key exchange 2,025 65 Start Low
399 Shared secret 2,023 65 Stub High
400 Briar (software) 2,020 65 Start Low
401 BusKill 2,014 64 Start Low
402 Twofish 2,010 64 Start High
403 Comparison of disk encryption software 1,996 64 List High
404 Wildcard certificate 1,994 64 Redirect NA
405 CBC-MAC 1,986 64 C High
406 Cryptanalysis of the Lorenz cipher 1,983 63 C High
407 Trusted timestamping 1,977 63 Start Unknown
408 Data anonymization 1,974 63 Start Mid
409 Data at rest 1,969 63 C Mid
410 National Cryptologic Museum 1,964 63 C Mid
411 Bouncy Castle (cryptography) 1,959 63 Start Unknown
412 Berlekamp–Massey algorithm 1,952 62 Start Unknown
413 Black Chamber 1,940 62 Unknown Unknown
414 Pre-shared key 1,928 62 Start Mid
415 Banburismus 1,923 62 C Low
416 Bullrun (decryption program) 1,916 61 B Low
417 Sponge function 1,907 61 Unknown Unknown
418 Patricia Davies (codebreaker) 1,901 61 B Unknown
419 DeCSS 1,874 60 C Mid
420 Hybrid cryptosystem 1,873 60 Start High
421 Always-on DRM 1,873 60 Start Low
422 Musical cryptogram 1,869 60 C Low
423 SIGSALY 1,864 60 C Low
424 Reception and criticism of WhatsApp security and privacy features 1,863 60 C Low
425 Great Cipher 1,855 59 Start Mid
426 Cipher Bureau (Poland) 1,843 59 GA Low
427 UltraViolet (website) 1,843 59 C Low
428 Email privacy 1,835 59 C Low
429 Bitcoin Gold 1,834 59 Start Low
430 SIGABA 1,831 59 C High
431 Alberti cipher 1,822 58 C Low
432 Secure cryptoprocessor 1,813 58 C Mid
433 Codebook 1,804 58 Stub Unknown
434 David Wheeler (computer scientist) 1,803 58 C Low
435 Paillier cryptosystem 1,799 58 Start High
436 Poly1305 1,799 58 Start Top
437 Rubber-hose cryptanalysis 1,790 57 Redirect Low
438 A5/1 1,786 57 B High
439 Beaufort cipher 1,778 57 Start Low
440 Comparison of TLS implementations 1,778 57 List High
441 HTTP Public Key Pinning 1,773 57 C Mid
442 Crypto Wars 1,765 56 Start High
443 Crypto-shredding 1,750 56 Start Unknown
444 Null cipher 1,747 56 Stub Low
445 Arthur Scherbius 1,742 56 Start Mid
446 Strong cryptography 1,741 56 Unknown Unknown
447 Lamport signature 1,728 55 Start High
448 BLS digital signature 1,727 55 Start Mid
449 Government Communications Security Bureau 1,722 55 B Low
450 Random number generator attack 1,712 55 C Unknown
451 Differential cryptanalysis 1,704 54 B High
452 Jim Bell 1,694 54 GA Low
453 Downgrade attack 1,687 54 Start Mid
454 Anonymous P2P 1,684 54 C Low
455 Snake oil (cryptography) 1,679 54 Unknown Unknown
456 Encrypting File System 1,675 54 B Unknown
457 Advanced Access Content System 1,658 53 C Mid
458 PGP word list 1,653 53 Start Low
459 Taher Elgamal 1,647 53 C Unknown
460 Typex 1,636 52 Start Unknown
461 Dorabella Cipher 1,624 52 Unknown Unknown
462 Whirlpool (hash function) 1,622 52 Start Low
463 Visual cryptography 1,605 51 Unknown Unknown
464 Kleptography 1,602 51 Start Low
465 Enigma rotor details 1,589 51 Start Mid
466 Open Whisper Systems 1,587 51 B Unknown
467 The Alphabet Cipher 1,584 51 Unknown Unknown
468 MD4 1,567 50 Start Low
469 Rijndael MixColumns 1,560 50 Start Low
470 Power analysis 1,558 50 Unknown Unknown
471 Meet-in-the-middle attack 1,554 50 C High
472 WebTorrent 1,547 49 Start Unknown
473 NSA encryption systems 1,545 49 C Mid
474 Nyctography 1,543 49 Unknown Unknown
475 Station HYPO 1,542 49 Start Low
476 Tiny Encryption Algorithm 1,539 49 Unknown Unknown
477 Network Security Services 1,534 49 C High
478 BTCC (company) 1,533 49 Start Low
479 Michael O. Rabin 1,522 49 C Low
480 Word square 1,515 48 C Low
481 Red/black concept 1,514 48 Stub Unknown
482 Keybase 1,510 48 Start Low
483 M-209 1,508 48 Start Unknown
484 CableCARD 1,503 48 B Unknown
485 Clifford Cocks 1,500 48 C High
486 Pollard's kangaroo algorithm 1,493 48 C Low
487 Ross J. Anderson 1,490 48 C Mid
488 GNUnet 1,482 47 B Low
489 FreeOTP 1,472 47 Start Low
490 Coppersmith's attack 1,468 47 B High
491 Cryptovirology 1,464 47 Start Mid
492 Coinye 1,459 47 Start Low
493 Hardware-based full disk encryption 1,456 46 Start Mid
494 Grille (cryptography) 1,455 46 C Mid
495 Disk encryption software 1,441 46 C Mid
496 Secret decoder ring 1,437 46 Start Low
497 Comparison of cryptographic hash functions 1,421 45 List Low
498 Needham–Schroeder protocol 1,420 45 Start Mid
499 Key management 1,409 45 Unknown Unknown
500 Robert Morris (cryptographer) 1,407 45 Stub Low