201365537AA5/0A5/1A5/2A5/3A5/4Adaptive attackAEAD (authenticated encryption with associated data) AES (Advanced Encryption Standard)AES-CCMAES-GCMAES-GCM-SIVAES-NIAES-SIVAIM (Advanced INFOSEC Machine)AKAAKS (Agrawal–Kayal–Saxena)Algebraic cryptanalysisAliceAll-or-nothing transform (AONT)Anonymous signatureApplied CryptographyApplied cryptographyARC4Argon2ARX (Add-Rotate-XOR)ASIACRYPTAsymmetric cryptographyAttackAttribute-based encryption (ABE)Authenticated cipherAxolotlBBackdoorBacktracking resistanceBackward secrecyBase64BassOmaticBB84bcryptBiclique cryptanalysisBIKE (Bit Flipping Key Encapsulation)BIP (Bitcoin improvement proposal)Bit GoldBitcoinBlackBLAKEBLAKE2BLAKE3Bleichenbacher attackBlind signatureBlock cipherBlockchainBlockcipherBlowfishBLS (Boneh-Lynn-Shacham) signatureBobBoolean functionBoomerang attackBQP (bounded-error quantum polynomial time)Braid group cryptographyBrainpool curvesBreak-in recoveryBroadcast encryptionBrute-force attackBulletproofByzantine fault toleranceCCAESARCaesar’s cipherCAVP (Cryptographic Algorithm Validation Program)CBC (cipher block chaining)CECPQ (combined elliptic-curve and post-quantum)Cellular automataCeremonyCertificateCertificate authority (CA)Certificate transparency (CT)ChaCha20CHES (Conference on Cryptographic Hardware and Embedded Systems)CIACiphertext stealingClipperCMVP (Cryptographic Module Validation Program)Code-based cryptographyCommitmentConcurrent zero-knowledgeConsensus protocolControl wordCOPACOBANA (Cost-Optimized PArallel COde Breaker)Cothority (collective authority)CryptanalysisCryptidsCryptoCRYPTOCrypto AGCrypto periodCrypto variableCrypto warsCryptobiosisCryptocurrencyCrypto-GramCryptographyCryptologiaCryptologyCryptonomiconCryptorchidismCryptovirologyCRYPTRECCSIDH (Commutative Supersingular Isogeny Diffie–Hellman)CTF (capture the flag)Cube attackCurve25519Curve448CypherDDaemonDavies–MeyerDecentralized private computationDéchiffrerDécrypterDeniable encryptionDES (Data Encryption Standard)DictionaryDictionary attackDifferential cryptanalysisDiffie–HellmanDisclosureDiscrete logarithm problemDistinguisherDistributed randomnessDolev–Yao modelDouble ratchetDragonflyDRBG (deterministic random bit generator)DSA (Digital Signature Algorithm)DSS (Digital Signature Standard)DVB-CSAEE0ECB (electronic codebook)ECCECDLP (Elliptic-curve discrete logarithm problem)ECDSA (Elliptic-curve DSA)ECIES (Elliptic-curve IES)Ed25519EdDSAEKMS (Electronic Key Management System)Electronic codebookElGamalElligatorElliptic curveElliptic-curve cryptographyEnciphermentEnd-to-end encryption (E2EE)EnigmaEntropyePrintErathosthenes’ sieveeSTREAMEthereumEurocryptEveE-votingFFactoring problemFeedback shift registerFeistel networkFialka (Фиалка)Fiat–ShamirFIPS 140-2FIPS 140-3ForgeryFormal verificationFormat-preserving encryptionForward secrecyFOXFSE (Fast Software Encryption)Fully homomorphic encryptionFunctional encryptionFuture secrecyFuzzy extractorGGeneralized birthday problemGNFS (General Number Field Sieve)GOSTGrainGröbner basisGroup signatureGrover’s algorithmHHardcore predicateHash functionHash-based cryptographyHeartbleedHedged signatureHFE (Hidden Field Equations)HMAC (Hash-based MAC)Homomorphic encryptionHPC (Hasty Pudding Cipher)HSM (hardware security module)HTTP/3Hyperelliptic-curve cryptographyIIACR (International Association for Cryptologic Research)IDEA (International Data Encryption Algorithm)IDEA NXTIdentity-based encryptionIES (Integrated Encryption Scheme)Impatient saboteurImpossibilityImpossible differential attackIND-CCAIND-CPAIndelibilityIndifferentiabilityIndistinguishabilityIndistinguishability obfuscation (iO)Information-theoretic securityINT-CTXTInvisible signatureIOTAIPES (Improved Proposed Encryption Standard)IPSecISO standardIsogeny-based cryptographyJJournal of Cryptology (JoC)KKASUMIKeccakKeeLoqKEM (key encapsulation mechanism)KerberosKerckhoffs’ principlesKey derivation function (KDF)Key escrowKey managementKey wrappingKleptographyKnown-key attackKupyna (Купина)LLaconic zero-knowledge proofLai–MasseyLamport signatureLattice-based cryptographyLe ChiffreLeakage-resilient cryptographyLearning with errors (LWE)Length extension attackLength-preserving encryptionLFSR (linear feedback shift register)Lightweight cryptographyLinear cryptanalysisLinkabilityLM hashLuby–RackoffLucifer MMAC (message authentication code)MAGENTAMalleabilityManger attackMan-in-the-middleMASH (Modular Arithmetic Secure Hash)McEliece encryption schemeMD4MD5MDC (Message Digest Cipher)MDC-2 (Modification Detection Code 2)Meet-in-the-middleMerkle puzzleMerkle treeMerkle–Damgård constructionMersenne twisterMessage frankingMiller–RabinMINERVAMiningMisuse resistanceMixnetMQV (Menezes–Qu–Vanstone)MulticollisionMulti-party computation (MPC)Multivariate cryptographyNNBS (National Bureau of Standards)NESSIE (New European Schemes for Signatures, Integrity, and Encryption)“New Directions in Cryptography”NFSR (nonlinear feedback shift register)NIST (National Institute of Standards and Technology)NIZK (non-interactive zero-knowledge)NoekeonNoiseNonceNon-committing encryptionNon-outsourceabilityNon-slanderabilityNSA (National Security Agency)NT hashNTRU (Nth degree Truncated polynomial Ring Units)Null cipherOOAEP (Optimal Asymmetric Encryption Padding)Oblivious key management system (OKMS)Oblivious PRF (OPRF)Oblivious RAM (ORAM)Oblivious transferObscurityOCB (offset codebook mode)One-time padOne-way functionOnion-AEOPAQUEOpenSSLOracleOTR (Off-the-Record)PPadding oracle attackPaillier cryptosystemPairingPairing-based cryptographyPAKE (password-authenticated key exchange)ParadigmPassword hash functionPBKDF2 (Password-Based Key Derivation Function 2)PCT (Private Communications Technology)PEP (Plaintext equivalence proof)Perfect forward secrecyPermutation-based cryptographyPES (Proposed Encryption Standard)PET (Plaintext equivalence test)PFSPGP (Pretty Good Privacy)PhoturisPicnicPKCPKCS (Public Key Cryptography Standards)Poly1305Polynomial complexityPost-compromise securityPost-quantum cryptographyPost-quantum RSAPrediction resistancePreimagePRESENTPRIMESPrivacy-preservingPrivate information retrieval (PIR)Proof of burnProof of catalytic spaceProof of human workProof of replicationProof of reserveProof of securityProof of sequential workProof of spaceProof of spacetimeProof of stakeProof of storageProof of useful workProof of workProvable securityProvably secureProxy re-encryptionPseudo-randomPseudorandom function (PRF)Pseudorandom number generator (PRNG)Pseudorandom permutation (PRP)Public-key cryptographyPUF (physically unclonable function)Puncturable encryptionPuncturable pseudorandom function (PPRF)QQuantum computerQuantum cryptographyQuantum encryptionQuantum key distributionQuantum signatureQUIC (Quick UDP Internet Connections)RRabin cryptosystemRainbow tablesRandom bitsRandom oracleRandomnessRange proofRC4RC5RC6Real worldReal World Crypto (RWC)Rectangle attackRelated-key attackResearch papersRevocationRijndaelRing signatureRIPEMD-160Rivest–Shamir–AdlemanROBOT (Return Of Bleichenbacher’s Oracle Threat)ROSRSARubber-hose cryptanalysisRumba20SSAEP (Simplified OAEP)Salsa20Sandwich attackS-boxScalarsci.cryptScramblerscryptSearchable encryptionsecp256k1Secret sharingSecuritySecurity proofSemantic securitySerious CryptographySerpentSHA-0SHA-1SHA-2SHA-3SHA-3 competitionSHACALShamir’s secret databaseShor’s algorithmSHS (Secure Hash Standard)Side channelSide-channel attackSigabaSignal protocolSignatureSigncryptionSIKE (Supersingular Isogeny Key Encapsulation)SIMECKSIMONSipHashSIV-AESSkipjackSlide attackSMSmart contractSnake-oilSNARK (succinct non-interactive argument of knowledge)SNIP (secret-shared non-interactive proof)SNOW 3GSolitaireSPECKSPEKE (Simple Password Exponential Key Exchange)SPHINCSSponge functionSRP (Secure Remote Password)SSH (Secure Shell)SSL (Secure Socket Layer)STARK (scalable transparent arguments of knowledge)SteganographyStream cipherSubstitution-permutation network (SPN)SuckSugar beet auctionsSuite ASUPERCOPSuperpolynomial complexitySVP (shortest vector problem)Symmetric-key cryptographyTTCCTest vectorsThreefishThreshold encryptionThreshold secret-sharingThreshold signatureTime AI™Time-lock encryptionTime-lock puzzleTiming attackTLS (Transport Layer Security)TorTraitor tracingTransfinite cryptographyTrapdoorTriple DESTriviumTrue random number generator (TRNG)Trusted third partyTweakable block cipherTwitterTwofishUUndeniable signatureUniversal composabilityUniversal hash functionUpdatable encryptionVVerifiable delay function (VDF)Verifiable random function (VRF)Verifiable unpredictable function (VUF)Vigenère cipherVSH (Very Smooth Hash)WWalletWatermarkingWhite-box cryptographyWinternitz signatureWireGuardXX25519X3DHXMSS (eXtended Merkle Signature Scheme)XOF (extendable output function)XORXOR encryptionZZerocashZKP (zero-knowledge proof)ZRTPIndex of Terms