1. ### Cryptography

aimlexchange.com/search/wiki/page/Cryptography

Cryptography or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"

2. ### Public-key cryptography

aimlexchange.com/search/wiki/page/Public-key_cryptography

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and

3. ### Elliptic-curve cryptography

aimlexchange.com/search/wiki/page/Elliptic-curve_cryptography

Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC

4. ### Symmetric-key algorithm

aimlexchange.com/search/wiki/page/Symmetric-key_algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext

5. ### Encryption

aimlexchange.com/search/wiki/page/Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who

6. ### Post-quantum cryptography

aimlexchange.com/search/wiki/page/Post-quantum_cryptography

Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key

7. ### Salt (cryptography)

aimlexchange.com/search/wiki/page/Salt_%28cryptography%29

In cryptography, a salt is random data that is used as an additional input to a one-way function that hashes data, a password or passphrase. Salts are

8. ### History of cryptography

aimlexchange.com/search/wiki/page/History_of_cryptography

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might

9. ### Quantum cryptography

aimlexchange.com/search/wiki/page/Quantum_cryptography

Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography

10. ### RSA (cryptosystem)

aimlexchange.com/search/wiki/page/RSA_%28cryptosystem%29

"Introduction to Cryptography with Open-Source Software". p. 12. Surender R. Chiluka. "Public key Cryptography". Neal Koblitz. "Cryptography As a Teaching

Contents