User:Mapuna/Books/Cryptographic Attacks
Appearance
The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
Cryptographic Attacks
[edit]- Cryptographic attack
- 3-subset meet-in-the-middle attack
- Acoustic cryptanalysis
- Adaptive chosen-ciphertext attack
- Adversary (cryptography)
- Attack model
- Banburismus
- Biclique attack
- Birthday attack
- Bit-flipping attack
- Black bag operation
- Black-bag cryptanalysis
- Boomerang attack
- Brute-force attack
- Chosen-ciphertext attack
- Ciphertext-only attack
- Clock drift
- Collision attack
- Contact analysis (cryptanalysis)
- Coppersmith's attack
- Correlation attack
- Cracking of wireless networks
- CRIME
- Cryptanalysis
- Cryptanalytic computer
- Time/memory/data tradeoff attack
- CryptoLocker
- Cube attack
- Custom hardware attack
- Davies attack
- Dictionary attack
- Differential cryptanalysis
- Differential equations of addition
- Differential-linear attack
- Distinguishing attack
- Distributed.net
- Downgrade attack
- DROWN attack
- Duqu
- Flame (malware)
- Fluhrer, Mantin and Shamir attack
- FREAK
- Frequency analysis
- Gardening (cryptanalysis)
- Hardware backdoor
- Hardware keylogger
- John Herivel
- Higher-order differential cryptanalysis
- Impossible differential cryptanalysis
- Index of coincidence
- Integral cryptanalysis
- Interlock protocol
- Interpolation attack
- Kappa test
- Kasiski examination
- Key-recovery attack
- Keystroke logging
- Kiss (cryptanalysis)
- Known-key distinguishing attack
- Known-plaintext attack
- Length extension attack
- Linear cryptanalysis
- Locky
- LogicLocker
- Lucky Thirteen attack
- Man-in-the-middle attack
- MD5CRK
- Meet-in-the-middle attack
- Message forgery
- Metasploit Project
- Microsoft Office password protection
- Military Cryptanalytics
- Mod n cryptanalysis
- Padding oracle attack
- Partial-matching meet-in-the-middle attack
- Partitioning cryptanalysis
- Passive attack
- Password cracking
- Piling-up lemma
- Pre-play attack
- Preimage attack
- Pwdump
- Rainbow table
- Random number generator attack
- Rebound attack
- Regin (malware)
- Related-key attack
- Replay attack
- Riverbank Publications
- ROCA vulnerability
- Rootkit
- Rotational cryptanalysis
- Rubber-hose cryptanalysis
- SciEngines GmbH
- Self-service password reset
- Side-channel attack
- Sinkov statistic
- Slide attack
- Small subgroup confinement attack
- Steganalysis
- Stream cipher attacks
- Stuxnet
- Supply chain attack
- Table of costs of operations in elliptic curves
- Tempest (codename)
- TeslaCrypt
- Traffic analysis
- Truncated differential cryptanalysis
- Turingery
- Unicity distance
- Wannacry
- Watermarking attack
- Weak key
- Wiener's attack
- XSL attack
- Zendian problem
- Zygalski sheets