Category:Cryptographic protocols
Appearance
Cryptographic protocols — the communication protocols designed and available to provide computer security assurances using cryptographic mechanisms.
- Classic assurances include internet protocols for confidentiality and message integrity — and more recent research includes anonymity assurances. The term "protocol" is used in a wide sense, to include off-line arrangements such as encryption of email messages.
Subcategories
This category has the following 8 subcategories, out of 9 total.
(previous page) (next page)K
- Key transport protocols (4 P)
- Key-agreement protocols (14 P)
- Key-based routing (10 P)
M
- Mix networks (6 P)
- Multicast encryption (1 P)
S
T
Z
- Zero-knowledge protocols (6 P)
Pages in category "Cryptographic protocols"
The following 98 pages are in this category, out of 126 total. This list may not reflect recent changes.
(previous page) (next page)D
G
H
I
K
M
O
P
S
- Salted Challenge Response Authentication Mechanism
- SCVP
- Secure Communications Interoperability Protocol
- Secure copy protocol
- Secure Hypertext Transfer Protocol
- Secure multi-party computation
- Secure Neighbor Discovery
- Secure Real-time Transport Protocol
- Security Protocols Open Repository
- Shamir three-pass protocol
- Signal Protocol
- Signature Record Type Definition
- Silent Circle Instant Messaging Protocol
- Simple Authentication and Security Layer
- Simple Certificate Enrollment Protocol
- Simultaneous Authentication of Equals
- SPNEGO