This page uses content from Wikipedia and is licensed under CC BY-SA.

User:Matt Crypto/Crypto hits March-2004

Page accesses for articles in cryptography, sorted by number of hits, in March 2004. Counts for redirects have been absorbed into that of the main article.

Hits    Article name
-------------------------------------
3794   Cryptography
2160   Alan Turing
1743   Digital rights management
1477   Zimmermann Telegram
1437   RSA
1368   Public-key cryptography
1272   Steganography
1254   Enigma machine
1175   One-time pad
1123   Knapsack problem
1118   Polyalphabetic cipher
1099   Data Encryption Standard
1036   Pseudorandom number generator
1035   National Security Agency
1013   Code
1006   Advanced Encryption Standard
954   Digital signature
928   RC4 cipher
916   Voynich Manuscript
876   ROT13
873   Man in the middle attack
872   Transport Layer Security
830   DeCSS
827   ECHELON
826   MD5
802   Encryption
795   Asymmetric key algorithm
792   Diffie-Hellman key exchange
791   Dictionary attack
791   Exclusive disjunction
782   Topics in cryptography
738   Key signature
728   Cipher
717   Zimmermann Telegram
704   Symmetric key algorithm
702   Secure shell
697   Quantum cryptography
679   Wired Equivalent Privacy
651   IPSec
638   Triple DES
615   Substitution cipher
610   SHA-1
609   Cryptanalysis
599   List of cryptography topics
596   Wi-Fi Protected Access
592   Illegal prime
566   Fritz-chip
563   Block cipher
555   Elliptic curve cryptography
547   Password cracking
545   Invisible ink
540   ElGamal discrete log cryptosystem
538   Feistel cipher
505   Discrete logarithm
497   Colossus computer
484   Birthday attack
482   Information security
474   HTTPS
448   Digital Signature Algorithm
448   Brute force attack
448   Caesar cipher
447   Hardware random number generator
445   Content-scrambling system
442   TEMPEST
426   Claude Shannon
424   Purple code
423   Stream cipher
409   Security through obscurity
397   Frequency analysis
396   Babington plot
386   Encode
384   Authentication
377   Adi Shamir
373   Cryptographic key
370   International Data Encryption Algorithm
365   Kerckhoffs' law
362   Bletchley Park
357   Blum Blum Shub
357   Electronic voting
348   Cryptonomicon
343   Plaintext
336   Differential cryptanalysis
335   Crypto-anarchism
331   Atbash cipher
324   Government Communications Headquarters
321   Ron Rivest
318   Rijndael
314   VENONA project
313   Block cipher modes of operation
313   Ultra
311   Cryptographic hash function
311   Linear feedback shift register
303   Electronic money
303   Password
300   Leonard Adleman
299   SIGINT
294   Pretty Good Privacy
288   X.509
284   William F. Friedman
280   Kerberos
279   GNU Privacy Guard
277   Snake oil
275   List of cryptographers
274   Polybius square
273   Cryptographically secure pseudo-random number generator
270   Leone Battista Alberti
265   Decipherment
259   Blowfish encryption algorithm
245   Message digest
243   Substitution box
231   Public key infrastructure
226   Cypherpunk
215   Certificate authority
214   Security engineering
213   RC5
212   Secure cryptoprocessor
212   Computer surveillance
210   Cyphertext
208   DigiCipher 2
204   Linear cryptanalysis
199   Computer insecurity
194   Bruce Schneier
188   Key size
186   OpenSSH
185   Transposition cipher
175   Marian Rejewski
170   Pseudonymity
168   Playfair cipher
168   Keyed-hash message authentication code
165   RC6
163   PKI
161   Secret sharing
160   Daniel J. Bernstein
159   Whitfield Diffie
158   Microdot
157   Scytale
156   SIGABA
148   RIPEMD-160
148   Code talkers
146   JN-25
146   Public key certificate
146   Rotor machine
145   Dmitry Sklyarov
144   Typex
139   Twofish
138   Index of coincidence
137   Famous ciphertexts
136   Autokey cipher
134   History of cryptography
132   Covert channel
131   Crypto system
131   Phil Zimmermann
131   Zero-knowledge proof
129   Null cipher
126   Chaffing and winnowing
124   Anonymous remailer
122   Internet key exchange
122   Message Authentication Code
122   Web of trust
119   Ross Anderson
114   Lucifer cipher
113   Tiger hash function
112   MD5CRK
112   Kryptos
112   Cryptogram
111   Cryptographic engineering
110   Initialization vector
108   Books on cryptography
106   One way function
105   Key escrow
103   Merkle-Hellman
101   Chosen plaintext attack
100   Advanced Encryption Standard process
100   Meet-in-the-middle attack
99   Arne Beurling
98   CAST-128
96   OpenPGP
94   Financial cryptography
93   Lorenz cypher
89   Burrows-Abadi-Needham logic
89   Physical security
88   Confidentiality
87   Ralph Merkle
87   Clipper chip
86   CRYPTREC
85   Known-plaintext attack
80   Affine cipher
80   Beale ciphers
79   Martin Hellman
78   Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
78   The Gold Bug
77   Max Newman
77   Herbert Yardley
76   Traffic analysis
75   NESSIE
75   Distributed.net
74   Vincent Rijmen
74   Unicity distance
73   Permutation cipher
71   The Magic Words are Squeamish Ossifrage
71   40-bit encryption
70   Communication Theory of Secrecy Systems
70   Communications security
70   Geheimfernschreiber
70   Iraqi block cipher
70   RSA Security
68   Codebook
67   Auguste Kerckhoffs
66   Regulation of Investigatory Powers Act 2000
65   Dorabella Cipher
65   Skipjack encryption algorithm
63   Friedrich Kasiski
63   Tamper resistance
61   ADFGVX cipher
61   Ciphertext-only attack
61   Leo Marks
58   Cipherspace
57   Hebern Rotor Machine
57   Privacy-enhanced Electronic Mail
56   Crypto-society
55   Abraham Sinkov
55   Substitution-permutation network
54   Book cipher
54   OpenSSL
53   Eli Biham
53   Digital timestamping
53   Arlington Hall
52   Bernstein v. United States
52   W. T. Tutte
51   David Wagner
51   LibTom Project
50   Tabula recta
50   Security protocol notation
50   Chosen ciphertext attack
50   Tiny Encryption Algorithm
49   Elliptic Curve DSA
49   Confusion and diffusion
48   Yarrow algorithm
48   MARS
47   The Codebreakers
46   VIC cipher
46   Random oracle
45   Rubber-hose cryptanalysis
45   Adaptive chosen ciphertext attack
45   3-Way
45   Certificate Revocation List
44   Visual cryptography
44   Frank Rowlett
44   David Chaum
43   Scrambler
42   Henryk Zygalski
41   Session key
41   Paillier cryptosystem
41   Key authentication
41   Elizebeth Friedman
40   Pass phrase
40   Hushmail
40   Glossary of telecommunications encryption terms
40   Decrypt
40   Blind credential
40   Attacker
40   Agnes Meyer Driscoll
40   Zeroise
39   XTEA
38   S-1
37   Poem code
37   Niels Ferguson
37   CAcert
37   International Association for Cryptologic Research
36   Straddling checkerboard
36   Schnorr signature
36   GOST
36   Cryptome
35   Key derivation function
35   Jerzy Rozycki
35   Self-certifying key
34   Trapdoor function
34   Rabin cryptosystem
34   Certificate-based encryption
34   Serpent encryption algorithm
33   Passive attack
33   NTRUEncrypt
32   Shrinking generator
31   David Wheeler
31   Commitment scheme
30   Key distribution center
29   Don Coppersmith
29   CRYPTO
26   SYSKEY
26   Blind signature
26   Bit-flipping attack
26   Dining cryptographers protocol
25   Timing attack
25   Running key cipher
25   Key signing party
25   Hyperelliptic curve cryptography
25   Horst Feistel
24   COMSEC equipment
24   Snefru
23   Needham-Schroeder
23   Key-agreement protocol
23   Cipher Block Chaining
23   ID-based cryptography
22   Root certificate
22   KY-57
21   Solomon Kullback
21   Joan Daemen
21   Enigmail
20   Oblivious transfer
20   Cryptomathic
19   Undeniable signature
19   Garble
18   Laurence Safford
18   Journal of Cryptology
18   Magic cryptography
17   Cryptographically strong
17   Baby-step giant-step
15   Wide Mouth Frog
15   WHIRLPOOL
15   Otway-Rees
15   Type 1 product
13   A5/1
9   Red pike
7   Taher ElGamal
7   Trusted third party