Cryptographic_Primitive

Ranked by notability

79
Articles
1
Images
59
Keywords Tracked
5
Websites Tracked
3,404,070
Monthly Searches
2
Pages

Browse by Type

Cryptographic Hash Function (39)
Key Derivation Function (12)
Cryptographic Primitive (4)
Cryptographically Secure Pseudo-Random Number Generator (3)
Cryptographic Hash And Stream Cipher Function (3)
Key Encapsulation (1)
Parametrized Function Family (1)
Sha Hash Functions (1)
Technical Standard (1)
Substitution–permutation Network (1)
Block Cipher (1)
Cryptographic Protocol (1)

Advanced Encryption Standard
Advanced Encryption Standard
Place
block cipher standard
MD5
Place
message-digest hashing algorithm
MD4
Place
obsolete cryptographic hash function
scrypt
Place
password-based key derivation function
bcrypt
Place
password-based key derivation function
RIPEMD
Place
cryptographic hash function
MD2
Place
obsolete cryptographic hash function
Argon2
Place
password-based key derivation function
Whirlpool
Place
cryptographic hash function
PBKDF2
Place
standard for a password-based key derivation function
Mix network
Place
routing protocol
RIPEMD-160
Place
cryptographic hash function
Dual_EC_DRBG
Place
controversial pseudorandom number generator
Shamir's Secret Sharing
Thing
algorithm in cryptography created by Adi Shamir
ring signature
Place
used in cryptocurrency
Group signature
Place
Privacy-based cryptographic primitive
MD6
Place
cryptographic hash function
Tiger
Place
cryptographic hash function
RIPEMD-128
Place
cryptographic hash function
RadioGatún
Thing
cryptographic hash primitive
HAVAL
Place
cryptographic hash function
N-Hash
Place
obsolete cryptographic hash function
Grøstl
Place
cryptographic hash function
HAS-160
Place
cryptographic hash function
Skein
Place
cryptographic hash function
Streebog
Place
Russian cryptographic hash function standard
ShangMi 3
Place
cryptographic hash function
Snefru
Place
cryptographic hash function
Panama
Place
cryptography primitive
BLAKE3
class
cryptographic hash function
yescrypt
Place
password-based key derivation function
Kyber
Place
quantum-safe key encapsulation mechanism
Accumulator
Place
ISAAC
Place
crytographic number generator
MDC-2
Place
cryptographic hash function, based on an arbitrary block cipher
CryptGenRandom
Place
cryptographic algorithm
BassOmatic
Place
block cipher
Kupyna
Place
Ukrainian cryptographic hash function standard
crypt
Place
key derivation function ("password hash")
SHA-0
Place
individual cryptographic hash function with output size of 160 bits
RIPEMD-320
Place
Prince
Place
block cipher targeting low latency, unrolled hardware implementations
RIPEMD-256
Place
cryptographic hash function
SHA-384
Place
cryptographic hash function
GOST R 34.11-94 and GOST 34.311-95
Place
Russian cryptographic hash function standard
Very smooth hash
Place
cryptographic hash function
Fast Syndrome Based Hash
Place
family of cryptographic hash functions
Lyra2
Place
key derivative function
SHA-512
Place
cryptographic hash function
HKDF
Place
key derivation function based on a HMAC
Elliptic curve only hash
Place
obsolete cryptographic hash function
Ascon
Place
family of authenticated ciphers
SHA-224
Place
cryptographic hash function
KangarooTwelve
Place
cryptographic hash function
Blue Midnight Wish
Place
hash function
SABER
Place
cryptographic key encapsulation mechanism
SHAKE256
Place
cryptographic hash function
SHAKE128
Place
cryptographic hash function
HAS-V
Place
cryptographic hash function
SHA3-512
Place
cryptographic hash function