Category:Cryptographic protocols
From HandWiki
Here is a list of articles in the Cryptographic protocols category of the Computing portal that unifies foundations of mathematics and computations using computers.
Cryptographic protocols — the communication protocols designed and available to provide computer security assurances using cryptographic mechanisms.
- Classic assurances include internet protocols for confidentiality and message integrity — and more recent research includes anonymity assurances. The term "protocol" is used in a wide sense, to include off-line arrangements such as encryption of email messages.
Subcategories
This category has the following 3 subcategories, out of 3 total.
A
- Authentication protocols (14 P)
T
Pages in category "Cryptographic protocols"
The following 127 pages are in this category, out of 127 total.
A
B
C
D
- Datagram Transport Layer Security
- Delegated credential
- Delegated Path Discovery
- Delegated Path Validation
- Deniable authentication
- Digest access authentication
- Engineering:DigiCipher 2
- Digital credential
- Distance-bounding protocol
- Distributed System Security Architecture
- DomainKeys
- DomainKeys Identified Mail
G
K
M
O
P
S
- Salted Challenge Response Authentication Mechanism
- SCVP
- Secure Communications Interoperability Protocol
- Software:Secure copy protocol
- Secure Hypertext Transfer Protocol
- Secure multi-party computation
- Secure Neighbor Discovery
- Secure Real-time Transport Protocol
- Security Protocols Open Repository
- Shamir three-pass protocol
- Signal Protocol
- Signature Record Type Definition
- Silent Circle Instant Messaging Protocol
- Simple Authentication and Security Layer
- Simple Certificate Enrollment Protocol
- Simultaneous Authentication of Equals
- SPNEGO