Jump to content

Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2024-12-01 to 2024-12-31

Total views: 6,565,476

Updated: 22:54, 5 January 2025 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 762,223 24,587 B High
2 Bitcoin 353,018 11,387 B High
3 Telegram (software) 332,920 10,739 B Mid
4 Cryptocurrency 214,487 6,918 C High
5 Dogecoin 169,733 5,475 C Low
6 Alan Turing 160,858 5,188 GA Top
7 History of bitcoin 138,935 4,481 C Low
8 Enigma machine 112,656 3,634 C High
9 Blockchain 95,255 3,072 B High
10 Tor (network) 91,280 2,944 B Mid
11 The Imitation Game 75,386 2,431 C Mid
12 Voynich manuscript 74,911 2,416 B Low
13 WikiLeaks 68,014 2,194 B Low
14 National Security Agency 67,661 2,182 C High
15 Transport Layer Security 60,289 1,944 B Top
16 HTTPS 58,260 1,879 C High
17 Vitalik Buterin 53,138 1,714 C Low
18 Signal (software) 52,810 1,703 C Mid
19 RSA (cryptosystem) 49,525 1,597 C Top
20 Virtual private network 47,867 1,544 C Mid
21 Caesar cipher 45,062 1,453 FA High
22 Darknet market 45,051 1,453 B Mid
23 Changpeng Zhao 43,452 1,401 Start Low
24 Shiba Inu (cryptocurrency) 42,504 1,371 Start Low
25 Advanced Encryption Standard 42,317 1,365 B Top
26 HTTP Strict Transport Security 41,890 1,351 C Low
27 SHA-2 40,857 1,317 C Top
28 Cryptography 38,790 1,251 C Top
29 Diffie–Hellman key exchange 38,129 1,229 C Top
30 Post-quantum cryptography 37,676 1,215 C High
31 GCHQ 36,606 1,180 B Low
32 Public-key cryptography 36,530 1,178 C Top
33 Secure Shell 35,695 1,151 C High
34 Vigenère cipher 33,814 1,090 B Low
35 Claude Shannon 26,414 852 C Top
36 Block cipher mode of operation 25,514 823 C Top
37 Proton Mail 24,338 785 C Low
38 Letter frequency 24,143 778 B Low
39 Information theory 23,922 771 B Top
40 Digital signature 23,711 764 C Top
41 NordVPN 23,643 762 C Mid
42 Trusted Platform Module 23,633 762 C Mid
43 Password 23,073 744 C Top
44 MD5 23,072 744 C Top
45 Phone hacking 23,038 743 Start Mid
46 Man-in-the-middle attack 22,915 739 C Mid
47 Merkle tree 22,764 734 C Mid
48 Sator Square 22,750 733 B Low
49 Cryptographic hash function 22,402 722 C Top
50 Zimmermann telegram 22,065 711 B High
51 Knapsack problem 21,885 705 C Mid
52 Pretty Good Privacy 20,596 664 B High
53 HMAC 20,143 649 C High
54 Steganography 19,730 636 C High
55 Encryption 19,553 630 C Top
56 Elliptic-curve cryptography 19,476 628 C High
57 Kryptos 19,328 623 C Low
58 Bletchley Park 19,286 622 B High
59 Bitcoin Cash 18,563 598 Start Low
60 Information security 18,056 582 B Top
61 Decentralized finance 17,765 573 Start Low
62 Joan Clarke 17,244 556 C Mid
63 Litecoin 17,138 552 Start Low
64 Wi-Fi Protected Access 17,121 552 C Mid
65 SHA-1 16,875 544 C Top
66 Zero-knowledge proof 16,851 543 C Top
67 ROT13 16,603 535 C Mid
68 Rainbow table 16,425 529 C High
69 Grover's algorithm 16,182 522 C Mid
70 One-time password 16,099 519 B Mid
71 Proof of stake 15,955 514 C Low
72 One-time pad 15,924 513 C Top
73 Cipher 15,519 500 C Top
74 Certificate authority 15,226 491 C High
75 Keychain (software) 14,998 483 Start Unknown
76 Substitution cipher 14,989 483 Unknown Unknown
77 OpenVPN 14,772 476 C Mid
78 Digital rights management 14,765 476 C High
79 Kerberos (protocol) 14,654 472 C High
80 Cryptanalysis of the Enigma 14,550 469 C Mid
81 .onion 14,222 458 C Low
82 Active Directory 14,183 457 C Low
83 Code talker 13,223 426 B Low
84 Tails (operating system) 13,095 422 Start Low
85 Bcrypt 12,815 413 C Mid
86 Public key infrastructure 12,787 412 C Top
87 Comparison of BitTorrent clients 12,715 410 List Low
88 Elliptic Curve Digital Signature Algorithm 12,435 401 C High
89 Polybius square 12,024 387 Start Mid
90 Integer factorization 11,991 386 B Mid
91 Public key certificate 11,903 383 C Top
92 Secure Hash Algorithms 11,795 380 Start High
93 Bombe 11,702 377 B Mid
94 OpenSSL 11,466 369 B High
95 SHA-3 11,433 368 Start Mid
96 Salt (cryptography) 11,317 365 Start High
97 Gordon Welchman 11,316 365 C Low
98 Adam Back 10,845 349 C Low
99 IMSI-catcher 10,501 338 Start Mid
100 Galois/Counter Mode 10,471 337 C Mid
101 Mullvad 10,465 337 Start Low
102 Vault 7 10,429 336 C Mid
103 Authentication 10,348 333 C High
104 Bitconnect 10,225 329 C Low
105 Homomorphic encryption 10,192 328 C High
106 Brute-force attack 10,178 328 C High
107 I2P 10,160 327 B Low
108 Ultra (cryptography) 10,120 326 C High
109 Colossus computer 10,110 326 B Mid
110 Utah Data Center 10,071 324 C Mid
111 SSH File Transfer Protocol 10,005 322 C Low
112 Polkadot (blockchain platform) 9,831 317 Start Low
113 Peter Todd (cryptographer) 9,821 316 Start Unknown
114 Data Encryption Standard 9,749 314 C Top
115 Password cracking 9,744 314 C Mid
116 Playfair cipher 9,628 310 Unknown Unknown
117 Theoretical computer science 9,545 307 B Low
118 Forward secrecy 9,478 305 C High
119 Shamir's secret sharing 9,431 304 C High
120 Cryptonomicon 9,429 304 C Low
121 Symmetric-key algorithm 9,425 304 Start Top
122 Beale ciphers 9,339 301 B Low
123 Pay television 9,311 300 Start Unknown
124 Bitwarden 9,192 296 C Low
125 InterPlanetary File System 9,188 296 C Low
126 Bitcoin Core 9,156 295 Start Low
127 Matrix (protocol) 9,114 294 Start Unknown
128 Alice and Bob 8,961 289 Start High
129 ChaCha20-Poly1305 8,814 284 C Low
130 VeraCrypt 8,810 284 C Mid
131 Babington Plot 8,756 282 C Low
132 Quantum cryptography 8,736 281 C High
133 Algorand 8,707 280 B Low
134 Quantum key distribution 8,684 280 B Mid
135 Fort Meade 8,598 277 C Low
136 Cryptographic nonce 8,550 275 Start High
137 Cryptogram 8,397 270 C Mid
138 Cypherpunk 8,311 268 C Mid
139 EdDSA 8,249 266 C High
140 Password manager 8,168 263 C Low
141 PBKDF2 8,118 261 C Low
142 The Tor Project 8,075 260 C Mid
143 Birthday attack 7,886 254 C High
144 Cryptanalysis 7,875 254 C High
145 Len Sassaman 7,823 252 Start Unknown
146 Discrete logarithm 7,744 249 C Mid
147 Apple–FBI encryption dispute 7,739 249 C Low
148 Tabula recta 7,713 248 Unknown Unknown
149 Link 16 7,586 244 Start Low
150 Tap code 7,552 243 Start Low
151 Authenticated encryption 7,533 243 C Mid
152 The Doughnut 7,478 241 GA High
153 Richard Teng 7,467 240 Start Low
154 Message authentication code 7,405 238 C Top
155 Nyctography 7,354 237 Unknown Unknown
156 Lattice-based cryptography 7,205 232 Start Low
157 KeePass 7,176 231 C Low
158 Curve25519 7,112 229 C High
159 Signal Protocol 7,104 229 C High
160 Hyphanet 6,981 225 B Mid
161 Elliptic-curve Diffie–Hellman 6,976 225 Start Mid
162 Magic (cryptography) 6,889 222 Start Unknown
163 Argon2 6,804 219 C Mid
164 Units of information 6,693 215 C Unknown
165 Differential privacy 6,615 213 C Mid
166 Qubes OS 6,614 213 C Mid
167 List of bitcoin forks 6,491 209 List Low
168 Digest access authentication 6,243 201 B Low
169 3-D Secure 6,222 200 Start Low
170 Password strength 6,197 199 C High
171 Key derivation function 6,153 198 C Low
172 Lavarand 6,070 195 Start Mid
173 Transposition cipher 5,908 190 Unknown Unknown
174 TrueCrypt 5,857 188 C Mid
175 Certificate signing request 5,828 188 C Low
176 Lorenz cipher 5,825 187 C Top
177 Side-channel attack 5,741 185 C High
178 Cryptographically secure pseudorandom number generator 5,735 185 C Top
179 Bitcoin scalability problem 5,720 184 C Low
180 Triple DES 5,702 183 Start Unknown
181 XOR cipher 5,494 177 Stub Mid
182 Reception and criticism of WhatsApp security and privacy features 5,459 176 C Low
183 GNU Privacy Guard 5,445 175 C Unknown
184 Self-signed certificate 5,436 175 Start Unknown
185 Bacon's cipher 5,392 173 Start Low
186 RC4 5,370 173 B Top
187 Digital Signature Algorithm 5,363 173 C Top
188 PKCS 12 5,357 172 Start Low
189 Harvest now, decrypt later 5,347 172 Start Low
190 Block cipher 5,300 170 C Top
191 KeePassXC 5,287 170 Start Low
192 ElGamal encryption 5,272 170 Start Top
193 Rijndael S-box 5,256 169 Start Low
194 Salsa20 5,249 169 C Top
195 Citizenfour 5,193 167 C Low
196 11B-X-1371 5,162 166 GA Low
197 Web of trust 5,045 162 C High
198 FIPS 140-2 4,927 158 C Mid
199 Adi Shamir 4,919 158 C Unknown
200 Conel Hugh O'Donel Alexander 4,900 158 Start Low
201 Confidentiality 4,865 156 C Low
202 Mutual authentication 4,864 156 Stub Low
203 Cipher suite 4,846 156 C Top
204 Feistel cipher 4,833 155 Start Unknown
205 Automatic Certificate Management Environment 4,826 155 Start Low
206 Kerckhoffs's principle 4,807 155 Start Mid
207 Fork (blockchain) 4,774 154 Start Mid
208 Cold boot attack 4,729 152 C Low
209 Hashcash 4,704 151 Start Unknown
210 OpenSSH 4,647 149 C High
211 Key (cryptography) 4,640 149 Start Unknown
212 Marian Rejewski 4,629 149 FA Mid
213 Stream cipher 4,623 149 Start Top
214 Known-plaintext attack 4,584 147 Start High
215 Illegal number 4,579 147 C Low
216 Rail fence cipher 4,544 146 Start Low
217 Ricky McCormick's encrypted notes 4,533 146 B Low
218 Blowfish (cipher) 4,505 145 B High
219 Root certificate 4,504 145 Start Low
220 Electronic signature 4,496 145 C Low
221 David Chaum 4,493 144 C Low
222 Session (software) 4,488 144 Start Low
223 BLAKE (hash function) 4,463 143 C Mid
224 Datagram Transport Layer Security 4,353 140 C Mid
225 Blockchain game 4,297 138 Start Low
226 Wired Equivalent Privacy 4,292 138 C Mid
227 Book cipher 4,290 138 C Low
228 Boolean function 4,243 136 Start Mid
229 Secure multi-party computation 4,233 136 Start High
230 Zcash 4,228 136 Start Low
231 Filecoin 4,221 136 Start Low
232 RSA Security 4,219 136 C Unknown
233 Certificate revocation list 4,167 134 C Low
234 Padding (cryptography) 4,114 132 Start Unknown
235 Non-repudiation 4,061 131 Start Mid
236 AES instruction set 4,044 130 C Low
237 Dual EC DRBG 4,000 129 C High
238 Crypto-anarchy 3,984 128 Start High
239 Key signing party 3,976 128 Stub Low
240 Threema 3,952 127 C Unknown
241 Atbash 3,950 127 Stub Low
242 Quantum network 3,894 125 C Low
243 Replay attack 3,888 125 C Top
244 Bruce Schneier 3,882 125 Start High
245 History of cryptography 3,872 124 Start High
246 Deniable encryption 3,850 124 Start High
247 Commitment scheme 3,847 124 C High
248 Padding oracle attack 3,831 123 Start Low
249 Diplomatic bag 3,752 121 Start Low
250 Frequency analysis 3,749 120 C High
251 Communications Security Establishment 3,729 120 C Mid
252 Ciphertext 3,695 119 Start High
253 Initialization vector 3,677 118 C High
254 Certificate Transparency 3,674 118 C High
255 Charlie Lee (computer scientist) 3,568 115 Start Low
256 PKCS 3,558 114 List High
257 Whonix 3,547 114 Start Mid
258 Plaintext 3,520 113 Start High
259 Polyalphabetic cipher 3,499 112 Start Unknown
260 Privacy-Enhanced Mail 3,492 112 Start Low
261 NIST Post-Quantum Cryptography Standardization 3,483 112 C Mid
262 Daniel J. Bernstein 3,451 111 C Mid
263 Cryptocurrency tumbler 3,440 110 Start Unknown
264 One-way function 3,430 110 Start Top
265 Secret decoder ring 3,423 110 Start Low
266 RSA SecurID 3,373 108 C Low
267 Elliptic curve point multiplication 3,351 108 C Mid
268 PKCS 11 3,335 107 Unknown Unknown
269 Merkle–Damgård construction 3,325 107 C Unknown
270 Digital renminbi 3,309 106 B High
271 Timing attack 3,299 106 C High
272 Bomba (cryptography) 3,281 105 Start Low
273 Hill cipher 3,265 105 Unknown Unknown
274 Challenge–response authentication 3,259 105 Start Mid
275 Supply chain attack 3,257 105 C Low
276 Keygen 3,233 104 C Low
277 Digital watermarking 3,212 103 B Mid
278 List of ciphertexts 3,204 103 List Low
279 Special Collection Service 3,200 103 C Low
280 Type B Cipher Machine 3,090 99 Start Low
281 SipHash 3,087 99 Start Low
282 Directory service 3,009 97 Start Mid
283 Australian Signals Directorate 3,001 96 C Low
284 DNS-based Authentication of Named Entities 2,992 96 C Mid
285 Bitcoin Gold 2,983 96 Start Low
286 PKCS 7 2,957 95 Start Low
287 Key size 2,943 94 C High
288 BB84 2,943 94 Start Low
289 Crypto AG 2,903 93 C High
290 Non-interactive zero-knowledge proof 2,903 93 Start Low
291 Authenticator 2,897 93 B Low
292 Length extension attack 2,894 93 Start Unknown
293 S-box 2,879 92 Start Top
294 Affine cipher 2,860 92 C Low
295 AES key schedule 2,856 92 Start Low
296 Dilly Knox 2,849 91 B Unknown
297 Cryptographic protocol 2,845 91 Start High
298 Preimage attack 2,837 91 Stub Unknown
299 Elizebeth Smith Friedman 2,791 90 C Mid
300 Collision attack 2,744 88 Start High
301 Key exchange 2,740 88 Start Unknown
302 Disk encryption 2,737 88 C High
303 Whitfield Diffie 2,704 87 B High
304 RSA Factoring Challenge 2,680 86 Start Low
305 Clipper chip 2,662 85 C High
306 Code signing 2,644 85 C Low
307 PKCS 1 2,626 84 C Mid
308 Dictionary attack 2,615 84 C Unknown
309 Disk encryption theory 2,612 84 C Unknown
310 Schnorr signature 2,608 84 C High
311 K-anonymity 2,606 84 Start Mid
312 William Binney (intelligence official) 2,583 83 C Mid
313 Phil Zimmermann 2,553 82 Start Mid
314 Autokey cipher 2,521 81 C Mid
315 Pre-shared key 2,521 81 Start Mid
316 Key encapsulation mechanism 2,447 78 Start High
317 ADFGVX cipher 2,437 78 Unknown Unknown
318 SegWit 2,420 78 Start Low
319 Strong cryptography 2,372 76 Unknown Unknown
320 Baby-step giant-step 2,366 76 C Unknown
321 Lenstra elliptic-curve factorization 2,360 76 C Low
322 Alastair Denniston 2,336 75 Start Unknown
323 DNS Certification Authority Authorization 2,336 75 GA Low
324 Comparison of SSH clients 2,328 75 List Low
325 Entrust 2,272 73 Start Low
326 Scrambler 2,271 73 C Unknown
327 PKCS 8 2,242 72 Stub Unknown
328 Twofish 2,225 71 Start High
329 HKDF 2,221 71 Start Unknown
330 Avalanche effect 2,216 71 Start High
331 Ralph Merkle 2,215 71 C High
332 Export of cryptography from the United States 2,213 71 C Unknown
333 Communications security 2,206 71 Start Mid
334 Classical cipher 2,200 70 Start Top
335 BTCC (company) 2,186 70 Start Low
336 Comparison of disk encryption software 2,176 70 List High
337 Bullrun (decryption program) 2,176 70 B Low
338 Tox (protocol) 2,168 69 C Low
339 Martin Hellman 2,157 69 Start High
340 Optimal asymmetric encryption padding 2,155 69 Start High
341 Trusted timestamping 2,149 69 Start Unknown
342 Bouncy Castle (cryptography) 2,144 69 Start Unknown
343 FIPS 140 2,085 67 Start Mid
344 Hash chain 2,071 66 Start Unknown
345 Double Ratchet Algorithm 2,071 66 Start Low
346 IEEE 802.11i-2004 2,056 66 C Mid
347 Grille (cryptography) 2,056 66 C Mid
348 Off-the-record messaging 2,052 66 Start Unknown
349 Data at rest 2,050 66 C Mid
350 Coinye 2,046 66 Start Low
351 WebTorrent 2,046 66 Start Unknown
352 Data anonymization 2,037 65 Start Mid
353 HTTP Public Key Pinning 2,037 65 C Mid
354 FIPS 140-3 2,028 65 C Low
355 Dm-crypt 2,023 65 Start Low
356 Enigma rotor details 2,004 64 Start Mid
357 Trusted Computing 1,973 63 C Mid
358 Security level 1,963 63 Stub Mid
359 I. J. Good 1,950 62 C Low
360 CCM mode 1,947 62 Start High
361 Nothing-up-my-sleeve number 1,938 62 C Low
362 NSAKEY 1,918 61 C High
363 Encrypting File System 1,915 61 B Unknown
364 William F. Friedman 1,910 61 C Unknown
365 Copiale cipher 1,898 61 Start Low
366 Crypto Wars 1,897 61 Start High
367 Opportunistic TLS 1,893 61 Start Mid
368 Paillier cryptosystem 1,889 60 Start High
369 Briar (software) 1,879 60 Start Low
370 Trapdoor function 1,875 60 Start High
371 Rijndael MixColumns 1,868 60 Start Low
372 McEliece cryptosystem 1,860 60 C High
373 Comparison of TLS implementations 1,858 59 List High
374 Criticism of Dropbox 1,852 59 B Low
375 Station HYPO 1,843 59 Start Low
376 Mumble (software) 1,841 59 C Unknown
377 Pepper (cryptography) 1,831 59 Start Low
378 Ciphertext indistinguishability 1,829 59 C High
379 BLS digital signature 1,829 59 Start Mid
380 Bitcoin Satoshi Vision 1,829 59 Start Low
381 Secret sharing 1,823 58 C High
382 Black Chamber 1,808 58 Unknown Unknown
383 UltraViolet (website) 1,805 58 C Low
384 Comparison of cryptography libraries 1,802 58 List Unknown
385 DeCSS 1,798 58 C Mid
386 Serene (pianist) 1,795 57 Start Unknown
387 Key management 1,794 57 Unknown Unknown
388 Cryptographic primitive 1,791 57 Start Top
389 Orbot 1,783 57 Stub Low
390 Musical cryptogram 1,769 57 C Low
391 Government Communications Security Bureau 1,766 56 B Low
392 Physical unclonable function 1,764 56 Start Unknown
393 Snowflake (software) 1,744 56 Start Low
394 Four-square cipher 1,736 56 C Unknown
395 Arthur Scherbius 1,719 55 Start Mid
396 CBC-MAC 1,719 55 C High
397 Advanced Access Content System 1,716 55 C Mid
398 Key stretching 1,712 55 Start Unknown
399 Cryptanalysis of the Lorenz cipher 1,691 54 C High
400 Encryption software 1,686 54 Start Top
401 Chosen-plaintext attack 1,678 54 Stub Unknown
402 Nihilist cipher 1,677 54 Unknown Unknown
403 Poly1305 1,666 53 Start Top
404 Leo Marks 1,655 53 B Unknown
405 NEO (cryptocurrency) 1,653 53 Start Low
406 Anonymous P2P 1,649 53 C Low
407 Proton Drive 1,644 53 Start Low
408 Dorabella Cipher 1,643 53 Unknown Unknown
409 Tor2web 1,632 52 Start Low
410 FreeOTP 1,628 52 Start Low
411 MD4 1,619 52 Start Low
412 National Cryptologic Museum 1,611 51 C Mid
413 Open Whisper Systems 1,611 51 B Unknown
414 FileVault 1,603 51 C Mid
415 Meet-in-the-middle attack 1,589 51 C High
416 Clock drift 1,587 51 C Low
417 Blum Blum Shub 1,585 51 Start High
418 Operation Rubicon 1,580 50 C Low
419 Jami (software) 1,571 50 Start Unknown
420 Temporal Key Integrity Protocol 1,564 50 C Low
421 Quahl 1,564 50 C Low
422 W. T. Tutte 1,559 50 C Mid
423 Key disclosure law 1,557 50 C Low
424 Generic Security Services Application Program Interface 1,555 50 Start Low
425 Advanced Encryption Standard process 1,548 49 C Mid
426 Two-square cipher 1,544 49 Unknown Unknown
427 AES implementations 1,544 49 List Low
428 Pollard's kangaroo algorithm 1,533 49 C Low
429 Comparison of cryptographic hash functions 1,532 49 List Low
430 Proof of authority 1,526 49 Start Low
431 SecureDrop 1,525 49 Start Mid
432 RSA problem 1,521 49 Start Top
433 Confusion and diffusion 1,518 48 Start Mid
434 Challenge-Handshake Authentication Protocol 1,471 47 Start Low
435 Integrated Encryption Scheme 1,471 47 Start Low
436 Code (cryptography) 1,469 47 Start Top
437 Differential cryptanalysis 1,468 47 B High
438 NTRU 1,466 47 C Low
439 Opportunistic Wireless Encryption 1,458 47 Stub Low
440 ZeroNet 1,454 46 Start Low
441 Peercoin 1,445 46 Stub Low
442 Tiny Encryption Algorithm 1,436 46 Unknown Unknown
443 Alberti cipher 1,432 46 C Low
444 NTRUEncrypt 1,429 46 C Mid
445 Null cipher 1,425 45 Stub Low
446 Taher Elgamal 1,419 45 C Unknown
447 List of cryptographers 1,416 45 List Low
448 Content Scramble System 1,416 45 Start Mid
449 Clifford Cocks 1,409 45 C High
450 Frank Terpil 1,409 45 Start Low
451 Berlekamp–Massey algorithm 1,407 45 Start Unknown
452 Collision resistance 1,399 45 Start High
453 Hybrid cryptosystem 1,395 45 Start High
454 One-way compression function 1,393 44 C Top
455 David Wheeler (computer scientist) 1,392 44 C Low
456 Crypt (C) 1,383 44 C High
457 Information-theoretic security 1,380 44 Start Top
458 Blind signature 1,378 44 C Mid
459 Hash-based cryptography 1,378 44 Start Low
460 Roger Dingledine 1,376 44 Start Unknown
461 A5/1 1,375 44 B High
462 Oblivious transfer 1,375 44 Start Unknown
463 SIGABA 1,364 44 C High
464 Twisted Edwards curve 1,362 43 C Low
465 Secure cryptoprocessor 1,357 43 C Mid
466 Rotor machine 1,348 43 Unknown Unknown
467 Max Newman 1,332 42 B Low
468 Steganographia 1,330 42 Start Low
469 Proof of space 1,330 42 Start Low
470 SYN cookies 1,321 42 Start Unknown
471 Codebook 1,320 42 Stub Unknown
472 Word square 1,315 42 C Low
473 Integer factorization records 1,312 42 Start Unknown
474 RIPEMD 1,309 42 C Unknown
475 Power analysis 1,303 42 Unknown Unknown
476 ElGamal signature scheme 1,300 41 Start Top
477 Zooko's triangle 1,299 41 Start Low
478 Random oracle 1,290 41 Start Low
479 Always-on DRM 1,288 41 Start Low
480 Keybase 1,286 41 Start Low
481 Kasiski examination 1,284 41 Unknown Unknown
482 LibreSSL 1,279 41 C High
483 Texas Instruments signing key controversy 1,277 41 C Low
484 Music cipher 1,267 40 Unknown Unknown
485 CableCARD 1,266 40 B Unknown
486 Beaufort cipher 1,262 40 Start Low
487 Cipher runes 1,258 40 Start Unknown
488 One-key MAC 1,257 40 Start Low
489 Simultaneous Authentication of Equals 1,247 40 Start High
490 GNUnet 1,245 40 B Low
491 Supersingular isogeny key exchange 1,237 39 Start Low
492 Jim Bell 1,231 39 GA Low
493 Red/black concept 1,230 39 Stub Unknown
494 Cipher Bureau (Poland) 1,229 39 GA Low
495 Visual cryptography 1,223 39 Unknown Unknown
496 Banburismus 1,221 39 C Low
497 Blaise de Vigenère 1,217 39 Start Unknown
498 Jefferson disk 1,217 39 Start Unknown
499 Typex 1,213 39 Start Unknown
500 Interactive proof system 1,208 38 Start High