Part II. Applications of Cryptography (Cryptographic Protocols)

From CryptoWiki
Jump to: navigation, search
  1. The basics of cryptographic protocol construction and analysis
  2. Error correcting codes in cryptography
  3. Zero-knowledge proofs
  4. Proof of data possession
  5. Proof-of-work system
  6. The framework for identification protocols
  7. The framework for key distribution protocols
  8. Noise Protocol Framework
  9. Searching on encrypted data
  10. Sorting on encrypted data
  11. Processing Queries on an Encrypted Database
  12. Order-preserving encryption
  13. Oblivious Transfer with Access Control
  14. Password-authenticated key agreement
  15. Secret sharing schemes. Threshold cryptography
  16. Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing
  17. Deep Packet Inspection for Encrypted Traffic
  18. Cryptographic reverse firewalls
  19. Fair exchange
  20. OPTLS and TLS 1.3 protocols
  21. Privacy-preserving collaborative optimization
  22. Hardware and embedded cryptography
  23. Cryptographic libraries for software developers
  24. White-box cryptography and software code cryptographic obfuscation
  25. Vulnerabilities and security of software cryptography
  26. Web applications on top of encrypted data
  27. Using CAPTCHA in cryptography
  28. Remote authentication protocols and "single sign-on" mechanisms
  29. Direct anonymous attestation
  30. Encryption switching protocols
  31. Protocols for secure communication channels
  32. Covert channels
  33. Side-channel attacks on cryptosystems
  34. Wireless networks security
  35. Secure e-mail
  36. Secure instant messaging
  37. Anonymity networks
  38. Protocols for secure databases retrieval
  39. Protocols for secure cloud computing and secure cloud storage
  40. Verifiable computations in cloud environment
  41. Protocols for mobile security
  42. Location privacy of users in mobile systems
  43. RFID security
  44. Grid security
  45. Peering networks security
  46. Secure payment systems
  47. NFC mobile payments security
  48. Bitcoin cryptocurrency
  49. Blockchain cryptocurrencies (Bitcoin-like)
  50. Secure broadcasting. Digital content copyright protection
  51. Audio watermarking
  52. Secure multi-party computations
  53. Visual cryptography
  54. Steganography
  55. Quantum cryptography
  56. Garbled circuits
  57. Post-quantum cryptography
  58. Beyond the post-quantum cryptography
  59. Neural networks in cryptography
  60. Privacy-preserving data mining
  61. Data mining for security analytics
  62. Machine learning on encrypted data
  63. Unsolved crypto problems and the future of computer security
  64. Ethereum platform for applications based on smart contracts
  65. LWE-based cryptographic protocols
  66. Bitcoin transaction and protocol model
  67. Ratcheted encryption
  68. Post-Compromise Security
  69. Post-quantum digital signature
  70. Secure biometric authentication systems