Part II. Applications of Cryptography (Cryptographic Protocols)

From CryptoWiki
Jump to: navigation, search
  1. The basics of cryptographic protocol construction and analysis
  2. Error correcting codes in cryptography
  3. Zero-knowledge proofs
  4. Proof of data possession
  5. Proof-of-work system
  6. The framework for identification protocols
  7. The framework for key distribution protocols
  8. Noise Protocol Framework
  9. Searching on encrypted data
  10. Sorting on encrypted data
  11. Processing Queries on an Encrypted Database
  12. Order-preserving encryption
  13. Oblivious Transfer with Access Control
  14. Password-authenticated key agreement
  15. Secret sharing schemes. Threshold cryptography
  16. Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing
  17. Deep Packet Inspection for Encrypted Traffic
  18. Cryptographic reverse firewalls
  19. Fair exchange
  20. OPTLS and TLS 1.3 protocols
  21. Privacy-preserving collaborative optimization
  22. Hardware and embedded cryptography
  23. Cryptographic libraries for software developers
  24. White-box cryptography and software code cryptographic obfuscation
  25. Vulnerabilities and security of software cryptography
  26. Web applications on top of encrypted data
  27. Using CAPTCHA in cryptography
  28. Remote authentication protocols and "single sign-on" mechanisms
  29. Direct anonymous attestation
  30. Encryption switching protocols
  31. Protocols for secure communication channels
  32. Covert channels
  33. Side-channel attacks on cryptosystems
  34. Wireless networks security
  35. Secure e-mail
  36. Secure instant messaging
  37. Anonymity networks
  38. Protocols for secure databases retrieval
  39. Protocols for secure cloud computing and secure cloud storage
  40. Structure-preserving signatures
  41. Verifiable computations in cloud environment
  42. Protocols for mobile security
  43. Location privacy of users in mobile systems
  44. RFID security
  45. Grid security
  46. Peering networks security
  47. Secure payment systems
  48. NFC mobile payments security
  49. Bitcoin cryptocurrency
  50. Blockchain cryptocurrencies (Bitcoin-like)
  51. Secure broadcasting. Digital content copyright protection
  52. Audio watermarking
  53. Secure multi-party computations
  54. Visual cryptography
  55. Steganography
  56. Quantum cryptography
  57. Garbled circuits
  58. Post-quantum cryptography
  59. Beyond the post-quantum cryptography
  60. Neural networks in cryptography
  61. Privacy-preserving data mining
  62. Data mining for security analytics
  63. Machine learning on encrypted data
  64. Unsolved crypto problems and the future of computer security
  65. Ethereum platform for applications based on smart contracts
  66. LWE-based cryptographic protocols
  67. Bitcoin transaction and protocol model
  68. Ratcheted encryption
  69. Post-Compromise Security
  70. Post-quantum digital signature
  71. Secure biometric authentication systems
  72. The Double Ratchet Algorithm
  73. Exteded Triple Diffie-Hellman
  74. Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
  75. Private linear regression
  76. Zero-knowledge Scalable Transparent Arguments of Knowledge (zk-STARKs)
  77. Onion encryption and its application for Tor anonymous communication
  78. Post Compromise Security
  79. Algorand: Scaling Byzantine Agreements for Cryptocurrencies
  80. Secure data aggregation for machine learning
  81. Anonimous credential
  82. Privacy-preserving neural networks learning
  83. Optimal secure asynchronous data transfer protocols
  84. Groth-Sahai non-interactive proof systems

Back