Category:Cryptography
Saltar para a navegação
Saltar para a pesquisa
prática e estudo de técnicas de comunicação segura na presença de terceiros | |||||
Carregar ficheiro | |||||
Instância de | |||||
---|---|---|---|---|---|
Subclasse de |
| ||||
Parte de | |||||
Composto de | |||||
Evento notável |
| ||||
| |||||
To display all parents click on the "▶": |
Subcategorias
Esta categoria contém as seguintes 31 subcategorias (de um total de 31).
*
+
-
- Central Security Service (4 F)
A
B
- Backdoors in IT (11 F)
C
- Chaffing and winnowing (3 F)
D
H
I
K
L
P
Q
R
S
- Somerton Man Code (2 F)
Multimédia na categoria "Cryptography"
Esta categoria contém os seguintes 200 ficheiros (de um total de 615).
(página anterior) (página seguinte)-
1912-8-12 Kryptogramm.png 1 260 × 1 338; 2,94 MB
-
1D MITMNEW.png 529 × 346; 13 kB
-
2007-07-20 Polska Wytwórnia Papierów Wartościowych w Warszawie, wejście.jpg 2 840 × 2 128; 3,96 MB
-
2D MITMNEW.png 988 × 351; 21 kB
-
3D cryptoShape.jpg 2 102 × 692; 187 kB
-
98-905 (IA 98-905-crs).pdf 1 239 × 1 752, 7 páginas; 209 kB
-
A single round of Phelix.jpg 284 × 140; 6 kB
-
A Slidex and separate cards.jpg 1 405 × 873; 826 kB
-
AECall with iPhone.png 1 138 × 804; 1,63 MB
-
AES Encryption for AI Model Parameter.gif 1 200 × 675; 334 kB
-
Algorithm diagram for EnRUPT.png 151 × 191; 9 kB
-
Algorithm diagram for XXTEA cipher.svg 391 × 462; 63 kB
-
Algorythm.png 546 × 669; 62 kB
-
Alternating GFN-02.png 476 × 477; 13 kB
-
American-Cryptology-during-the-Cold-War-1945-1989-Book-IV-Cryptologic-Rebirth-1981-1989.pdf 1 652 × 1 695, 233 páginas; 12,66 MB
-
Android-WiFi-Security-Enhanced-Open.jpg 1 024 × 290; 13 kB
-
API Call structure for the Sent.ly Web API.png 579 × 436; 54 kB
-
Appelation crypto controverse.svg 1 189 × 334; 5 kB
-
Argon2.png 776 × 515; 41 kB
-
ArnoldCipherLetter.jpeg 760 × 491; 129 kB
-
Arnsberger Feme ABC-1437.svg 1 075 × 399; 67 kB
-
ARX structure-01.png 1 284 × 412; 42 kB
-
As2 ablauf klein.png 410 × 290; 25 kB
-
Asiacrypt06.jpg 2 592 × 1 944; 1,02 MB
-
AsincStream.jpg 673 × 263; 45 kB
-
ASmallSecret.pdf 1 239 × 1 754, 57 páginas; 569 kB
-
Asymmetric encryption padlock analogy.svg 1 052 × 744; 90 kB
-
Atbash.png 63 × 353; 2 kB
-
ATM pinpad in german.jpg 295 × 213; 14 kB
-
Autocorrelation cryptanalisys exmp.png 646 × 352; 19 kB
-
AutocorrelGraph1.png 739 × 379; 822 kB
-
AutocorrelGraph2.png 739 × 379; 822 kB
-
AutocorrelGraph3.png 739 × 379; 822 kB
-
AutocorrelGraph4.png 739 × 379; 822 kB
-
B3-2.jpg 881 × 228; 25 kB
-
B92 protocol quantum key distribution.svg 1 052 × 354; 17 kB
-
Baby step giant step copy-01.svg 273 × 269; 12 kB
-
Baby step giant step-01.png 1 136 × 1 119; 84 kB
-
Backup facebook to google.jpg 1 921 × 1 080; 173 kB
-
Bahaeddin Şakir telegram 4 July 1915.png 1 076 × 1 456; 2,02 MB
-
Bandeau portail crypto.jpg 641 × 150; 49 kB
-
BATCO Plastic Insert.jpg 2 448 × 3 264; 2,85 MB
-
BATCO Wallet.jpg 2 448 × 3 264; 1,38 MB
-
BATO Vocab Cards.jpg 2 448 × 3 264; 1,58 MB
-
Bcrypt.png 726 × 226; 17 kB
-
BelT hashing scheme.jpg 1 363 × 807; 70 kB
-
Benedikt Bünz.png 948 × 1 914; 1,47 MB
-
Bijektivität Mengen.jpg 422 × 235; 28 kB
-
Bildverschlüsselung.jpg 1 176 × 303; 95 kB
-
Bipolar.jpg 360 × 141; 16 kB
-
Bitcoin machine ATM.jpg 3 456 × 4 608; 5,35 MB
-
Blaise de Vigenère – Traité des Chiffres, 1587.pdf 1 187 × 1 577, 705 páginas; 557,95 MB
-
Bletchley Park last German intercept.JPG 2 272 × 1 704; 1,31 MB
-
BlockCipherModeofOperationVertical.jpg 641 × 1 558; 165 kB
-
BlockcipherModesofOperation.png 1 497 × 892; 191 kB
-
Bounty 2 Phrase.png 550 × 500; 37 kB
-
Bring Chaocipher right wheel letter to zenith.png 653 × 445; 77 kB
-
Buchstabenverteilung DE EN.png 723 × 411; 4 kB
-
C't Kryptokampagne CeBIT 2006.jpg 1 280 × 926; 367 kB
-
Car relay attack.png 889 × 352; 64 kB
-
Carte-Visiopass-1990.jpg 323 × 511; 87 kB
-
Cast-128(1).png 523 × 400; 40 kB
-
Cast-128(2).png 180 × 342; 15 kB
-
Ccmp decryption scheme.gif 910 × 254; 7 kB
-
Ccmp encryption scheme.gif 878 × 305; 9 kB
-
Ccmp packet structure.gif 872 × 301; 9 kB
-
Ccmp packet structure.svg 903 × 348; 95 kB
-
Ceazer ziper.png 680 × 383; 11 kB
-
Certificat Mail.jpg 165 × 154; 15 kB
-
Certificate-chain.png 629 × 783; 52 kB
-
Chaocipher right disk permuting.png 981 × 905; 208 kB
-
Chaocipher wheels starting position.png 653 × 445; 74 kB
-
Chaocipher wheels.png 981 × 668; 127 kB
-
Checking timestamp.png 800 × 468; 44 kB
-
ChemicalPencil.png 1 029 × 396; 215 kB
-
Chiffrement asymétrique.png 1 368 × 642; 60 kB
-
Chiffrement symétrique.png 1 368 × 682; 54 kB
-
Choctaw nation medal of valour 1.jpg 2 016 × 1 512; 1,32 MB
-
Choctaw nation medal of valour 2.jpg 2 016 × 1 512; 1,32 MB
-
Chosen-plaintext attack.ogg 10 min 48 s; 4,28 MB
-
Cifratura simmetrica.jpg 1 002 × 202; 34 kB
-
Ciphershed screenshot.png 450 × 372; 50 kB
-
ClockWiseSpiralPath.png 482 × 210; 13 kB
-
ClockWiseSpiralPathSolution.png 536 × 206; 12 kB
-
CNSA 2p0 timeline.png 2 226 × 1 244; 674 kB
-
Code Signing.gif 400 × 518; 4,06 MB
-
Code wheel.jpg 852 × 430; 62 kB
-
Codefranch.jpg 575 × 717; 106 kB
-
Codes, Bukit, Bali, Indonesia.jpg 4 032 × 2 688; 6,62 MB
-
Combination methods.PNG 909 × 59; 5 kB
-
Complementation slide.jpg 1 061 × 607; 105 kB
-
Constructor.png 488 × 492; 18 kB
-
Contrasenyes.pdf 1 250 × 3 125; 33 kB
-
CreacionTBC.png 505 × 286; 11 kB
-
CriptografiaAsimetrica.png 800 × 190; 48 kB
-
Crittografia asimmetrica.jpg 646 × 519; 54 kB
-
CRL in Windows.png 607 × 766; 113 kB
-
Crypto clipart1.svg 744 × 1 052; 32 kB
-
Crypto clipart2.png 595 × 465; 14 kB
-
Crypto clipart2.svg 744 × 1 052; 45 kB
-
Cryptoapi reading.jpg 714 × 301; 145 kB
-
Cryptogram-example.jpg 575 × 327; 44 kB
-
Cryptogram-example.svg 512 × 291; 5 kB
-
Cryptography Barnstar.png 2 000 × 1 900; 1 005 kB
-
Cryptography by aryabhat.jpg 1 357 × 1 317; 381 kB
-
Cryptography clipart1.png 595 × 842; 70 kB
-
Cryptography Fleuron T116443-1.png 876 × 882; 60 kB
-
Cryptography goodnesses of a phrase.png 800 × 600; 23 kB
-
Cryptography.png 1 161 × 530; 141 kB
-
Cryptography01.png 636 × 518; 24 kB
-
Cryptointro.jpg 190 × 133; 6 kB
-
Cypher core system picture wikimedia.tif 1 400 × 1 050; 53 kB
-
De-Kryptogramm.ogg 2,1 s; 21 kB
-
De-Kryptologe.ogg 2,2 s; 21 kB
-
De-Kryptologie.ogg 2,1 s; 20 kB
-
Decryption and Topology of the Genetic Code.png 1 410 × 1 583; 77 kB
-
Delegated path validation.png 2 230 × 1 600; 252 kB
-
DH-EKE.png 401 × 322; 19 kB
-
Diagramme sequence.png 1 011 × 664; 46 kB
-
Dic letter frequency matrix.png 640 × 480; 26 kB
-
DifferentialCryptanalysisOfXXTEAFirstApproach.png 642 × 322; 9 kB
-
Diffie-Hellman Key Exchange Paint Analogy.svg 1 997 × 2 997; 29 kB
-
Diffie-Hellman Key Exchange-modified.png 480 × 695; 32 kB
-
DiffieHellman.png 944 × 828; 176 kB
-
Digital certificates chain of trust.png 3 230 × 2 820; 402 kB
-
Digital enrollment and authentication reference process.jpg 2 048 × 1 248; 209 kB
-
Digital Signature diagram fi.svg 1 500 × 1 125; 16 kB
-
Digital Signature diagram ja.svg 1 500 × 1 125; 21 kB
-
Digital voting-01.png 1 384 × 835; 75 kB
-
Digital Watermark Cleaning - Sequence.svg 916 × 244; 35 kB
-
DigitalSignatureSchemes.jpg 787 × 1 084; 126 kB
-
Dining cryptographers protocol, announcement, Japanese.svg 372 × 252; 134 kB
-
Dining cryptographers protocol, anonymity set, Japanese.svg 320 × 240; 122 kB
-
Dining cryptographers protocol, circle graph, Japanese.svg 369 × 240; 120 kB
-
Dining cryptographers protocol, network graph, Japanese.svg 320 × 240; 120 kB
-
DirectionalSpectra.png 1 378 × 778; 16 kB
-
Distance bounding protocole de Hancke et Kuhn.png 960 × 720; 11 kB
-
Doubling oriented.jpg 108 × 287; 4 kB
-
Dps protocol redone.png 335 × 151; 15 kB
-
Dps protocol.png 335 × 151; 15 kB
-
DUAL EC DRBG.jpg 1 214 × 316; 21 kB
-
EAS S-box.jpg 367 × 177; 24 kB
-
EAX block cipher mode of operation.svg 800 × 740; 3 kB
-
Ecc over GF-71.png 1 653 × 1 629; 45 kB
-
Efficient and Secure Group Messaging.pdf 1 275 × 1 650, 10 páginas; 91 kB
-
EFS operation scheme.png 1 187 × 1 429; 158 kB
-
EJBCA 7.9.0.2 in English – Administration.png 1 148 × 817; 140 kB
-
Ejemplo2 wm txt.gif 600 × 262; 23 kB
-
EKE.png 225 × 418; 16 kB
-
EncapsulationSecurityPayload.JPG 807 × 506; 60 kB
-
Encoded letter of Gabriel Luetz d Aramon after 1546 with partial deciphering.jpg 3 034 × 2 058; 1,75 MB
-
EncripDecrip.png 454 × 646; 44 kB
-
Encrypt.jpg 1 132 × 700; 504 kB
-
Encrypted file.png 668 × 272; 61 kB
-
Encryption - Asymmetric.svg 1 028 × 248; 5 kB
-
Encryption - Symmetric.svg 1 028 × 248; 4 kB
-
Encryption example with two people.png 1 110 × 520; 21 kB
-
Encryption gnupg 1.png 1 920 × 1 080; 139 kB
-
Encryption gnupg 2.png 942 × 494; 34 kB
-
Encryption gnupg 3.png 1 906 × 1 079; 207 kB
-
Encryption gnupg 5.png 1 906 × 1 079; 296 kB
-
Encryption gnupg 6.png 1 899 × 1 075; 170 kB
-
Encryption gnupg 7.png 1 910 × 1 079; 217 kB
-
Encryption gnupg 8.png 1 910 × 1 079; 182 kB
-
Encryption unsuccessful. The data on your phone is no longer accessible.jpg 1 746 × 3 104; 1,72 MB
-
Encryption1.png 700 × 350; 82 kB
-
Encryptr.png 438 × 301; 24 kB
-
Encyclopedia of Cryptography and Security.jpg 371 × 573; 51 kB
-
Enkriptimi dhe dekriptimi me PGP.png 500 × 521; 37 kB
-
ENTER Gretag 1.jpg 3 060 × 1 336; 487 kB
-
ENTER Gretag 3.jpg 2 023 × 2 714; 811 kB
-
Erasure code work principle.png 1 152 × 648; 31 kB
-
Esquema per il·lustrar el xifratge simetric.PNG 412 × 266; 12 kB
-
Extendedvalidation.PNG 400 × 244; 16 kB
-
FBacon alfa1.jpg 300 × 187; 19 kB
-
FBacon alfa2.jpg 300 × 415; 41 kB
-
Fcsr1.png 1 076 × 387; 20 kB
-
FEAL-f.png 844 × 813; 22 kB
-
FEAL-fk.png 844 × 813; 27 kB
-
FEAL-scheme.png 1 103 × 1 918; 59 kB
-
Filetopia-Screen 1.png 944 × 751; 148 kB
-
Finalcrypt GUI Log.png 1 920 × 1 080; 253 kB
-
Finalcrypt GUI Main.png 1 920 × 1 080; 182 kB
-
FIPS140-2validationflowchart.jpg 762 × 569; 130 kB
-
Fips186-2.svg 942 × 679; 22 kB
-
Firma Digital Asimétrica.png 761 × 198; 48 kB
-
Firma digital.jpg 524 × 397; 37 kB
-
FirstQuantumCryptoScheme.jpg 548 × 228; 36 kB
-
Fluxus Haiku Issue 1.pdf 1 239 × 1 754; 81 kB
-
Fluxus Haiku Issue 2.pdf 1 239 × 1 754; 66 kB
-
Forward Secrecy - Instant Perfect forward Secrecy.png 388 × 251; 33 kB
-
FrameSmal5.gif 250 × 40; 979 byte
-
FrameSmall2.gif 250 × 26; 709 byte
-
FrameSmall3.gif 250 × 26; 730 byte