Cryptography Terms
38 terms
New enhancements in the Advanced Encryption Standard designed to bolster cryptographic security.
Privacy-focused blockchain protocol layer.
Protection mechanisms between different blockchains.
The architectural capability of a system or protocol to seamlessly swap cryptographic algorithms — key exchange, signatu…
Managing the entire lifecycle of cryptographic keys, from generation through retirement.
A NIST-standardized (FIPS 204) post-quantum digital signature algorithm based on lattice cryptography over module lattic…
A NIST-standardized (FIPS 203) post-quantum key encapsulation mechanism based on the hardness of the Module Learning Wit…
Processes to securely issue, renew, and revoke digital certificates throughout their lifespan.
Methods for securing the data exchanged between unmanned aerial vehicles and their controllers.
The process of converting data into a code to prevent unauthorized access.
The transformation of readable data (plaintext) into an unreadable format (ciphertext) using cryptographic algorithms an…
The incorporation of specialized hardware designed to securely manage digital keys and perform cryptographic operations.
A long-term threat strategy where adversaries collect and store encrypted data today, intending to decrypt it once suffi…
A one-way cryptographic function that converts data of arbitrary length into a fixed-length digest; used for data integr…
Cryptographic schemes that allow computations on encrypted data without needing to decrypt it first.
Secure generation/storage of cryptographic keys with strict access controls and rotation policies.
Secure infrastructure for cryptographic key generation, storage, and rotation.
Malware or hardware device that records keystrokes to capture passwords, credit card numbers, and sensitive communicatio…
A family of post-quantum cryptographic constructions whose security relies on the computational hardness of lattice prob…
Security requirements for non-fungible tokens.
Digital signature algorithms engineered to remain secure in a post-quantum computing era.
Encryption methods designed to remain secure against the computational power of quantum computers.
Advanced encryption methods for privacy protection.
System issuing/managing digital certificates for encrypted communications.
Updating digital certificate frameworks to improve trust and streamline cryptographic processes.
The study of breaking encryption by leveraging the principles of quantum computing.
Quantum-based encryption key sharing.
A secure key exchange method that uses the principles of quantum mechanics to guarantee confidentiality.
Methods for implementing quantum-resistant encryption.
Enhancing methods for maintaining and distributing certificate revocation lists for faster security updates.
A method enabling multiple parties to compute a function collectively while keeping their individual inputs private.
Techniques aimed at reducing vulnerabilities that arise from the physical implementation of cryptographic systems.
Reusable secure contract design.
A NIST-standardized (FIPS 205) stateless hash-based post-quantum digital signature scheme that derives its security sole…
Structure for blockchain security implementation.
Blockchain-based security credentials.
Protection mechanisms for cryptocurrency wallets.
Cryptographic method allowing proof of information without revealing the information itself.