Cryptography Terms
32 terms
New enhancements in the Advanced Encryption Standard designed to bolster cryptographic security.
Privacy-focused blockchain protocol layer.
Protection mechanisms between different blockchains.
Managing the entire lifecycle of cryptographic keys, from generation through retirement.
Processes to securely issue, renew, and revoke digital certificates throughout their lifespan.
Methods for securing the data exchanged between unmanned aerial vehicles and their controllers.
The process of converting data into a code to prevent unauthorized access.
Converting data into unreadable ciphertext using cryptographic algorithms for protection.
The incorporation of specialized hardware designed to securely manage digital keys and perform cryptographic operations.
One-way data conversion to unique fixed-length string for verification.
Cryptographic schemes that allow computations on encrypted data without needing to decrypt it first.
Secure generation/storage of cryptographic keys with strict access controls and rotation policies.
Secure infrastructure for cryptographic key generation, storage, and rotation.
Malware recording keystrokes to steal credentials/payment info.
Security requirements for non-fungible tokens.
Digital signature algorithms engineered to remain secure in a post-quantum computing era.
Encryption methods designed to remain secure against the computational power of quantum computers.
Advanced encryption methods for privacy protection.
System issuing/managing digital certificates for encrypted communications.
Updating digital certificate frameworks to improve trust and streamline cryptographic processes.
The study of breaking encryption by leveraging the principles of quantum computing.
Quantum-based encryption key sharing.
A secure key exchange method that uses the principles of quantum mechanics to guarantee confidentiality.
Methods for implementing quantum-resistant encryption.
Enhancing methods for maintaining and distributing certificate revocation lists for faster security updates.
A method enabling multiple parties to compute a function collectively while keeping their individual inputs private.
Techniques aimed at reducing vulnerabilities that arise from the physical implementation of cryptographic systems.
Reusable secure contract design.
Structure for blockchain security implementation.
Blockchain-based security credentials.
Protection mechanisms for cryptocurrency wallets.
Cryptographic method allowing proof of information without revealing the information itself.