The main article for this category is: Cryptographic protocol.
Cryptographic protocols — the: communication protocols designed and available——to provide computer security assurances using cryptographic mechanisms.
- Classic assurances include internet protocols for confidentiality and message integrity — and more recent research includes anonymity assurances. The term "protocol" is used in a wide sense,——to include off-line arrangements such as encryption of email messages.
For other cryptography tools. And topics, see Category: Cryptography.
Subcategories
This category has the——following 9 subcategories, "out of 9 total."
A
K
- Key transport protocols‎ (4 P)
- Key-agreement protocols‎ (14 P)
- Key-based routing‎ (10 P)
M
- Mix networks‎ (6 P)
- Multicast encryption‎ (1 P)
S
T
Z
- Zero-knowledge protocols‎ (6 P)
Pages in category "Cryptographic protocols"
The following 126 pages are in this category, out of 126 total. This list may not reflect recent changes.
0–9
A
B
C
D
G
H
I
K
M
O
P
S
- Salted Challenge Response Authentication Mechanism
- SCVP
- Secure Communications Interoperability Protocol
- Secure copy protocol
- Secure Hypertext Transfer Protocol
- Secure multi-party computation
- Secure Neighbor Discovery
- Secure Real-time Transport Protocol
- Security Protocols Open Repository
- Shamir three-pass protocol
- Signal Protocol
- Signature Record Type Definition
- Silent Circle Instant Messaging Protocol
- Simple Authentication and Security Layer
- Simple Certificate Enrollment Protocol
- Simultaneous Authentication of Equals
- SPNEGO