CryptographyMessage-Digest 5 (MD5)Secure Hash Algorithm 1 (SHA-1)Password CrackingDHKE AttacksElGamal AttacksRSA AttacksCipher block chaining (CBC)Cipher feedback (CFB)CryptographyCounter (CTR)Diffie–Hellman Key ExchangeDiscrete Logarithm Problem (DLP)Electronic codebook (ECB)Elliptic-curve cryptographyElliptic Curve DSA (ECDSA)ElGamalEncodingsGalois/counter (GCM)Infinite Garble Extension (IGE)LatticesLinear Congruential GeneratorLinear-Feedback Shift RegisterModular ArithmeticMersenne Twister (MT19937)NTRUNumber TheoryOutput feedback (OFB)Post-quantum CryptographyPublic Key CryptographyRandom Number GeneratorsRSA CryptosystemZero-Knowledge Proof (ZKP)