Cryptography SecondBrain

Search

SearchSearch
      • Abelian Group
      • Basic Algebra
      • Binary Operation
      • Binary Relation
      • Commutative Ring
      • Cyclic Subgroup
      • Discrete Fourier Transform
      • Discrete logarithm
      • Discrete logarithm problem
      • Division Ring
      • ECDLP
      • Elliptic Curves
      • Equivalence Relation
      • Fast Fourier Transform
      • Field
      • Group
      • Ideal
      • Monoid
      • Quotient Ring
      • Residue Number System
      • Ring
      • Ring Homomorphism
      • Subgroup
        • Block cipher
        • CBC(Cipher-block Chaining)
        • CFB(Cipher Feedback)
        • CTR(Counter)
        • ECB(Electric Codebook)
        • OFB(Output Feedback)
      • AES
      • Asymmetric key encryption
      • Basic Cryptography
      • ChaCha20
      • DES
      • Diffie-Hellman
      • Digital Signature
      • ECC
      • ECDSA
      • ElGamal
      • Feistel Cipher
      • General LWE
      • Grover’s Algorithm
      • Hash function
      • Learning with Errors(LWE)
      • Merkle Tree
      • Module Learning with Errors(MLWE)
      • Nonce
      • Post-Quantum Cryptography
      • Rabin Cryptosystem
      • Ring Learning with Errors(RLWE)
      • RSA
      • Schnorr Signature
      • SHA
      • Shor's Algorithm
      • Stream cipher
      • Symmetric key encryption
      • Bitcoin
      • Blockchain
      • Ethereum
        • BFV
        • BGV
        • Bootstrapping
        • CGGI
        • CKKS
        • DM
        • fhEVM
        • Fully Homomorphic Encryption
        • Linear Secret Sharing Scheme
        • Secret Sharing
        • Shamir's Secret Sharing Scheme
        • Secure Multi-Party Computation
        • Trusted Execution Environment
          • zkEVM
          • Quadratic Arithmetic Program
          • KZG commitment
          • Polynomial theorem
        • Groth16
        • Pinocchio protocol
        • Zero Knowledge Proofs
        • ZK-SNARK
      • Privacy Enhancing Technologies (PET)
      • Contribution Guide
      • How to get started
      • Notations
    Home

    ❯

    Basic Cryptography

    ❯

    Basic Cryptography

    Basic Cryptography

    1 min read

    Info

    Basic Cryptography introduces the fundamental principles and techniques of cryptography. This includes basic encryption and decryption methods, and the principles behind key cryptographic algorithms such as symmetric and asymmetric encryption.

    • Asymmetric key encryption
    • Symmetric key encryption
    • AES
    • Block cipher
    • Stream cipher
    • Diffie-Hellman
    • RSA
    • ElGamal
    • ECDSA
    • Post-Quantum Cryptography
    • Shor’s Algorithm
    • Grover’s Algorithm
    • Learning with Errors(LWE)
    • Ring Learning with Errors(RLWE)
    • Module Learning with Errors(MLWE)
    • Hash function
    • Merkle Tree
    • Digital Signature
    • Schnorr Signature
    • SHA
    • ECC
    • Hash Functions
    • General LWE
    • Rabin Cryptosystem
    • Nonce
    • ChaCha20
    • Feistel cipher

    Graph View

    Backlinks

    • Basic Cryptography
    • Welcome to Cryptography SecondBrain

    Maintained by Decipher, using Quartz v4.2.3 © 2025

    • GitHub
    • Medium
    • Youtube