- See also changes related to Diffie-Hellman, or pages that link to Diffie-Hellman or to this page or whose text .
Auto-populated based on Special:WhatLinksHere/Diffie-Hellman. Needs checking by a human.
- Alice and Bob : Traditional names for A and B, the two players, in discussion of cryptography or coding theory.
- Asymmetric key cryptography : A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message
- Cryptographic key : Value used by a computer together with a complex algorithm to encrypt and decrypt messages.
- Cryptography : A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message.
- Discrete logarithm : The problem of finding logarithms in a finite field.
- History of cryptography : The development, since antiquity, of means of concealing communications from other than the intended recipient
- IPsec : Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets.
- Man-in-the-middle attack : An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other.