Cryptography Stocks List

Symbol Grade Name % Change
APVS D Applied Visual Sciences, Inc -25.93
ARGL B Argyle Security Inc 0.00
BITCF F First Bitcoin Capital Corp 0.18
BVTK D Bravatek Solutions Inc. 100.00
CLOK D Cipherloc Corp -6.03
CYBD F Cyber Digital Inc 0.00
DELRF B De La Rue plc 0.00
DLUEY A De La Rue plc 0.00
FGRRF C Fingerprint Cards Ab [Publ] 0.00
GDSI D Global Digital Soltn 7.80
GKPRF B Gatekeeper Sys Inc -3.97
HLIX A Helix TCS, Inc 0.00
HWSY D Hawk Systems Inc 0.00
ISDCF F Inside Secure -2.55
IWSY F Imageware Sys Inc -5.05
MGNT C Meganet Corporation 0.00
PRBCF D Precise Biometrics 0.00
SFOR F Strikeforce Technologies Inc -7.10
VRME D Verifyme Inc 3.37
WCUI F Wellness Center USA -3.33
IDTY B Ipsidy Inc. 0.00
SNLP B Syntrol Corp. -34.55
ZWBC D Goldkey Corp 0.00
VTLR D Virtualarmor Intl -10.42
WSKEF B Wisekey International Holdings Ltd 0.00
CYBNY D Cyber Security 1 AB -0.31
GARLF B Netcoins Holdings Inc -21.54
STGGQ D Stg Group Inc 0.00
VISM D Visium Technologies Inc. 4.81
KNWN F Know Labs, Inc -1.03
CYBXF B Hilltop Cybersecurity Inc. 0.00
DLGI F Datalogic Intl Inc 0.00
BIDCF F Blockchaink2 Corp -1.40
MTRI B Metro Inc. 0.00
SOLQ B Soltrest Inc 0.00
GBGPF C Gb Group Plc 0.00
HYBOF B Hyperblock Inc 0.00
SVTLQ D Sivault Systems Inc 0.00
QNCCF F Quantum Numbers Corp -5.69
CISO B Cerberus Cyber Sentinel Corp 0.00
DADTF C Datadot Technology Ltd 0.00
STUO F STI Group Inc 0.00
BCDI B Polar Wireless Corp 0.00
PLCKF F Plurilock Sec Inc 0.76
KARE D Koala Corp 0.00
TCCO D Technical Communications Corp. 0.00
CCYNF D Cyan Ag 0.00
BNXAF F Banxa Hldgs Inc -4.84
ZUUS B Zeuus Inc 0.00
View As Page of Charts


Related ETFs - A few ETFs which own one or more of the above listed Cryptography stocks.

Symbol Grade Name Weight

View all Cryptography related ETFs...

Compare ETFs

    Recent Signals

    Date Stock Signal Type
    2021-05-11 APVS Fell Below 20 DMA Bearish
    2021-05-11 APVS 200 DMA Support Bullish
    2021-05-11 APVS MACD Bearish Centerline Cross Bearish
    2021-05-11 BIDCF 200 DMA Resistance Bearish
    2021-05-11 BITCF Non-ADX 1,2,3,4 Bearish Bearish Swing Setup
    2021-05-11 BITCF Pocket Pivot Bullish Swing Setup
    2021-05-11 BITCF New Downtrend Bearish
    2021-05-11 BITCF Lower Bollinger Band Walk Weakness
    2021-05-11 BVTK Crossed Above 20 DMA Bullish
    2021-05-11 BVTK Crossed Above 50 DMA Bullish
    2021-05-11 BVTK Narrow Range Bar Range Contraction
    2021-05-11 CISO Calm After Storm Range Contraction
    2021-05-11 CISO Narrow Range Bar Range Contraction
    2021-05-11 CLOK 1,2,3 Pullback Bullish Bullish Swing Setup
    2021-05-11 CLOK 180 Bearish Setup Bearish Swing Setup
    2021-05-11 CLOK NR7 Range Contraction
    2021-05-11 CLOK Fell Below 50 DMA Bearish
    2021-05-11 CLOK Narrow Range Bar Range Contraction
    2021-05-11 CYBD Crossed Above 20 DMA Bullish
    2021-05-11 CYBD Narrow Range Bar Range Contraction
    2021-05-11 CYBD Non-ADX 1,2,3,4 Bearish Bearish Swing Setup
    2021-05-11 CYBNY Stochastic Reached Overbought Strength
    2021-05-11 CYBNY Non-ADX 1,2,3,4 Bullish Bullish Swing Setup
    2021-05-11 CYBNY Narrow Range Bar Range Contraction
    2021-05-11 GARLF Stochastic Reached Oversold Weakness
    2021-05-11 GARLF Narrow Range Bar Range Contraction
    2021-05-11 GARLF MACD Bearish Centerline Cross Bearish
    2021-05-11 GDSI 200 DMA Support Bullish
    2021-05-11 GDSI Crossed Above 20 DMA Bullish
    2021-05-11 GDSI Doji - Bearish? Reversal
    2021-05-11 GDSI Lizard Bullish Bullish Day Trade Setup
    2021-05-11 GDSI Doji - Bullish? Reversal
    2021-05-11 GDSI Hammer Candlestick Bullish
    2021-05-11 GKPRF Stochastic Sell Signal Bearish
    2021-05-11 HYBOF Stochastic Reached Overbought Strength
    2021-05-11 HYBOF Narrow Range Bar Range Contraction
    2021-05-11 IDTY 50 DMA Support Bullish
    2021-05-11 IDTY Stochastic Reached Overbought Strength
    2021-05-11 IDTY 20 DMA Support Bullish
    2021-05-11 ISDCF Narrow Range Bar Range Contraction
    2021-05-11 KARE Narrow Range Bar Range Contraction
    2021-05-11 KNWN Hammer Candlestick Bullish
    2021-05-11 PLCKF Narrow Range Bar Range Contraction
    2021-05-11 QNCCF Gilligan's Island Buy Setup Bullish Swing Setup
    2021-05-11 QNCCF Stochastic Buy Signal Bullish
    2021-05-11 SFOR 20 DMA Resistance Bearish
    2021-05-11 SFOR Bollinger Band Squeeze Range Contraction
    2021-05-11 SFOR Fell Below 200 DMA Bearish
    2021-05-11 SNLP Bollinger Band Squeeze Range Contraction
    2021-05-11 TCCO Non-ADX 1,2,3,4 Bearish Bearish Swing Setup
    2021-05-11 VISM Bollinger Band Squeeze Range Contraction
    2021-05-11 VISM Bullish Engulfing Bullish
    2021-05-11 VISM Stochastic Buy Signal Bullish
    2021-05-11 VRME Pocket Pivot Bullish Swing Setup
    2021-05-11 VRME 20 DMA Resistance Bearish
    2021-05-11 VRME Volume Surge Other
    2021-05-11 VRME Bollinger Band Squeeze Range Contraction
    2021-05-11 VRME Lower Bollinger Band Walk Weakness
    2021-05-11 VTLR 200 DMA Support Bullish
    2021-05-11 VTLR Fell Below 20 DMA Bearish
    2021-05-11 VTLR Bollinger Band Squeeze Range Contraction
    2021-05-11 WCUI Stochastic Reached Oversold Weakness

    Recent News for Cryptography Stocks

    Date Stock Title
    May 11 VISM Visium Technologies Announces The Hiring of VP-Worldwide Sales
    May 11 SFOR StrikeForce Technologies Subsidiary Cybersecurity Risk Solutions Expands into Insurance and Risk Management Marketplace
    May 10 VISM Visium Technologies Announces The Release Of Its TRUCONTEXT(TM) Analytics and Visualization Platform
    May 10 IDTY BPSmart To Integrate Ipsidy’s Trusted Biometric Identity Verification Services Into Its Digital Assistant ChatBot Platform
    May 7 PLCKF Plurilock Files Preliminary Base Shelf Prospectus
    May 7 TCCO Technical Communications Corporation Reports Results for the Three and Six Months Ended March 27, 2021
    May 7 PLCKF Plurilock Awarded US$1.15 Million Order with U.S. Department of the Navy
    May 7 WSKEF WISeKey to receive a $10.0 million high growth capital investment from Alpha Blue Ocean to finance its TrustNFT.IO NFT platform to be launched in June 2021
    May 6 IDTY Ipsidy Announces Results for First Quarter Ended March 31, 2021 Building Trusted Identity
    May 6 WSKEF WISeKey, Casper Labs, Ocean Protocol and Fossa Systems to Hold a Special NFT Event on May 18 to Discuss TrustedNFT.IO Platform
    May 6 CISO Cerberus Sentinel announces addition of Kiki VanDeWeghe to Board of Directors
    May 6 IWSY ImageWare Appoints Three Industry Leaders to Newly Established Advisory Board
    May 6 BIDCF BlockchainK2 Company, Amplify Games, Partners with Pixel River PR's Chris Souza
    May 6 WSKEF WISeKey International Holding Ltd Schedules a Conference Call to Discuss the Agenda Items of its 2021 Annual General Meeting of Shareholders
    May 5 BNXAF BANXA Reports 1,000% Transactions Value Increase Year-on-Year for April
    May 5 QNCCF Quantum Numbers Corp. Elaborates on Key Market Assumptions Behind the Third-Party Valuation of Its QRNG Technology

    Cryptography or cryptology (from Ancient Greek: κρυπτός, translit. kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.
    Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries. The cryptography literature often uses the names Alice ("A") for the sender, Bob ("B") for the intended recipient, and Eve ("eavesdropper") for the adversary. Since the development of rotor cipher machines in World War I and the advent of computers in World War II, the methods used to carry out cryptology have become increasingly complex and its application more widespread.
    Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these solutions to be continually adapted. There exist information-theoretically secure schemes that probably cannot be broken even with unlimited computing power—an example is the one-time pad—but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.
    The growth of cryptographic technology has raised a number of legal issues in the information age. Cryptography's potential for use as a tool for espionage and sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export. In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation. Cryptography also plays a major role in digital rights management and copyright infringement of digital media.

    More about Cryptography
    Browse All Tags