Article lists

Output options Results per page:
Start with result #
Primary sort by
Secondary sort by
Note: sorting is done relative to the first project.
Release / review data Filter release / review data
Review status
Release status
Category filter Filter by category
Article category:
Talk category:

 
Result Article Importance Quality Review
Release Shows whether this article has been reviewed as a featured article or good article, and whether the article has been included in a release version of Wikipedia.
Score This number is used to automatically select articles for release versions of Wikipedia.
1 Adversary (cryptography) (t · h · l) High 2012-04-11 (t Stub 2013-04-05 (t 617
2 Automatic parallelization (t · h · l) High 2012-02-26 (t Stub 2012-02-26 (t 754
3 Blum–Micali algorithm (t · h · l) High 2012-04-11 (t Stub 2013-09-24 (t 426
4 Carl Adam Petri (t · h · l) High 2011-02-06 (t Stub 2010-07-07 (t 846
5 Commit (data management) (t · h · l) High 2011-10-24 (t Stub 2011-10-24 (t 924
6 Compile time (t · h · l) High 2012-02-27 (t Stub 2012-02-26 (t 891
7 Compiler construction (t · h · l) High 2012-03-11 (t Stub 2011-04-25 (t 625
8 Concrete security (t · h · l) High 2012-06-26 (t Stub 2012-04-13 (t 534
9 Database application (t · h · l) High 2011-10-24 (t Stub 2011-10-24 (t 426
10 Durability (database systems) (t · h · l) High 2011-10-24 (t Stub 2011-10-24 (t 630
11 Fagin's theorem (t · h · l) High 2012-09-02 (t Stub 2012-09-02 (t 565
12 Full Domain Hash (t · h · l) High 2012-04-11 (t Stub 2012-04-11 (t 557
13 Functional logic programming (t · h · l) High 2012-02-26 (t Stub 2012-02-26 (t 426
14 ID-based cryptography (t · h · l) High 2012-04-11 (t Stub 2013-05-13 (t 768
15 Instrumentation (computer programming) (t · h · l) High 2013-12-31 (t Stub 2013-12-31 (t 751
16 Interrupt coalescing (t · h · l) High 2013-10-25 (t Stub 2013-10-25 (t 426
17 Lagrangian relaxation (t · h · l) High 2011-05-12 (t Stub 2011-05-12 (t 559
18 Lucky Thirteen attack (t · h · l) High 2013-04-03 (t Stub 2013-04-03 (t 426
19 MD6 (t · h · l) High 2013-03-22 (t Stub 2013-03-22 (t 693
20 Nicola Pellow (t · h · l) High 2012-11-02 (t Stub 2012-11-02 (t 662
21 Oakley protocol (t · h · l) High 2013-06-29 (t Stub 2013-06-29 (t 560
22 Pairing-based cryptography (t · h · l) High 2012-04-11 (t Stub 2013-05-14 (t 586
23 Post-quantum cryptography (t · h · l) High 2012-04-11 (t Stub 2013-05-13 (t 621
24 Recordset (t · h · l) High 2011-10-24 (t Stub 2011-10-24 (t 683
25 Relational calculus (t · h · l) High 2011-10-24 (t Stub 2011-10-24 (t 883
26 SPKAC (t · h · l) High 2013-10-13 (t Stub 2013-10-13 (t 426
27 Secure Hash Standard (t · h · l) High 2013-10-13 (t Stub 2013-10-13 (t 533
28 Selection (user interface) (t · h · l) High 2009-07-06 (t Stub 2010-11-30 (t 553
29 Solver (t · h · l) High 2009-03-26 (t Stub 2009-03-26 (t 587
30 Strong RSA assumption (t · h · l) High 2012-04-13 (t Stub 2013-05-15 (t 528
31 Susanne Albers (t · h · l) High 2012-11-03 (t Stub 2012-11-03 (t 486
32 Table (database) (t · h · l) High 2012-06-26 (t Stub 2011-10-24 (t 1055
33 Tate pairing (t · h · l) High 2012-04-20 (t Stub 2013-05-15 (t 426
34 Threshold cryptosystem (t · h · l) High 2012-04-13 (t Stub 2012-04-13 (t 571