This tool looks for unlabeled Wikidata items in your language. It starts with a Wikidata item,
looks at all the associated Wikipedia pages, the links on all those pages, and lists the Wikidata items corresponding to the link targets.
Q2894267 - MMB
Searching link targets on 6 Wikipedias...
Item | Label [en] | Wikilabels | Link # |
---|---|---|---|
Q848204 [CC | ] | International Data Encryption Algorithm | International Data Encryption Algorithm | IDEA | 국제 데이터 암호화 알고리즘 | 6 |
Q543151 [CC | ] | block cipher | צופן בלוקים | Chiffrement par bloc | Блочный шифр | Cifratura a blocchi | Block cipher | 블록 암호 | 6 |
Q1826463 [CC | ] | linear cryptanalysis | קריפטואנליזה ליניארית | Cryptanalyse linéaire | Линейный криптоанализ | Crittanalisi lineare | Linear cryptanalysis | 선형 공격 | 6 |
Q134983 [CC | ] | Triple DES | Triple DES | 3DES | 트리플 DES | 5 |
Q190746 [CC | ] | Advanced Encryption Standard | Advanced Encryption Standard | AES | 고급 암호화 표준 | 5 |
Q840633 [CC | ] | ARIA | ARIA (צופן) | ARIA (algorithme) | ARIA (cifrario) | ARIA (cipher) | 아리아 (암호) | 5 |
Q815853 [CC | ] | Blowfish | Blowfish | Blowfish (cipher) | 블로피시 | 5 |
Q1356939 [CC | ] | RC6 | RC6 | 5 |
Q747320 [CC | ] | Twofish | Twofish | 투피시 | 5 |
Q154021 [CC | ] | block cipher mode of operation | אופן הפעלה של צופן בלוקים | Mode d'opération (cryptographie) | Modalità di funzionamento dei cifrari a blocchi | Block cipher mode of operation | 블록 암호 운용 방식 | 5 |
Q1663550 [CC | ] | Initialization vector | וקטור אתחול | Vecteur d'initialisation | Vettore di inizializzazione | Initialization vector | 초기화 벡터 | 5 |
Q1343482 [CC | ] | Lucifer | לוציפר (צופן) | Lucifer (cryptographie) | Lucifer (cifrario) | Lucifer (cipher) | 루시퍼 (암호) | 5 |
Q1028476 [CC | ] | Camellia | קמליה (צופן) | Camellia (algorithme) | Camellia (cifrario) | Camellia (cipher) | 카멜리아 (암호) | 5 |
Q1224471 [CC | ] | differential cryptanalysis | קריפטואנליזה דיפרנציאלית | Cryptanalyse différentielle | Дифференциальный криптоанализ | Differential cryptanalysis | 차분 공격 | 5 |
Q1433692 [CC | ] | substitution–permutation network | רשת החלפה-תמורה | Réseau de substitution-permutation | Rete a sostituzione e permutazione | Substitution–permutation network | 대입-치환 네트워크 | 5 |
Q1044361 [CC | ] | Feistel cipher | רשת פייסטל | Réseau de Feistel | Rete di Feistel | Feistel cipher | 파이스텔 암호 | 5 |
Q1388053 [CC | ] | FEAL | FEAL | 4 |
Q2507783 [CC | ] | GOST 28147-89 | GOST (צופן) | GOST 28147-89 | GOST (cifrario) | GOST (block cipher) | 4 |
Q1718415 [CC | ] | KASUMI | KASUMI | 4 |
Q1881198 [CC | ] | MARS | MARS | MARS (cryptographie) | MARS (cifrario) | MARS (cipher) | 4 |
Q4043435 [CC | ] | MISTY1 | MISTY1 | MISTY (צופן) | Misty1 | 4 |
Q2601463 [CC | ] | SAFER | SAFER | SAFER (צופן) | SAFER (cryptographie) | 4 |
Q1595597 [CC | ] | Tiny Encryption Algorithm | Tiny Encryption Algorithm | TEA (צופן) | 4 |
Q2142762 [CC | ] | Eli Biham | Eli Biham | אלי ביהם | 4 |
Q1501904 [CC | ] | Serpent | סרפנט (צופן) | Serpent (cryptographie) | Serpent (cifrario) | Serpent (cipher) | 4 |
Q897511 [CC | ] | cryptanalysis | קריפטואנליזה | Cryptanalyse | Cryptanalysis | 암호 해독 | 4 |
Q8789 [CC | ] | cryptography | קריפטוגרפיה | Crittografia | Cryptography | 암호학 | 4 |
Q223123 [CC | ] | 3-Way | 3-Way | 3-WAY | 3-Way (cifrario) | 4 |
Q135035 [CC | ] | Data Encryption Standard | Data Encryption Standard | 데이터 암호화 표준 | 4 |
Q1349650 [CC | ] | RC5 | RC5 | RC5 (chiffrement) | 4 |
Q1061548 [CC | ] | SEED | SEED | SEED (cifrario) | 4 |
Q2755328 [CC | ] | Square | Square (cryptographie) | Square (cifrario) | Square (cipher) | 스퀘어 (암호) | 4 |
Q2065 [CC | ] | 1993 | 1993 | 3 |
Q978814 [CC | ] | CLEFIA | CLEFIA | 3 |
Q474108 [CC | ] | Anubis | אנוביס (צופן) | Anubis (cifrario) | Anubis (cipher) | 3 |
Q743153 [CC | ] | key whitening | Key whitening | הלבנה (קריפטוגרפיה) | 3 |
Q2981730 [CC | ] | chosen-plaintext attack | התקפת גלוי-נבחר | Attacco con testo in chiaro scelto | Chosen-plaintext attack | 3 |
Q471771 [CC | ] | key | מפתח (קריפטוגרפיה) | Clé de chiffrement | Key (cryptography) | 3 |
Q327675 [CC | ] | symmetric-key algorithm | צופן סימטרי | Cryptographie symétrique | Symmetric-key algorithm | 3 |
Q2326939 [CC | ] | Akelarre | Akelarre (cryptographie) | Akelarre (cifrario) | Akelarre (cipher) | 3 |
Q869370 [CC | ] | brute-force attack | Attaque par force brute | Brute-force attack | 무차별 대입 공격 | 3 |
Q2930732 [CC | ] | Cryptomeria cipher | C2 (cryptographie) | C2 (cifrario) | Cryptomeria cipher | 3 |
Q53735 [CC | ] | CAST-128 | CAST-128 | 3 |
Q1022875 [CC | ] | CAST-256 | CAST-256 | 3 |
Q338574 [CC | ] | Cellular Message Encryption Algorithm | Cellular Message Encryption Algorithm | CMEA (cryptographie) | 3 |
Q1609474 [CC | ] | CS-Cipher | CS-Cipher | 3 |
Q1053352 [CC | ] | Product cipher | Chiffrement par produit | Cifrario del prodotto | Product cipher | 3 |
Q513687 [CC | ] | weak key | Clé faible | Weak key | 취약 키 | 3 |
Q284899 [CC | ] | DEAL | DEAL | DEAL (cryptologie) | 3 |
Q2454245 [CC | ] | DES-X | DES-X | 3 |
Q1208241 [CC | ] | avalanche effect | Effet avalanche | Avalanche effect | 쇄도 효과 | 3 |
Q1389431 [CC | ] | Idea NXT | IDEA NXT | FOX (cryptographie) | 3 |
Q2327219 [CC | ] | GDES | GDES | G-DES | 3 |
Q1690741 [CC | ] | Joan Daemen | Joan Daemen | 3 |
Q1110200 [CC | ] | KHAZAD | KHAZAD | 3 |
Q2569509 [CC | ] | key schedule | Key schedule | Gestore della chiave | 3 |
Q2329462 [CC | ] | Khufu and Khafre | Khufu et Khafre | Khufu e Khafre | Khufu and Khafre | 3 |
Q378566 [CC | ] | LOKI | LOKI | LOKI89/91 | 3 |
Q1648054 [CC | ] | LOKI97 | LOKI97 | 3 |
Q11127451 [CC | ] | MacGuffin | MacGuffin (cryptologie) | MacGuffin (cifrario) | MacGuffin (cipher) | 3 |
Q1753382 [CC | ] | RC2 | RC2 | 3 |
Q727476 [CC | ] | S-1 block cipher | S-1 (chiffrement) | S-1 | S-1 block cipher | 3 |
Q748364 [CC | ] | substitution box | S-Box | S-box | 3 |
Q2658354 [CC | ] | SHARK | SHARK | 3 |
Q1422306 [CC | ] | SKIPJACK | Skipjack (cryptographie) | Skipjack | Skipjack (cipher) | 3 |
Q1053357 [CC | ] | block size | Taille de bloc (cryptographie) | Dimensione del blocco | Block size (cryptography) | 3 |
Q1384945 [CC | ] | XTEA | XTEA | 3 |
Q1557574 [CC | ] | key size | Dimensione della chiave | Key size | 키 크기 | 3 |
Q1737729 [CC | ] | KeeLoq | KeeLoq | 2 |
Q4047327 [CC | ] | PRESENT | PRESENT (צופן) | PRESENT | 2 |
Q17084394 [CC | ] | Simon | Simon & Speck | Simon (cipher) | 2 |
Q4051445 [CC | ] | Threefish | Threefish | 2 |
Q15263584 [CC | ] | authenticated encryption | הצפנה מאומתת | Authenticated encryption | 2 |
Q7233576 [CC | ] | post-quantum cryptography | הצפנה פוסט-קוונטית | Post-quantum cryptography | 2 |
Q471906 [CC | ] | quantum cryptography | הצפנה קוונטית | Quantum cryptography | 2 |
Q2267081 [CC | ] | side-channel attack | התקפת ערוץ צדדי | Side-channel attack | 2 |
Q5275344 [CC | ] | differential fault analysis | התקפת שיבוש (קריפטוגרפיה) | Differential fault analysis | 2 |
Q220849 [CC | ] | digital signature | חתימה דיגיטלית | Digital signature | 2 |
Q201339 [CC | ] | public-key cryptography | מפתח ציבורי | Public-key cryptography | 2 |
Q3510462 [CC | ] | information-theoretic security | סודיות מושלמת | Information-theoretic security | 2 |
Q15032 [CC | ] | steganography | סטגנוגרפיה | Steganography | 2 |
Q477202 [CC | ] | cryptographic hash function | פונקציית גיבוב קריפטוגרפית | Cryptographic hash function | 2 |
Q1254335 [CC | ] | cryptographic protocol | פרוטוקול קריפטוגרפי | Cryptographic protocol | 2 |
Q1414155 [CC | ] | key exchange protocol | פרוטוקול שיתוף מפתח | Key exchange | 2 |
Q864718 [CC | ] | stream cipher | צופן זרם | Stream cipher | 2 |
Q1052621 [CC | ] | message authentication code | קוד אימות מסרים | Message authentication code | 2 |
Q938066 [CC | ] | meet-in-the-middle attack | תקיפת היפגשות באמצע | Meet-in-the-middle attack | 2 |
Q1053286 [CC | ] | Advanced Encryption Standard process | Advanced Encryption Standard process | 2 |
Q319400 [CC | ] | modular arithmetic | Arithmétique modulaire | Modular arithmetic | 2 |
Q2443442 [CC | ] | XSL attack | Attaque XSL | XSL attack | 2 |
Q2995268 [CC | ] | Lai-Massey scheme | Construction de Lai-Massey | Lai–Massey scheme | 2 |
Q3005747 [CC | ] | Mod n cryptanalysis | Cryptanalyse Mod n | Mod n cryptanalysis | 2 |
Q1024309 [CC | ] | CRYPTREC | Cryptography Research and Evaluation Committee | CRYPTREC | 2 |
Q3045761 [CC | ] | E2 | E2 (algorithme) | E2 (cipher) | 2 |
Q3063412 [CC | ] | FROG | FROG | 2 |
Q1636024 [CC | ] | ICE | ICE (cryptographie) | ICE (cipher) | 2 |
Q3229327 [CC | ] | piling-up lemma | Lemme d'empilement | Piling-up lemma | 2 |
Q548973 [CC | ] | MAGENTA | MAGENTA | 2 |
Q3272892 [CC | ] | MESH | MESH (cryptographie) | MESH (cipher) | 2 |
Q3273310 [CC | ] | MULTI2 | MULTI2 | 2 |
Q2075709 [CC | ] | Madryga | Madryga | 2 |
Q2735449 [CC | ] | NewDES | NewDES | 2 |
Q1663719 [CC | ] | NESSIE | Projet Nessie | NESSIE | 2 |
Q2028197 [CC | ] | REDOC | REDOC | 2 |
Q615772 [CC | ] | Red Pike | Red Pike | Red Pike (cipher) | 2 |
Q3459272 [CC | ] | SC2000 | SC2000 | 2 |
Q474055 [CC | ] | SHACAL | Shacal | SHACAL | 2 |
Q3005754 [CC | ] | Integral cryptanalysis | Интегральный криптоанализ | Integral cryptanalysis | 2 |
Q2869899 [CC | ] | boomerang attack | Attacco a boomerang | Boomerang attack | 2 |
Q3631710 [CC | ] | BATON | BATON | 2 |
Q3635532 [CC | ] | BaseKing | BaseKing | 2 |
Q926394 [CC | ] | BassOmatic | BassOmatic | 2 |
Q3648731 [CC | ] | CIKS-1 | CIKS-1 | 2 |
Q3648747 [CC | ] | CIPHERUNICORN-A | CIPHERUNICORN-A | 2 |
Q3648745 [CC | ] | CIPHERUNICORN-E | CIPHERUNICORN-E | 2 |
Q3648824 [CC | ] | COCONUT98 | COCONUT98 | 2 |
Q3648911 [CC | ] | CRYPTON | CRYPTON | 2 |
Q946821 [CC | ] | Cobra ciphers | Cobra (cifrario) | Cobra ciphers | 2 |
Q3696410 [CC | ] | Crab | Crab (cifrario) | Crab (cipher) | 2 |
Q5464994 [CC | ] | Fondazione Ugo Bordoni | Fondazione Ugo Bordoni | 2 |
Q3801848 [CC | ] | Iraqi block cipher | Iraqi block cipher | 2 |
Q29045264 [CC | ] | Kalyna | Kalyna (cifrario) | Kalyna (cipher) | 2 |
Q4021631 [CC | ] | XXTEA | XXTEA | 2 |
Q96416915 [CC | ] | LEA | LEA (cipher) | LEA (암호) | 2 |
Q40276 [CC | ] | multiplication | Multiplication | 곱셈 | 2 |
Q15279482 [CC | ] | BLAKE | BLAKE | 1 |
Q5009649 [CC | ] | CCM mode | CCM | 1 |
Q5014834 [CC | ] | CWC mode | CWC mode | 1 |
Q1224829 [CC | ] | Digital Signature Algorithm | Digital Signature Algorithm | 1 |
Q2377141 [CC | ] | EAX mode | EAX | 1 |
Q5519271 [CC | ] | Galois/Counter Mode | GCM | 1 |
Q5513376 [CC | ] | GGH encryption scheme | GGH | 1 |
Q46904 [CC | ] | Global System for Mobile Communications | GSM | 1 |
Q1551743 [CC | ] | Grøstl | Grøstl | 1 |
Q660919 [CC | ] | HC-256 | HC-128 | 1 |
Q55654888 [CC | ] | No label in en! | Hummingbird (צופן) | 1 |
Q5968377 [CC | ] | Integrity Aware Parallelizable Mode | IAPM | 1 |
Q55654899 [CC | ] | No label in en! | KATAN | 1 |
Q55654882 [CC | ] | No label in en! | LEA (צופן) | 1 |
Q1144542 [CC | ] | MD4 | MD4 | 1 |
Q185235 [CC | ] | MD5 | MD5 | 1 |
Q3841332 [CC | ] | MICKEY | MICKEY | 1 |
Q3306069 [CC | ] | MQV | MQV | 1 |
Q6955493 [CC | ] | NTRU | NTRU | 1 |
Q7072347 [CC | ] | OCB mode | OCB | 1 |
Q1197850 [CC | ] | Purple | PURPLE | 1 |
Q7226098 [CC | ] | Poly1305 | Poly1305 | 1 |
Q846955 [CC | ] | RC4 | RC4 | 1 |
Q2124306 [CC | ] | RIPEMD | RIPEMD | 1 |
Q181551 [CC | ] | RSA | RSA | 1 |
Q55654887 [CC | ] | No label in en! | SEA (צופן) | 1 |
Q1968605 [CC | ] | SHA-2 | SHA-2 | 1 |
Q1190947 [CC | ] | SHA-3 | SHA-3 | 1 |
Q3943791 [CC | ] | SNOW | SNOW | 1 |
Q3943814 [CC | ] | SOSEMANUK | SOSEMANUK | 1 |
Q2563030 [CC | ] | Salsa20 and ChaCha20 | Salsa20 | 1 |
Q170460 [CC | ] | Secure Shell | Secure Shell | 1 |
Q7525546 [CC | ] | SipHash | SipHash | 1 |
Q1142190 [CC | ] | Skein | Skein | 1 |
Q206494 [CC | ] | Transport Layer Security | TLS (פרוטוקול) | 1 |
Q666421 [CC | ] | Trivium | Trivium | 1 |
Q1065865 [CC | ] | X.509 | X.509 | 1 |
Q60995314 [CC | ] | Zuc stream cipher | ZUC | 1 |
Q189900 [CC | ] | information security | אבטחת מידע | 1 |
Q825712 [CC | ] | Ultra | אולטרה | 1 |
Q212108 [CC | ] | authentication | אימות זהות | 1 |
Q4200279 [CC | ] | Message authentication | אימות מסרים | 1 |
Q946489 [CC | ] | Pollard's rho algorithm | אלגוריתם rho של פולרד | 1 |
Q1755812 [CC | ] | Pohlig–Hellman algorithm | אלגוריתם פוליג-הלמן | 1 |
Q649676 [CC | ] | Alice and Bob | אליס ובוב | 1 |
Q150758 [CC | ] | Enigma | אניגמה | 1 |
Q6398137 [CC | ] | Key Wrap | אריזת מפתח הצפנה | 1 |
Q2333581 [CC | ] | semantic security | ביטחון סמנטי | 1 |
Q2777116 [CC | ] | JADE | ג'ייד | 1 |
Q5593489 [CC | ] | Grain | גריין (צופן) | 1 |
Q2915383 [CC | ] | Oblivious transfer | העברה עלומה | 1 |
Q2154943 [CC | ] | homomorphic encryption | הצפנה הומומורפית | 1 |
Q7246854 [CC | ] | Probabilistic encryption | הצפנה הסתברותית | 1 |
Q6497083 [CC | ] | lattice-based cryptography | הצפנה מבוססת סריג | 1 |
Q3505167 [CC | ] | Multiple encryption | הצפנה מרובה | 1 |
Q18192445 [CC | ] | No label in en! | הצפנה קלאסית | 1 |
Q2017076 [CC | ] | Okamoto–Uchiyama cryptosystem | הצפנת אוקמוטו-אושיאמה | 1 |
Q2249662 [CC | ] | Blum–Goldwasser cryptosystem | הצפנת בלום-גולדווסר | 1 |
Q117010 [CC | ] | disk encryption | הצפנת דיסקים | 1 |
Q1042583 [CC | ] | McEliece cryptosystem | הצפנת מקאליס | 1 |
Q5668690 [CC | ] | threshold cryptosystem | הצפנת סף | 1 |
Q1138784 [CC | ] | Cramer–Shoup cryptosystem | הצפנת קריימר-שופ | 1 |
Q568456 [CC | ] | Rabin cryptosystem | הצפנת רבין | 1 |
Q283310 [CC | ] | space–time tradeoff | התקפת איזון זמן/זיכרון | 1 |
Q700583 [CC | ] | known-plaintext attack | התקפת גלוי-ידוע | 1 |
Q389463 [CC | ] | collision attack | התקפת התנגשויות | 1 |
Q12407084 [CC | ] | No label in en! | התקפת מוצפן-נבחר | 1 |
Q5172844 [CC | ] | Correlation attack | התקפת קורלציה | 1 |
Q1888605 [CC | ] | Merkle's Puzzles | חידות מרקל | 1 |
Q1386603 [CC | ] | secret sharing | חלוקת סוד | 1 |
Q1328731 [CC | ] | ElGamal signature scheme | חתימה דיגיטלית אל-גמאל | 1 |
Q31197379 [CC | ] | No label in en! | חתימה דיגיטלית מבוססת פונקציית גיבוב | 1 |
Q2902985 [CC | ] | Rabin signature algorithm | חתימה דיגיטלית רבין | 1 |
Q1465057 [CC | ] | Schnorr digital signature scheme | חתימה דיגיטלית של שנור | 1 |
Q2736593 [CC | ] | blind signature | חתימה עיוורת | 1 |
Q603296 [CC | ] | Lamport signature | חתימת למפורט | 1 |
Q375728 [CC | ] | Redundant | יתירות | 1 |
Q850362 [CC | ] | brute-force search | כוח גס | 1 |
Q451935 [CC | ] | Magic | מג'יק (מודיעין) | 1 |
Q228184 [CC | ] | random oracle | מודל אורקל אקראי | 1 |
Q512063 [CC | ] | Off-the-Record Messaging | מיסור שלא לפרסום | 1 |
Q6847008 [CC | ] | No label in en! | מכונת הצפנה | 1 |
Q1740351 [CC | ] | key signing party | מסיבת חתימה על מפתחות ציבוריים | 1 |
Q1823781 [CC | ] | random number | מספר אקראי | 1 |
Q49008 [CC | ] | prime number | מספר ראשוני | 1 |
Q1755775 [CC | ] | session key | מפתח שיחה | 1 |
Q565636 [CC | ] | frequency analysis | ניתוח תדירויות | 1 |
Q1151850 [CC | ] | Quadratic sieve | נפה ריבועית | 1 |
Q140770 [CC | ] | general number field sieve | נפת שדה מספרים | 1 |
Q935662 [CC | ] | forward secrecy | סודיות מושלמת קדימה | 1 |
Q8805 [CC | ] | bit | סיבית | 1 |
Q2355810 [CC | ] | Hard-core predicate | סיבית קשה | 1 |
Q161157 [CC | ] | password | סיסמה | 1 |
Q1137840 [CC | ] | one-time password | סיסמה חד-פעמית | 1 |
Q14746 [CC | ] | hash tree | עץ מרקל | 1 |
Q15702839 [CC | ] | Curve25519 | עקום 25519 | 1 |
Q1331187 [CC | ] | Kerckhoffs’s principle | עקרון קרקהופס | 1 |
Q1766279 [CC | ] | Negligible function | פונקציה זניחה | 1 |
Q720931 [CC | ] | one-way function | פונקציה חד-כיוונית | 1 |
Q3075281 [CC | ] | sponge function | פונקציית ספוג | 1 |
Q4846249 [CC | ] | integer factorization | פירוק לגורמים של מספר שלם | 1 |
Q150474 [CC | ] | one-time pad | פנקס חד-פעמי | 1 |
Q1059963 [CC | ] | challenge–response authentication | פרוטוקול אתגר-מענה | 1 |
Q623447 [CC | ] | Diffie–Hellman key exchange | פרוטוקול דיפי-הלמן | 1 |
Q934370 [CC | ] | Needham–Schroeder protocol | פרוטוקול נידהאם-שרודר | 1 |
Q27031176 [CC | ] | Signal Protocol | פרוטוקול סיגנל | 1 |
Q1410418 [CC | ] | Feige–Fiat–Shamir identification scheme | פרוטוקול פייגה-פיאט-שמיר | 1 |
Q1162410 [CC | ] | ElGamal encryption | צופן אל-גמאל | 1 |
Q259563 [CC | ] | Atbash | צופן אתב"ש | 1 |
Q25490672 [CC | ] | tweakable block cipher | צופן בלוקים בר-התאמה | 1 |
Q626500 [CC | ] | substitution cipher | צופן החלפה | 1 |
Q2454939 [CC | ] | Hill cipher | צופן היל | 1 |
Q55516 [CC | ] | Vigenère cipher | צופן ויז'נר | 1 |
Q18192614 [CC | ] | No label in en! | צופן ורנם | 1 |
Q829915 [CC | ] | Playfair cipher | צופן פלייפייר | 1 |
Q180943 [CC | ] | Caesar cipher | צופן קיסר | 1 |
Q840498 [CC | ] | Transposition cipher | צופן שחלוף | 1 |
Q245480 [CC | ] | cyclometer | ציקלומטר | 1 |
Q770597 [CC | ] | Colossus | קולוסוס (מחשב) | 1 |
Q506053 [CC | ] | Kerberos | קרברוס (פרוטוקול) | 1 |
Q1597418 [CC | ] | Visual cryptography | קריפטוגרפיה ויזואלית | 1 |
Q4972106 [CC | ] | Broadcast encryption | שידור מוצפן | 1 |
Q657705 [CC | ] | index calculus algorithm | תחשיב אינדקסים | 1 |
Q7255477 [CC | ] | Pseudorandom permutation | תמורה פסאודו-אקראית | 1 |
Q637416 [CC | ] | codebook | Livre-code | 1 |
Q3372793 [CC | ] | Paulo Barreto | Paulo Barreto | 1 |
Q20293166 [CC | ] | Rijndael | Rijndael | 1 |
Q97278616 [CC | ] | No label in en! | Skinny (chiffrement) | 1 |
Q1860 [CC | ] | English | Английский язык | 1 |
Q846862 [CC | ] | involution | Инволюция (математика) | 1 |
Q1057968 [CC | ] | finite group | Конечная группа | 1 |
Q2060 [CC | ] | 1992 | 1992 | 1 |
Q3600479 [CC | ] | No label in en! | ABC (cifrario) | 1 |
Q3631791 [CC | ] | No label in en! | BEAR e LION | 1 |
Q17508476 [CC | ] | 3-Subset Meet-in-the-Middle attack | 3-subset meet-in-the-middle attack | 1 |
Q955164 [CC | ] | Acoustic cryptanalysis | Acoustic cryptanalysis | 1 |
Q60772781 [CC | ] | Adiantum | Adiantum (cipher) | 1 |
Q116757386 [CC | ] | Ascon | Ascon (cipher) | 1 |
Q4825885 [CC | ] | authentication protocol | Authentication protocol | 1 |
Q4835404 [CC | ] | BEAR and LION ciphers | BEAR and LION ciphers | 1 |
Q16937479 [CC | ] | Biclique attack | Biclique attack | 1 |
Q4920072 [CC | ] | black-bag cryptanalysis | Black-bag cryptanalysis | 1 |
Q1071004 [CC | ] | chi-square test | Chi-squared test | 1 |
Q1071695 [CC | ] | Chiasmus | Chiasmus (cipher) | 1 |
Q5121273 [CC | ] | Cipher security summary | Cipher security summary | 1 |
Q1589480 [CC | ] | ciphertext | Ciphertext | 1 |
Q1224520 [CC | ] | confusion and diffusion | Confusion and diffusion | 1 |
Q13479982 [CC | ] | cryptocurrency | Cryptocurrency | 1 |
Q1749235 [CC | ] | nonce | Cryptographic nonce | 1 |
Q246593 [CC | ] | cryptographic primitive | Cryptographic primitive | 1 |
Q1790389 [CC | ] | cryptographically secure pseudo-random number generator | Cryptographically secure pseudorandom number generator | 1 |
Q105626027 [CC | ] | cryptojacking malware | Cryptojacking malware | 1 |
Q976521 [CC | ] | cryptosystem | Cryptosystem | 1 |
Q3506050 [CC | ] | cryptovirology | Cryptovirology | 1 |
Q2357684 [CC | ] | DES supplementary material | DES supplementary material | 1 |
Q4036876 [CC | ] | DFC | DFC (cipher) | 1 |
Q568825 [CC | ] | Davies' attack | Davies attack | 1 |
Q3005749 [CC | ] | Differential-linear attack | Differential-linear attack | 1 |
Q5283008 [CC | ] | distinguishing attack | Distinguishing attack | 1 |
Q2735168 [CC | ] | EFF DES cracker | EFF DES cracker | 1 |
Q25305279 [CC | ] | Electromagnetic attack | Electromagnetic attack | 1 |
Q141090 [CC | ] | encryption | Encryption | 1 |
Q1340257 [CC | ] | end-to-end encryption | End-to-end encryption | 1 |
Q5425305 [CC | ] | FEA-M | FEA-M | 1 |
Q5523472 [CC | ] | garlic routing | Garlic routing | 1 |
Q4039650 [CC | ] | Grand Cru | Grand Cru (cipher) | 1 |
Q117476494 [CC | ] | harvest now, decrypt later | Harvest now, decrypt later | 1 |
Q183427 [CC | ] | hash function | Hash function | 1 |
Q4040285 [CC | ] | Hasty Pudding cipher | Hasty Pudding cipher | 1 |
Q4040651 [CC | ] | Hierocrypt | Hierocrypt | 1 |
Q11673206 [CC | ] | higher-order differential cryptanalysis | Higher-order differential cryptanalysis | 1 |
Q467928 [CC | ] | history of cryptography | History of cryptography | 1 |
Q3005748 [CC | ] | impossible differential cryptanalysis | Impossible differential cryptanalysis | 1 |
Q55643093 [CC | ] | Insecure channel | Insecure channel | 1 |
Q6043447 [CC | ] | Intel Cascade Cipher | Intel Cascade Cipher | 1 |
Q11078257 [CC | ] | Interpolation attack | Interpolation attack | 1 |
Q6334123 [CC | ] | KN-Cipher | KN-Cipher | 1 |
Q961691 [CC | ] | Kademlia | Kademlia | 1 |
Q3268404 [CC | ] | kendall tau rank correlation | Kendall rank correlation coefficient | 1 |
Q3496793 [CC | ] | key derivation function | Key derivation function | 1 |
Q6398160 [CC | ] | Key generator | Key generator | 1 |
Q6398189 [CC | ] | key stretching | Key stretching | 1 |
Q6397992 [CC | ] | Key-based routing | Key-based routing | 1 |
Q849945 [CC | ] | keygen | Keygen | 1 |
Q1526275 [CC | ] | kleptography | Kleptography | 1 |
Q22678508 [CC | ] | known-key distinguishing attack | Known-key distinguishing attack | 1 |
Q21655497 [CC | ] | Kuznyechik | Kuznyechik | 1 |
Q6469303 [CC | ] | Ladder-DES | Ladder-DES | 1 |
Q6713909 [CC | ] | M6 | M6 (cipher) | 1 |
Q6713956 [CC | ] | M8 | M8 (cipher) | 1 |
Q17082481 [CC | ] | Mercy | Mercy (cipher) | 1 |
Q497516 [CC | ] | Mix network | Mix network | 1 |
Q6934537 [CC | ] | MultiSwap | MultiSwap | 1 |
Q6954867 [CC | ] | NOEKEON | NOEKEON | 1 |
Q4045002 [CC | ] | NUSH | NUSH | 1 |
Q17082957 [CC | ] | New Data Seal | New Data Seal | 1 |
Q7037633 [CC | ] | Nimbus | Nimbus (cipher) | 1 |
Q392095 [CC | ] | onion routing | Onion routing | 1 |
Q620009 [CC | ] | outline of cryptography | Outline of cryptography | 1 |
Q1509884 [CC | ] | padding | Padding (cryptography) | 1 |
Q7140656 [CC | ] | partitioning cryptanalysis | Partitioning cryptanalysis | 1 |
Q672628 [CC | ] | permutation box | Permutation box | 1 |
Q1162538 [CC | ] | plaintext | Plaintext | 1 |
Q2845210 [CC | ] | Power analysis | Power analysis | 1 |
Q28135258 [CC | ] | Prince | Prince (cipher) | 1 |
Q910571 [CC | ] | pseudorandom noise | Pseudorandom noise | 1 |
Q7265633 [CC | ] | Q | Q (cipher) | 1 |
Q1027298 [CC | ] | quantum key distribution | Quantum key distribution | 1 |
Q228206 [CC | ] | random number generation | Random number generation | 1 |
Q926331 [CC | ] | ransomware | Ransomware | 1 |
Q7759767 [CC | ] | The Rebound Attack | Rebound attack | 1 |
Q515265 [CC | ] | related-key attack | Related-key attack | 1 |
Q7370323 [CC | ] | Rotational cryptanalysis | Rotational cryptanalysis | 1 |
Q117336726 [CC | ] | Round | Round (cryptography) | 1 |
Q2093306 [CC | ] | rubber-hose cryptanalysis | Rubber-hose cryptanalysis | 1 |
Q2205067 [CC | ] | SAVILLE | SAVILLE | 1 |
Q1333561 [CC | ] | ShangMi 4 | SM4 (cipher) | 1 |
Q7395234 [CC | ] | SXAL/MBAL | SXAL/MBAL | 1 |
Q3304359 [CC | ] | Secure channel | Secure channel | 1 |
Q462624 [CC | ] | Shared secret | Shared secret | 1 |
Q7540343 [CC | ] | Slide attack | Slide attack | 1 |
Q17084934 [CC | ] | Speck | Speck (cipher) | 1 |
Q7575152 [CC | ] | Spectr-H64 | Spectr-H64 | 1 |
Q7631517 [CC | ] | Subliminal channel | Subliminal channel | 1 |
Q18394427 [CC | ] | Time/memory/data tradeoff attack | Time/memory/data tradeoff attack | 1 |
Q2665075 [CC | ] | timing attack | Timing attack | 1 |
Q627620 [CC | ] | trapdoor function | Trapdoor function | 1 |
Q7839625 [CC | ] | Treyfer | Treyfer | 1 |
Q3307263 [CC | ] | truncated differential cryptanalysis | Truncated differential cryptanalysis | 1 |
Q3132224 [CC | ] | trusted timestamping | Trusted timestamping | 1 |
Q7864434 [CC | ] | UES | UES (cipher) | 1 |
Q7996185 [CC | ] | Whitening transformation | Whitening transformation | 1 |
Q8044864 [CC | ] | xmx | Xmx | 1 |
Q8073224 [CC | ] | Zodiac | Zodiac (cipher) | 1 |
Q63831676 [CC | ] | Akelarre | Akelarre | 1 |
Q2931726 [CC | ] | CMEA | CMEA | 1 |
Q219189 [CC | ] | Ice (redirect) | ICE | 1 |
Q449570 [CC | ] | SPN | SPN | 1 |