This tool looks for unlabeled Wikidata items in your language. It starts with a Wikidata item,
looks at all the associated Wikipedia pages, the links on all those pages, and lists the Wikidata items corresponding to the link targets.
Q3631710 - BATON
Searching link targets on 2 Wikipedias...
Item | Label [en] | Wikilabels | Link # |
---|---|---|---|
Q223123 [CC | ] | 3-Way | 3-Way | 3-Way (cifrario) | 2 |
Q840633 [CC | ] | ARIA | ARIA (cipher) | ARIA (cifrario) | 2 |
Q190746 [CC | ] | Advanced Encryption Standard | Advanced Encryption Standard | 2 |
Q2326939 [CC | ] | Akelarre | Akelarre (cipher) | Akelarre (cifrario) | 2 |
Q474108 [CC | ] | Anubis | Anubis (cipher) | Anubis (cifrario) | 2 |
Q3635532 [CC | ] | BaseKing | BaseKing | 2 |
Q926394 [CC | ] | BassOmatic | BassOmatic | 2 |
Q543151 [CC | ] | block cipher | Block cipher | Cifratura a blocchi | 2 |
Q154021 [CC | ] | block cipher mode of operation | Block cipher mode of operation | Modalità di funzionamento dei cifrari a blocchi | 2 |
Q1053357 [CC | ] | block size | Block size (cryptography) | Dimensione del blocco | 2 |
Q815853 [CC | ] | Blowfish | Blowfish (cipher) | Blowfish | 2 |
Q53735 [CC | ] | CAST-128 | CAST-128 | 2 |
Q1022875 [CC | ] | CAST-256 | CAST-256 | 2 |
Q3648731 [CC | ] | CIKS-1 | CIKS-1 | 2 |
Q3648747 [CC | ] | CIPHERUNICORN-A | CIPHERUNICORN-A | 2 |
Q3648745 [CC | ] | CIPHERUNICORN-E | CIPHERUNICORN-E | 2 |
Q978814 [CC | ] | CLEFIA | CLEFIA | 2 |
Q3648824 [CC | ] | COCONUT98 | COCONUT98 | 2 |
Q3648911 [CC | ] | CRYPTON | CRYPTON | 2 |
Q1609474 [CC | ] | CS-Cipher | CS-Cipher | 2 |
Q1028476 [CC | ] | Camellia | Camellia (cipher) | Camellia (cifrario) | 2 |
Q338574 [CC | ] | Cellular Message Encryption Algorithm | Cellular Message Encryption Algorithm | 2 |
Q946821 [CC | ] | Cobra ciphers | Cobra ciphers | Cobra (cifrario) | 2 |
Q3696410 [CC | ] | Crab | Crab (cipher) | Crab (cifrario) | 2 |
Q8789 [CC | ] | cryptography | Cryptography | Crittografia | 2 |
Q2930732 [CC | ] | Cryptomeria cipher | Cryptomeria cipher | C2 (cifrario) | 2 |
Q284899 [CC | ] | DEAL | DEAL | 2 |
Q2454245 [CC | ] | DES-X | DES-X | 2 |
Q135035 [CC | ] | Data Encryption Standard | Data Encryption Standard | 2 |
Q1388053 [CC | ] | FEAL | FEAL | 2 |
Q1044361 [CC | ] | Feistel cipher | Feistel cipher | Rete di Feistel | 2 |
Q2327219 [CC | ] | GDES | GDES | 2 |
Q2507783 [CC | ] | GOST 28147-89 | GOST (block cipher) | GOST (cifrario) | 2 |
Q1389431 [CC | ] | Idea NXT | IDEA NXT | 2 |
Q210214 [CC | ] | IPsec | IPsec | 2 |
Q1663550 [CC | ] | Initialization vector | Initialization vector | Vettore di inizializzazione | 2 |
Q848204 [CC | ] | International Data Encryption Algorithm | International Data Encryption Algorithm | 2 |
Q3801848 [CC | ] | Iraqi block cipher | Iraqi block cipher | 2 |
Q1718415 [CC | ] | KASUMI | KASUMI | 2 |
Q1110200 [CC | ] | KHAZAD | KHAZAD | 2 |
Q29045264 [CC | ] | Kalyna | Kalyna (cipher) | Kalyna (cifrario) | 2 |
Q2569509 [CC | ] | key schedule | Key schedule | Gestore della chiave | 2 |
Q1557574 [CC | ] | key size | Key size | Dimensione della chiave | 2 |
Q743153 [CC | ] | key whitening | Key whitening | 2 |
Q2329462 [CC | ] | Khufu and Khafre | Khufu and Khafre | Khufu e Khafre | 2 |
Q378566 [CC | ] | LOKI | LOKI | 2 |
Q1648054 [CC | ] | LOKI97 | LOKI97 | 2 |
Q1343482 [CC | ] | Lucifer | Lucifer (cipher) | Lucifer (cifrario) | 2 |
Q1881198 [CC | ] | MARS | MARS (cipher) | MARS (cifrario) | 2 |
Q2894267 [CC | ] | MMB | MMB (cipher) | Modular Multiplication-based Block | 2 |
Q11127451 [CC | ] | MacGuffin | MacGuffin (cipher) | MacGuffin (cifrario) | 2 |
Q121194 [CC | ] | National Security Agency | National Security Agency | 2 |
Q1053352 [CC | ] | Product cipher | Product cipher | Cifrario del prodotto | 2 |
Q1753382 [CC | ] | RC2 | RC2 | 2 |
Q1349650 [CC | ] | RC5 | RC5 | 2 |
Q1356939 [CC | ] | RC6 | RC6 | 2 |
Q727476 [CC | ] | S-1 block cipher | S-1 block cipher | S-1 | 2 |
Q748364 [CC | ] | substitution box | S-box | S-Box | 2 |
Q2601463 [CC | ] | SAFER | SAFER | 2 |
Q1061548 [CC | ] | SEED | SEED | SEED (cifrario) | 2 |
Q2658354 [CC | ] | SHARK | SHARK | 2 |
Q1501904 [CC | ] | Serpent | Serpent (cipher) | Serpent (cifrario) | 2 |
Q1422306 [CC | ] | SKIPJACK | Skipjack (cipher) | Skipjack | 2 |
Q2755328 [CC | ] | Square | Square (cipher) | Square (cifrario) | 2 |
Q1433692 [CC | ] | substitution–permutation network | Substitution–permutation network | Rete a sostituzione e permutazione | 2 |
Q1161666 [CC | ] | Thales Group | Thales Group | Thales | 2 |
Q1595597 [CC | ] | Tiny Encryption Algorithm | Tiny Encryption Algorithm | 2 |
Q134983 [CC | ] | Triple DES | Triple DES | 2 |
Q747320 [CC | ] | Twofish | Twofish | 2 |
Q1384945 [CC | ] | XTEA | XTEA | 2 |
Q4021631 [CC | ] | XXTEA | XXTEA | 2 |
Q17508476 [CC | ] | 3-Subset Meet-in-the-Middle attack | 3-subset meet-in-the-middle attack | 1 |
Q955164 [CC | ] | Acoustic cryptanalysis | Acoustic cryptanalysis | 1 |
Q60772781 [CC | ] | Adiantum | Adiantum (cipher) | 1 |
Q1053286 [CC | ] | Advanced Encryption Standard process | Advanced Encryption Standard process | 1 |
Q116757386 [CC | ] | Ascon | Ascon (cipher) | 1 |
Q15263584 [CC | ] | authenticated encryption | Authenticated encryption | 1 |
Q4825885 [CC | ] | authentication protocol | Authentication protocol | 1 |
Q1208241 [CC | ] | avalanche effect | Avalanche effect | 1 |
Q4835404 [CC | ] | BEAR and LION ciphers | BEAR and LION ciphers | 1 |
Q16937479 [CC | ] | Biclique attack | Biclique attack | 1 |
Q4920072 [CC | ] | black-bag cryptanalysis | Black-bag cryptanalysis | 1 |
Q2869899 [CC | ] | boomerang attack | Boomerang attack | 1 |
Q869370 [CC | ] | brute-force attack | Brute-force attack | 1 |
Q1024309 [CC | ] | CRYPTREC | CRYPTREC | 1 |
Q5014995 [CC | ] | CYPRIS | CYPRIS (microchip) | 1 |
Q218341 [CC | ] | checksum | Checksum | 1 |
Q1071004 [CC | ] | chi-square test | Chi-squared test | 1 |
Q1071695 [CC | ] | Chiasmus | Chiasmus (cipher) | 1 |
Q5121273 [CC | ] | Cipher security summary | Cipher security summary | 1 |
Q1589480 [CC | ] | ciphertext | Ciphertext | 1 |
Q4223055 [CC | ] | classified information in the United States | Classified information in the United States | 1 |
Q1224520 [CC | ] | confusion and diffusion | Confusion and diffusion | 1 |
Q897511 [CC | ] | cryptanalysis | Cryptanalysis | 1 |
Q13479982 [CC | ] | cryptocurrency | Cryptocurrency | 1 |
Q477202 [CC | ] | cryptographic hash function | Cryptographic hash function | 1 |
Q1749235 [CC | ] | nonce | Cryptographic nonce | 1 |
Q246593 [CC | ] | cryptographic primitive | Cryptographic primitive | 1 |
Q1254335 [CC | ] | cryptographic protocol | Cryptographic protocol | 1 |
Q1790389 [CC | ] | cryptographically secure pseudo-random number generator | Cryptographically secure pseudorandom number generator | 1 |
Q105626027 [CC | ] | cryptojacking malware | Cryptojacking malware | 1 |
Q976521 [CC | ] | cryptosystem | Cryptosystem | 1 |
Q3506050 [CC | ] | cryptovirology | Cryptovirology | 1 |
Q2357684 [CC | ] | DES supplementary material | DES supplementary material | 1 |
Q4036876 [CC | ] | DFC | DFC (cipher) | 1 |
Q568825 [CC | ] | Davies' attack | Davies attack | 1 |
Q1224471 [CC | ] | differential cryptanalysis | Differential cryptanalysis | 1 |
Q5275344 [CC | ] | differential fault analysis | Differential fault analysis | 1 |
Q3005749 [CC | ] | Differential-linear attack | Differential-linear attack | 1 |
Q220849 [CC | ] | digital signature | Digital signature | 1 |
Q5283008 [CC | ] | distinguishing attack | Distinguishing attack | 1 |
Q3045761 [CC | ] | E2 | E2 (cipher) | 1 |
Q2735168 [CC | ] | EFF DES cracker | EFF DES cracker | 1 |
Q25305279 [CC | ] | Electromagnetic attack | Electromagnetic attack | 1 |
Q141090 [CC | ] | encryption | Encryption | 1 |
Q1340257 [CC | ] | end-to-end encryption | End-to-end encryption | 1 |
Q5425305 [CC | ] | FEA-M | FEA-M | 1 |
Q3063412 [CC | ] | FROG | FROG | 1 |
Q5523472 [CC | ] | garlic routing | Garlic routing | 1 |
Q4039650 [CC | ] | Grand Cru | Grand Cru (cipher) | 1 |
Q117476494 [CC | ] | harvest now, decrypt later | Harvest now, decrypt later | 1 |
Q183427 [CC | ] | hash function | Hash function | 1 |
Q4040285 [CC | ] | Hasty Pudding cipher | Hasty Pudding cipher | 1 |
Q4040651 [CC | ] | Hierocrypt | Hierocrypt | 1 |
Q11673206 [CC | ] | higher-order differential cryptanalysis | Higher-order differential cryptanalysis | 1 |
Q467928 [CC | ] | history of cryptography | History of cryptography | 1 |
Q1636024 [CC | ] | ICE | ICE (cipher) | 1 |
Q3005748 [CC | ] | impossible differential cryptanalysis | Impossible differential cryptanalysis | 1 |
Q3510462 [CC | ] | information-theoretic security | Information-theoretic security | 1 |
Q55643093 [CC | ] | Insecure channel | Insecure channel | 1 |
Q3005754 [CC | ] | Integral cryptanalysis | Integral cryptanalysis | 1 |
Q6043447 [CC | ] | Intel Cascade Cipher | Intel Cascade Cipher | 1 |
Q11078257 [CC | ] | Interpolation attack | Interpolation attack | 1 |
Q6334123 [CC | ] | KN-Cipher | KN-Cipher | 1 |
Q6335306 [CC | ] | KOV-14 | KOV-14 | 1 |
Q961691 [CC | ] | Kademlia | Kademlia | 1 |
Q1737729 [CC | ] | KeeLoq | KeeLoq | 1 |
Q3268404 [CC | ] | kendall tau rank correlation | Kendall rank correlation coefficient | 1 |
Q471771 [CC | ] | key | Key (cryptography) | 1 |
Q3496793 [CC | ] | key derivation function | Key derivation function | 1 |
Q1414155 [CC | ] | key exchange protocol | Key exchange | 1 |
Q6398160 [CC | ] | Key generator | Key generator | 1 |
Q6398189 [CC | ] | key stretching | Key stretching | 1 |
Q6397992 [CC | ] | Key-based routing | Key-based routing | 1 |
Q849945 [CC | ] | keygen | Keygen | 1 |
Q1526275 [CC | ] | kleptography | Kleptography | 1 |
Q22678508 [CC | ] | known-key distinguishing attack | Known-key distinguishing attack | 1 |
Q21655497 [CC | ] | Kuznyechik | Kuznyechik | 1 |
Q96416915 [CC | ] | LEA | LEA (cipher) | 1 |
Q6469303 [CC | ] | Ladder-DES | Ladder-DES | 1 |
Q2995268 [CC | ] | Lai-Massey scheme | Lai–Massey scheme | 1 |
Q1826463 [CC | ] | linear cryptanalysis | Linear cryptanalysis | 1 |
Q6713909 [CC | ] | M6 | M6 (cipher) | 1 |
Q6713956 [CC | ] | M8 | M8 (cipher) | 1 |
Q548973 [CC | ] | MAGENTA | MAGENTA | 1 |
Q3272892 [CC | ] | MESH | MESH (cipher) | 1 |
Q4043435 [CC | ] | MISTY1 | MISTY1 | 1 |
Q3273310 [CC | ] | MULTI2 | MULTI2 | 1 |
Q2075709 [CC | ] | Madryga | Madryga | 1 |
Q938066 [CC | ] | meet-in-the-middle attack | Meet-in-the-middle attack | 1 |
Q17082481 [CC | ] | Mercy | Mercy (cipher) | 1 |
Q1052621 [CC | ] | message authentication code | Message authentication code | 1 |
Q497516 [CC | ] | Mix network | Mix network | 1 |
Q3005747 [CC | ] | Mod n cryptanalysis | Mod n cryptanalysis | 1 |
Q6934537 [CC | ] | MultiSwap | MultiSwap | 1 |
Q1663719 [CC | ] | NESSIE | NESSIE | 1 |
Q6954867 [CC | ] | NOEKEON | NOEKEON | 1 |
Q16934823 [CC | ] | NSA Suite A Cryptography | NSA Suite A Cryptography | 1 |
Q4045002 [CC | ] | NUSH | NUSH | 1 |
Q17082957 [CC | ] | New Data Seal | New Data Seal | 1 |
Q2735449 [CC | ] | NewDES | NewDES | 1 |
Q7037633 [CC | ] | Nimbus | Nimbus (cipher) | 1 |
Q392095 [CC | ] | onion routing | Onion routing | 1 |
Q620009 [CC | ] | outline of cryptography | Outline of cryptography | 1 |
Q932506 [CC | ] | PC Card | PC Card | 1 |
Q4047327 [CC | ] | PRESENT | PRESENT | 1 |
Q1509884 [CC | ] | padding | Padding (cryptography) | 1 |
Q7140656 [CC | ] | partitioning cryptanalysis | Partitioning cryptanalysis | 1 |
Q672628 [CC | ] | permutation box | Permutation box | 1 |
Q3229327 [CC | ] | piling-up lemma | Piling-up lemma | 1 |
Q1162538 [CC | ] | plaintext | Plaintext | 1 |
Q7233576 [CC | ] | post-quantum cryptography | Post-quantum cryptography | 1 |
Q2845210 [CC | ] | Power analysis | Power analysis | 1 |
Q28135258 [CC | ] | Prince | Prince (cipher) | 1 |
Q910571 [CC | ] | pseudorandom noise | Pseudorandom noise | 1 |
Q201339 [CC | ] | public-key cryptography | Public-key cryptography | 1 |
Q7265633 [CC | ] | Q | Q (cipher) | 1 |
Q471906 [CC | ] | quantum cryptography | Quantum cryptography | 1 |
Q1027298 [CC | ] | quantum key distribution | Quantum key distribution | 1 |
Q2028197 [CC | ] | REDOC | REDOC | 1 |
Q228206 [CC | ] | random number generation | Random number generation | 1 |
Q926331 [CC | ] | ransomware | Ransomware | 1 |
Q7759767 [CC | ] | The Rebound Attack | Rebound attack | 1 |
Q615772 [CC | ] | Red Pike | Red Pike (cipher) | 1 |
Q515265 [CC | ] | related-key attack | Related-key attack | 1 |
Q7370323 [CC | ] | Rotational cryptanalysis | Rotational cryptanalysis | 1 |
Q117336726 [CC | ] | Round | Round (cryptography) | 1 |
Q2093306 [CC | ] | rubber-hose cryptanalysis | Rubber-hose cryptanalysis | 1 |
Q2205067 [CC | ] | SAVILLE | SAVILLE | 1 |
Q3459272 [CC | ] | SC2000 | SC2000 | 1 |
Q474055 [CC | ] | SHACAL | SHACAL | 1 |
Q1333561 [CC | ] | ShangMi 4 | SM4 (cipher) | 1 |
Q7395234 [CC | ] | SXAL/MBAL | SXAL/MBAL | 1 |
Q7444858 [CC | ] | Secure Terminal Equipment | Secure Terminal Equipment | 1 |
Q3304359 [CC | ] | Secure channel | Secure channel | 1 |
Q462624 [CC | ] | Shared secret | Shared secret | 1 |
Q2267081 [CC | ] | side-channel attack | Side-channel attack | 1 |
Q17084394 [CC | ] | Simon | Simon (cipher) | 1 |
Q7540343 [CC | ] | Slide attack | Slide attack | 1 |
Q17084934 [CC | ] | Speck | Speck (cipher) | 1 |
Q7575152 [CC | ] | Spectr-H64 | Spectr-H64 | 1 |
Q15032 [CC | ] | steganography | Steganography | 1 |
Q864718 [CC | ] | stream cipher | Stream cipher | 1 |
Q7631517 [CC | ] | Subliminal channel | Subliminal channel | 1 |
Q327675 [CC | ] | symmetric-key algorithm | Symmetric-key algorithm | 1 |
Q4051445 [CC | ] | Threefish | Threefish | 1 |
Q18394427 [CC | ] | Time/memory/data tradeoff attack | Time/memory/data tradeoff attack | 1 |
Q2665075 [CC | ] | timing attack | Timing attack | 1 |
Q627620 [CC | ] | trapdoor function | Trapdoor function | 1 |
Q7839625 [CC | ] | Treyfer | Treyfer | 1 |
Q3307263 [CC | ] | truncated differential cryptanalysis | Truncated differential cryptanalysis | 1 |
Q3132224 [CC | ] | trusted timestamping | Trusted timestamping | 1 |
Q7864434 [CC | ] | UES | UES (cipher) | 1 |
Q513687 [CC | ] | weak key | Weak key | 1 |
Q7996185 [CC | ] | Whitening transformation | Whitening transformation | 1 |
Q2443442 [CC | ] | XSL attack | XSL attack | 1 |
Q8044864 [CC | ] | xmx | Xmx | 1 |
Q8073224 [CC | ] | Zodiac | Zodiac (cipher) | 1 |
Q3600479 [CC | ] | No label in en! | ABC (cifrario) | 1 |
Q3631791 [CC | ] | No label in en! | BEAR e LION | 1 |
Q80831 [CC | ] | integrated circuit | Circuito integrato | 1 |
Q23666 [CC | ] | Great Britain | Gran Bretagna | 1 |
Q3966 [CC | ] | computer hardware | Hardware | 1 |
Q30 [CC | ] | United States of America | Stati Uniti d'America | 1 |
Q1335365 [CC | ] | security token | Token (sicurezza) | 1 |