This tool looks for unlabeled Wikidata items in your language. It starts with a Wikidata item,
looks at all the associated Wikipedia pages, the links on all those pages, and lists the Wikidata items corresponding to the link targets.
Q4036876 - DFC
Searching link targets on 2 Wikipedias...
Item | Label [en] | Wikilabels | Link # |
---|---|---|---|
Q223123 [CC | ] | 3-Way | 3-Way | 3-WAY | 2 |
Q840633 [CC | ] | ARIA | ARIA (cipher) | ARIA (криптография) | 2 |
Q190746 [CC | ] | Advanced Encryption Standard | Advanced Encryption Standard | AES (стандарт шифрования) | 2 |
Q1053286 [CC | ] | Advanced Encryption Standard process | Advanced Encryption Standard process | AES (конкурс) | 2 |
Q2326939 [CC | ] | Akelarre | Akelarre (cipher) | Akelarre | 2 |
Q474108 [CC | ] | Anubis | Anubis (cipher) | Anubis | 2 |
Q3635532 [CC | ] | BaseKing | BaseKing | 2 |
Q926394 [CC | ] | BassOmatic | BassOmatic | 2 |
Q543151 [CC | ] | block cipher | Block cipher | Блочный шифр | 2 |
Q815853 [CC | ] | Blowfish | Blowfish (cipher) | Blowfish | 2 |
Q53735 [CC | ] | CAST-128 | CAST-128 | 2 |
Q1022875 [CC | ] | CAST-256 | CAST-256 | 2 |
Q3648747 [CC | ] | CIPHERUNICORN-A | CIPHERUNICORN-A | 2 |
Q3648745 [CC | ] | CIPHERUNICORN-E | CIPHERUNICORN-E | 2 |
Q978814 [CC | ] | CLEFIA | CLEFIA | 2 |
Q3648911 [CC | ] | CRYPTON | CRYPTON | 2 |
Q1609474 [CC | ] | CS-Cipher | CS-Cipher | 2 |
Q1028476 [CC | ] | Camellia | Camellia (cipher) | Camellia (алгоритм) | 2 |
Q1589480 [CC | ] | ciphertext | Ciphertext | Шифротекст | 2 |
Q946821 [CC | ] | Cobra ciphers | Cobra ciphers | Cobra (шифр) | 2 |
Q284899 [CC | ] | DEAL | DEAL | 2 |
Q2454245 [CC | ] | DES-X | DES-X | DESX | 2 |
Q135035 [CC | ] | Data Encryption Standard | Data Encryption Standard | DES | 2 |
Q82435 [CC | ] | Euler's number | E (mathematical constant) | E (число) | 2 |
Q3045761 [CC | ] | E2 | E2 (cipher) | E2 (шифр) | 2 |
Q141090 [CC | ] | encryption | Encryption | Шифрование | 2 |
Q1388053 [CC | ] | FEAL | FEAL | 2 |
Q3063412 [CC | ] | FROG | FROG | 2 |
Q1044361 [CC | ] | Feistel cipher | Feistel cipher | Сеть Фейстеля | 2 |
Q2507783 [CC | ] | GOST 28147-89 | GOST (block cipher) | ГОСТ 28147-89 | 2 |
Q4039650 [CC | ] | Grand Cru | Grand Cru (cipher) | Grand Cru | 2 |
Q4040285 [CC | ] | Hasty Pudding cipher | Hasty Pudding cipher | HPC (шифр) | 2 |
Q4040651 [CC | ] | Hierocrypt | Hierocrypt | Hierocrypt-3 | 2 |
Q848204 [CC | ] | International Data Encryption Algorithm | International Data Encryption Algorithm | IDEA | 2 |
Q1718415 [CC | ] | KASUMI | KASUMI | 2 |
Q1110200 [CC | ] | KHAZAD | KHAZAD | 2 |
Q471771 [CC | ] | key | Key (cryptography) | Ключ (криптография) | 2 |
Q1557574 [CC | ] | key size | Key size | Размер ключа | 2 |
Q2329462 [CC | ] | Khufu and Khafre | Khufu and Khafre | Khufu | 2 |
Q21655497 [CC | ] | Kuznyechik | Kuznyechik | Кузнечик (шифр) | 2 |
Q1648054 [CC | ] | LOKI97 | LOKI97 | 2 |
Q1343482 [CC | ] | Lucifer | Lucifer (cipher) | Lucifer (криптография) | 2 |
Q1881198 [CC | ] | MARS | MARS (cipher) | MARS (криптография) | 2 |
Q3272892 [CC | ] | MESH | MESH (cipher) | MESH (шифр) | 2 |
Q4043435 [CC | ] | MISTY1 | MISTY1 | 2 |
Q11127451 [CC | ] | MacGuffin | MacGuffin (cipher) | MacGuffin (шифр) | 2 |
Q4045002 [CC | ] | NUSH | NUSH | 2 |
Q17082957 [CC | ] | New Data Seal | New Data Seal | 2 |
Q2735449 [CC | ] | NewDES | NewDES | 2 |
Q4047327 [CC | ] | PRESENT | PRESENT | Present (шифр) | 2 |
Q1349650 [CC | ] | RC5 | RC5 | 2 |
Q1356939 [CC | ] | RC6 | RC6 | 2 |
Q2028197 [CC | ] | REDOC | REDOC | 2 |
Q2601463 [CC | ] | SAFER | SAFER | 2 |
Q3459272 [CC | ] | SC2000 | SC2000 | SC2000 (шифр) | 2 |
Q1061548 [CC | ] | SEED | SEED | 2 |
Q474055 [CC | ] | SHACAL | SHACAL | 2 |
Q2658354 [CC | ] | SHARK | SHARK | 2 |
Q1333561 [CC | ] | ShangMi 4 | SM4 (cipher) | SM4 | 2 |
Q1501904 [CC | ] | Serpent | Serpent (cipher) | Serpent | 2 |
Q17084394 [CC | ] | Simon | Simon (cipher) | Simon (блочный шифр) | 2 |
Q1422306 [CC | ] | SKIPJACK | Skipjack (cipher) | Skipjack | 2 |
Q17084934 [CC | ] | Speck | Speck (cipher) | Speck | 2 |
Q2755328 [CC | ] | Square | Square (cipher) | SQUARE | 2 |
Q864718 [CC | ] | stream cipher | Stream cipher | Потоковый шифр | 2 |
Q1433692 [CC | ] | substitution–permutation network | Substitution–permutation network | SP-сеть | 2 |
Q327675 [CC | ] | symmetric-key algorithm | Symmetric-key algorithm | Симметричные криптосистемы | 2 |
Q4051445 [CC | ] | Threefish | Threefish | 2 |
Q2665075 [CC | ] | timing attack | Timing attack | Атака по времени | 2 |
Q1595597 [CC | ] | Tiny Encryption Algorithm | Tiny Encryption Algorithm | TEA | 2 |
Q134983 [CC | ] | Triple DES | Triple DES | 2 |
Q747320 [CC | ] | Twofish | Twofish | 2 |
Q433933 [CC | ] | Vincent Rijmen | Vincent Rijmen | Рэймен, Винсент | 2 |
Q1384945 [CC | ] | XTEA | XTEA | 2 |
Q4021631 [CC | ] | XXTEA | XXTEA | 2 |
Q17508476 [CC | ] | 3-Subset Meet-in-the-Middle attack | 3-subset meet-in-the-middle attack | 1 |
Q955164 [CC | ] | Acoustic cryptanalysis | Acoustic cryptanalysis | 1 |
Q60772781 [CC | ] | Adiantum | Adiantum (cipher) | 1 |
Q382497 [CC | ] | affine transformation | Affine transformation | 1 |
Q116757386 [CC | ] | Ascon | Ascon (cipher) | 1 |
Q15263584 [CC | ] | authenticated encryption | Authenticated encryption | 1 |
Q4825885 [CC | ] | authentication protocol | Authentication protocol | 1 |
Q1208241 [CC | ] | avalanche effect | Avalanche effect | 1 |
Q3631710 [CC | ] | BATON | BATON | 1 |
Q4835404 [CC | ] | BEAR and LION ciphers | BEAR and LION ciphers | 1 |
Q16937479 [CC | ] | Biclique attack | Biclique attack | 1 |
Q4920072 [CC | ] | black-bag cryptanalysis | Black-bag cryptanalysis | 1 |
Q154021 [CC | ] | block cipher mode of operation | Block cipher mode of operation | 1 |
Q1053357 [CC | ] | block size | Block size (cryptography) | 1 |
Q2869899 [CC | ] | boomerang attack | Boomerang attack | 1 |
Q869370 [CC | ] | brute-force attack | Brute-force attack | 1 |
Q3648731 [CC | ] | CIKS-1 | CIKS-1 | 1 |
Q3648824 [CC | ] | COCONUT98 | COCONUT98 | 1 |
Q1024309 [CC | ] | CRYPTREC | CRYPTREC | 1 |
Q338574 [CC | ] | Cellular Message Encryption Algorithm | Cellular Message Encryption Algorithm | 1 |
Q1071004 [CC | ] | chi-square test | Chi-squared test | 1 |
Q1071695 [CC | ] | Chiasmus | Chiasmus (cipher) | 1 |
Q2420767 [CC | ] | chosen-ciphertext attack | Chosen-ciphertext attack | 1 |
Q5121273 [CC | ] | Cipher security summary | Cipher security summary | 1 |
Q1224520 [CC | ] | confusion and diffusion | Confusion and diffusion | 1 |
Q3696410 [CC | ] | Crab | Crab (cipher) | 1 |
Q897511 [CC | ] | cryptanalysis | Cryptanalysis | 1 |
Q13479982 [CC | ] | cryptocurrency | Cryptocurrency | 1 |
Q477202 [CC | ] | cryptographic hash function | Cryptographic hash function | 1 |
Q1749235 [CC | ] | nonce | Cryptographic nonce | 1 |
Q246593 [CC | ] | cryptographic primitive | Cryptographic primitive | 1 |
Q1254335 [CC | ] | cryptographic protocol | Cryptographic protocol | 1 |
Q1790389 [CC | ] | cryptographically secure pseudo-random number generator | Cryptographically secure pseudorandom number generator | 1 |
Q8789 [CC | ] | cryptography | Cryptography | 1 |
Q105626027 [CC | ] | cryptojacking malware | Cryptojacking malware | 1 |
Q2930732 [CC | ] | Cryptomeria cipher | Cryptomeria cipher | 1 |
Q976521 [CC | ] | cryptosystem | Cryptosystem | 1 |
Q3506050 [CC | ] | cryptovirology | Cryptovirology | 1 |
Q2357684 [CC | ] | DES supplementary material | DES supplementary material | 1 |
Q568825 [CC | ] | Davies' attack | Davies attack | 1 |
Q3984122 [CC | ] | Decorrelation theory | Decorrelation theory | 1 |
Q1224471 [CC | ] | differential cryptanalysis | Differential cryptanalysis | 1 |
Q5275344 [CC | ] | differential fault analysis | Differential fault analysis | 1 |
Q3005749 [CC | ] | Differential-linear attack | Differential-linear attack | 1 |
Q220849 [CC | ] | digital signature | Digital signature | 1 |
Q5283008 [CC | ] | distinguishing attack | Distinguishing attack | 1 |
Q2573233 [CC | ] | Don Coppersmith | Don Coppersmith | 1 |
Q2735168 [CC | ] | EFF DES cracker | EFF DES cracker | 1 |
Q25305279 [CC | ] | Electromagnetic attack | Electromagnetic attack | 1 |
Q1340257 [CC | ] | end-to-end encryption | End-to-end encryption | 1 |
Q5425305 [CC | ] | FEA-M | FEA-M | 1 |
Q5436988 [CC | ] | Fast Software Encryption | Fast Software Encryption | 1 |
Q2327219 [CC | ] | GDES | GDES | 1 |
Q5523472 [CC | ] | garlic routing | Garlic routing | 1 |
Q117476494 [CC | ] | harvest now, decrypt later | Harvest now, decrypt later | 1 |
Q183427 [CC | ] | hash function | Hash function | 1 |
Q11673206 [CC | ] | higher-order differential cryptanalysis | Higher-order differential cryptanalysis | 1 |
Q467928 [CC | ] | history of cryptography | History of cryptography | 1 |
Q1636024 [CC | ] | ICE | ICE (cipher) | 1 |
Q1389431 [CC | ] | Idea NXT | IDEA NXT | 1 |
Q3005748 [CC | ] | impossible differential cryptanalysis | Impossible differential cryptanalysis | 1 |
Q3510462 [CC | ] | information-theoretic security | Information-theoretic security | 1 |
Q1663550 [CC | ] | Initialization vector | Initialization vector | 1 |
Q55643093 [CC | ] | Insecure channel | Insecure channel | 1 |
Q3005754 [CC | ] | Integral cryptanalysis | Integral cryptanalysis | 1 |
Q6043447 [CC | ] | Intel Cascade Cipher | Intel Cascade Cipher | 1 |
Q11078257 [CC | ] | Interpolation attack | Interpolation attack | 1 |
Q3801848 [CC | ] | Iraqi block cipher | Iraqi block cipher | 1 |
Q93087 [CC | ] | Jacques Stern | Jacques Stern | 1 |
Q6334123 [CC | ] | KN-Cipher | KN-Cipher | 1 |
Q961691 [CC | ] | Kademlia | Kademlia | 1 |
Q29045264 [CC | ] | Kalyna | Kalyna (cipher) | 1 |
Q1737729 [CC | ] | KeeLoq | KeeLoq | 1 |
Q3268404 [CC | ] | kendall tau rank correlation | Kendall rank correlation coefficient | 1 |
Q3496793 [CC | ] | key derivation function | Key derivation function | 1 |
Q1414155 [CC | ] | key exchange protocol | Key exchange | 1 |
Q6398160 [CC | ] | Key generator | Key generator | 1 |
Q2569509 [CC | ] | key schedule | Key schedule | 1 |
Q6398189 [CC | ] | key stretching | Key stretching | 1 |
Q743153 [CC | ] | key whitening | Key whitening | 1 |
Q6397992 [CC | ] | Key-based routing | Key-based routing | 1 |
Q849945 [CC | ] | keygen | Keygen | 1 |
Q1526275 [CC | ] | kleptography | Kleptography | 1 |
Q22678508 [CC | ] | known-key distinguishing attack | Known-key distinguishing attack | 1 |
Q96416915 [CC | ] | LEA | LEA (cipher) | 1 |
Q378566 [CC | ] | LOKI | LOKI | 1 |
Q6469303 [CC | ] | Ladder-DES | Ladder-DES | 1 |
Q2995268 [CC | ] | Lai-Massey scheme | Lai–Massey scheme | 1 |
Q1826463 [CC | ] | linear cryptanalysis | Linear cryptanalysis | 1 |
Q6713909 [CC | ] | M6 | M6 (cipher) | 1 |
Q6713956 [CC | ] | M8 | M8 (cipher) | 1 |
Q548973 [CC | ] | MAGENTA | MAGENTA | 1 |
Q2894267 [CC | ] | MMB | MMB (cipher) | 1 |
Q3273310 [CC | ] | MULTI2 | MULTI2 | 1 |
Q2075709 [CC | ] | Madryga | Madryga | 1 |
Q938066 [CC | ] | meet-in-the-middle attack | Meet-in-the-middle attack | 1 |
Q17082481 [CC | ] | Mercy | Mercy (cipher) | 1 |
Q1052621 [CC | ] | message authentication code | Message authentication code | 1 |
Q497516 [CC | ] | Mix network | Mix network | 1 |
Q3005747 [CC | ] | Mod n cryptanalysis | Mod n cryptanalysis | 1 |
Q6934537 [CC | ] | MultiSwap | MultiSwap | 1 |
Q1663719 [CC | ] | NESSIE | NESSIE | 1 |
Q6954867 [CC | ] | NOEKEON | NOEKEON | 1 |
Q7037633 [CC | ] | Nimbus | Nimbus (cipher) | 1 |
Q392095 [CC | ] | onion routing | Onion routing | 1 |
Q620009 [CC | ] | outline of cryptography | Outline of cryptography | 1 |
Q42332 [CC | ] | Portable Document Format | 1 | |
Q1509884 [CC | ] | padding | Padding (cryptography) | 1 |
Q7140656 [CC | ] | partitioning cryptanalysis | Partitioning cryptanalysis | 1 |
Q672628 [CC | ] | permutation box | Permutation box | 1 |
Q3229327 [CC | ] | piling-up lemma | Piling-up lemma | 1 |
Q1162538 [CC | ] | plaintext | Plaintext | 1 |
Q7233576 [CC | ] | post-quantum cryptography | Post-quantum cryptography | 1 |
Q218170 [CC | ] | PostScript | PostScript | 1 |
Q2845210 [CC | ] | Power analysis | Power analysis | 1 |
Q28135258 [CC | ] | Prince | Prince (cipher) | 1 |
Q1053352 [CC | ] | Product cipher | Product cipher | 1 |
Q852594 [CC | ] | provable security | Provable security | 1 |
Q910571 [CC | ] | pseudorandom noise | Pseudorandom noise | 1 |
Q201339 [CC | ] | public-key cryptography | Public-key cryptography | 1 |
Q7265633 [CC | ] | Q | Q (cipher) | 1 |
Q471906 [CC | ] | quantum cryptography | Quantum cryptography | 1 |
Q1027298 [CC | ] | quantum key distribution | Quantum key distribution | 1 |
Q1753382 [CC | ] | RC2 | RC2 | 1 |
Q228206 [CC | ] | random number generation | Random number generation | 1 |
Q926331 [CC | ] | ransomware | Ransomware | 1 |
Q7759767 [CC | ] | The Rebound Attack | Rebound attack | 1 |
Q615772 [CC | ] | Red Pike | Red Pike (cipher) | 1 |
Q515265 [CC | ] | related-key attack | Related-key attack | 1 |
Q220 [CC | ] | Rome | Rome | 1 |
Q7370323 [CC | ] | Rotational cryptanalysis | Rotational cryptanalysis | 1 |
Q117336726 [CC | ] | Round | Round (cryptography) | 1 |
Q2093306 [CC | ] | rubber-hose cryptanalysis | Rubber-hose cryptanalysis | 1 |
Q727476 [CC | ] | S-1 block cipher | S-1 block cipher | 1 |
Q748364 [CC | ] | substitution box | S-box | 1 |
Q2205067 [CC | ] | SAVILLE | SAVILLE | 1 |
Q7395234 [CC | ] | SXAL/MBAL | SXAL/MBAL | 1 |
Q3304359 [CC | ] | Secure channel | Secure channel | 1 |
Q3478074 [CC | ] | Selected Areas in Cryptography | Selected Areas in Cryptography | 1 |
Q3479573 [CC | ] | Serge Vaudenay | Serge Vaudenay | 1 |
Q462624 [CC | ] | Shared secret | Shared secret | 1 |
Q2267081 [CC | ] | side-channel attack | Side-channel attack | 1 |
Q7540343 [CC | ] | Slide attack | Slide attack | 1 |
Q7575152 [CC | ] | Spectr-H64 | Spectr-H64 | 1 |
Q15032 [CC | ] | steganography | Steganography | 1 |
Q7631517 [CC | ] | Subliminal channel | Subliminal channel | 1 |
Q18394427 [CC | ] | Time/memory/data tradeoff attack | Time/memory/data tradeoff attack | 1 |
Q627620 [CC | ] | trapdoor function | Trapdoor function | 1 |
Q7839625 [CC | ] | Treyfer | Treyfer | 1 |
Q3307263 [CC | ] | truncated differential cryptanalysis | Truncated differential cryptanalysis | 1 |
Q3132224 [CC | ] | trusted timestamping | Trusted timestamping | 1 |
Q7864434 [CC | ] | UES | UES (cipher) | 1 |
Q639408 [CC | ] | Waterloo | Waterloo, Ontario | 1 |
Q513687 [CC | ] | weak key | Weak key | 1 |
Q7996185 [CC | ] | Whitening transformation | Whitening transformation | 1 |
Q2443442 [CC | ] | XSL attack | XSL attack | 1 |
Q8044864 [CC | ] | xmx | Xmx | 1 |
Q8073224 [CC | ] | Zodiac | Zodiac (cipher) | 1 |
Q280129 [CC | ] | No label in en! | A3 (шифр) | 1 |
Q783541 [CC | ] | A5/1 | A5 (алгоритм шифрования) | 1 |
Q280446 [CC | ] | No label in en! | A8 (шифр) | 1 |
Q3600479 [CC | ] | No label in en! | ABC (криптография) | 1 |
Q4034976 [CC | ] | No label in en! | BelT | 1 |
Q4037123 [CC | ] | DECIM | Decim | 1 |
Q4037294 [CC | ] | No label in en! | Diamond2 | 1 |
Q4038037 [CC | ] | EnRUPT | EnRUPT | 1 |
Q3736465 [CC | ] | F-FCSR | F-FCSR | 1 |
Q5593489 [CC | ] | Grain | Grain | 1 |
Q660919 [CC | ] | HC-256 | HC-256 | 1 |
Q21652109 [CC | ] | No label in en! | Hierocrypt-L1 | 1 |
Q17990776 [CC | ] | KCipher-2 | KCipher-2 | 1 |
Q21844922 [CC | ] | No label in en! | Khafre | 1 |
Q3841332 [CC | ] | MICKEY | MICKEY | 1 |
Q4043510 [CC | ] | MUGI | MUGI | 1 |
Q4046203 [CC | ] | Pike | PIKE | 1 |
Q3901296 [CC | ] | Phelix | Phelix | 1 |
Q846955 [CC | ] | RC4 | RC4 | 1 |
Q4047895 [CC | ] | No label in en! | RTEA | 1 |
Q492162 [CC | ] | Rabbit | Rabbit | 1 |
Q4047975 [CC | ] | No label in en! | Raiden (алгоритм) | 1 |
Q4047981 [CC | ] | No label in en! | Rainbow (алгоритм) | 1 |
Q474401 [CC | ] | SEAL | SEAL (криптографический алгоритм) | 1 |
Q339387 [CC | ] | SIMD | SIMD | 1 |
Q3943791 [CC | ] | SNOW | SNOW (шифр) | 1 |
Q3943814 [CC | ] | SOSEMANUK | SOSEMANUK | 1 |
Q97198827 [CC | ] | STRUMOK | STRUMOK | 1 |
Q2563030 [CC | ] | Salsa20 and ChaCha20 | Salsa20 | 1 |
Q4049545 [CC | ] | No label in en! | Sinople | 1 |
Q666421 [CC | ] | Trivium | Trivium (шифр) | 1 |
Q4052549 [CC | ] | Variably Modified Permutation Composition | VMPC | 1 |
Q648266 [CC | ] | Wayback Machine | Wayback Machine | 1 |
Q2142762 [CC | ] | Eli Biham | Бихам, Эли | 1 |
Q83259 [CC | ] | École Normale Supérieure | Высшая нормальная школа (Париж) | 1 |
Q2574238 [CC | ] | Lars Ramkilde Knudsen | Кнудсен, Ларс | 1 |
Q5297 [CC | ] | microprocessor | Микропроцессор | 1 |
Q5967371 [CC | ] | subarctic climate | Субарктический климат | 1 |
Q690265 [CC | ] | lookup table | Таблица поиска | 1 |
Q320624 [CC | ] | Adi Shamir | Шамир, Ади | 1 |
Q82828 [CC | ] | hexadecimal | Шестнадцатеричная система счисления | 1 |