This tool looks for unlabeled Wikidata items in your language. It starts with a Wikidata item, looks at all the associated Wikipedia pages, the links on all those pages, and lists the Wikidata items corresponding to the link targets.
Wikidata item
Q
(Example | In the news)
Language code

Q4036876 - DFC


Searching link targets on 2 Wikipedias...

Toggle existing labels
ItemLabel [en]WikilabelsLink #
Q223123 [CC | ]3-Way3-Way | 3-WAY2
Q840633 [CC | ]ARIAARIA (cipher) | ARIA (криптография)2
Q190746 [CC | ]Advanced Encryption StandardAdvanced Encryption Standard | AES (стандарт шифрования)2
Q1053286 [CC | ]Advanced Encryption Standard processAdvanced Encryption Standard process | AES (конкурс)2
Q2326939 [CC | ]AkelarreAkelarre (cipher) | Akelarre2
Q474108 [CC | ]AnubisAnubis (cipher) | Anubis2
Q3635532 [CC | ]BaseKingBaseKing2
Q926394 [CC | ]BassOmaticBassOmatic2
Q543151 [CC | ]block cipherBlock cipher | Блочный шифр2
Q815853 [CC | ]BlowfishBlowfish (cipher) | Blowfish2
Q53735 [CC | ]CAST-128CAST-1282
Q1022875 [CC | ]CAST-256CAST-2562
Q3648747 [CC | ]CIPHERUNICORN-ACIPHERUNICORN-A2
Q3648745 [CC | ]CIPHERUNICORN-ECIPHERUNICORN-E2
Q978814 [CC | ]CLEFIACLEFIA2
Q3648911 [CC | ]CRYPTONCRYPTON2
Q1609474 [CC | ]CS-CipherCS-Cipher2
Q1028476 [CC | ]CamelliaCamellia (cipher) | Camellia (алгоритм)2
Q1589480 [CC | ]ciphertextCiphertext | Шифротекст2
Q946821 [CC | ]Cobra ciphersCobra ciphers | Cobra (шифр)2
Q284899 [CC | ]DEALDEAL2
Q2454245 [CC | ]DES-XDES-X | DESX2
Q135035 [CC | ]Data Encryption StandardData Encryption Standard | DES2
Q82435 [CC | ]Euler's numberE (mathematical constant) | E (число)2
Q3045761 [CC | ]E2E2 (cipher) | E2 (шифр)2
Q141090 [CC | ]encryptionEncryption | Шифрование2
Q1388053 [CC | ]FEALFEAL2
Q3063412 [CC | ]FROGFROG2
Q1044361 [CC | ]Feistel cipherFeistel cipher | Сеть Фейстеля2
Q2507783 [CC | ]GOST 28147-89GOST (block cipher) | ГОСТ 28147-892
Q4039650 [CC | ]Grand CruGrand Cru (cipher) | Grand Cru2
Q4040285 [CC | ]Hasty Pudding cipherHasty Pudding cipher | HPC (шифр)2
Q4040651 [CC | ]HierocryptHierocrypt | Hierocrypt-32
Q848204 [CC | ]International Data Encryption AlgorithmInternational Data Encryption Algorithm | IDEA2
Q1718415 [CC | ]KASUMIKASUMI2
Q1110200 [CC | ]KHAZADKHAZAD2
Q471771 [CC | ]keyKey (cryptography) | Ключ (криптография)2
Q1557574 [CC | ]key sizeKey size | Размер ключа2
Q2329462 [CC | ]Khufu and KhafreKhufu and Khafre | Khufu2
Q21655497 [CC | ]KuznyechikKuznyechik | Кузнечик (шифр)2
Q1648054 [CC | ]LOKI97LOKI972
Q1343482 [CC | ]LuciferLucifer (cipher) | Lucifer (криптография)2
Q1881198 [CC | ]MARSMARS (cipher) | MARS (криптография)2
Q3272892 [CC | ]MESHMESH (cipher) | MESH (шифр)2
Q4043435 [CC | ]MISTY1MISTY12
Q11127451 [CC | ]MacGuffinMacGuffin (cipher) | MacGuffin (шифр)2
Q4045002 [CC | ]NUSHNUSH2
Q17082957 [CC | ]New Data SealNew Data Seal2
Q2735449 [CC | ]NewDESNewDES2
Q4047327 [CC | ]PRESENTPRESENT | Present (шифр)2
Q1349650 [CC | ]RC5RC52
Q1356939 [CC | ]RC6RC62
Q2028197 [CC | ]REDOCREDOC2
Q2601463 [CC | ]SAFERSAFER2
Q3459272 [CC | ]SC2000SC2000 | SC2000 (шифр)2
Q1061548 [CC | ]SEEDSEED2
Q474055 [CC | ]SHACALSHACAL2
Q2658354 [CC | ]SHARKSHARK2
Q1333561 [CC | ]ShangMi 4SM4 (cipher) | SM42
Q1501904 [CC | ]SerpentSerpent (cipher) | Serpent2
Q17084394 [CC | ]SimonSimon (cipher) | Simon (блочный шифр)2
Q1422306 [CC | ]SKIPJACKSkipjack (cipher) | Skipjack2
Q17084934 [CC | ]SpeckSpeck (cipher) | Speck2
Q2755328 [CC | ]SquareSquare (cipher) | SQUARE2
Q864718 [CC | ]stream cipherStream cipher | Потоковый шифр2
Q1433692 [CC | ]substitution–permutation networkSubstitution–permutation network | SP-сеть2
Q327675 [CC | ]symmetric-key algorithmSymmetric-key algorithm | Симметричные криптосистемы2
Q4051445 [CC | ]ThreefishThreefish2
Q2665075 [CC | ]timing attackTiming attack | Атака по времени2
Q1595597 [CC | ]Tiny Encryption AlgorithmTiny Encryption Algorithm | TEA2
Q134983 [CC | ]Triple DESTriple DES2
Q747320 [CC | ]TwofishTwofish2
Q433933 [CC | ]Vincent RijmenVincent Rijmen | Рэймен, Винсент2
Q1384945 [CC | ]XTEAXTEA2
Q4021631 [CC | ]XXTEAXXTEA2
Q17508476 [CC | ]3-Subset Meet-in-the-Middle attack3-subset meet-in-the-middle attack1
Q955164 [CC | ]Acoustic cryptanalysisAcoustic cryptanalysis1
Q60772781 [CC | ]AdiantumAdiantum (cipher)1
Q382497 [CC | ]affine transformationAffine transformation1
Q116757386 [CC | ]AsconAscon (cipher)1
Q15263584 [CC | ]authenticated encryptionAuthenticated encryption1
Q4825885 [CC | ]authentication protocolAuthentication protocol1
Q1208241 [CC | ]avalanche effectAvalanche effect1
Q3631710 [CC | ]BATONBATON1
Q4835404 [CC | ]BEAR and LION ciphersBEAR and LION ciphers1
Q16937479 [CC | ]Biclique attackBiclique attack1
Q4920072 [CC | ]black-bag cryptanalysisBlack-bag cryptanalysis1
Q154021 [CC | ]block cipher mode of operationBlock cipher mode of operation1
Q1053357 [CC | ]block sizeBlock size (cryptography)1
Q2869899 [CC | ]boomerang attackBoomerang attack1
Q869370 [CC | ]brute-force attackBrute-force attack1
Q3648731 [CC | ]CIKS-1CIKS-11
Q3648824 [CC | ]COCONUT98COCONUT981
Q1024309 [CC | ]CRYPTRECCRYPTREC1
Q338574 [CC | ]Cellular Message Encryption AlgorithmCellular Message Encryption Algorithm1
Q1071004 [CC | ]chi-square testChi-squared test1
Q1071695 [CC | ]ChiasmusChiasmus (cipher)1
Q2420767 [CC | ]chosen-ciphertext attackChosen-ciphertext attack1
Q5121273 [CC | ]Cipher security summaryCipher security summary1
Q1224520 [CC | ]confusion and diffusionConfusion and diffusion1
Q3696410 [CC | ]CrabCrab (cipher)1
Q897511 [CC | ]cryptanalysisCryptanalysis1
Q13479982 [CC | ]cryptocurrencyCryptocurrency1
Q477202 [CC | ]cryptographic hash functionCryptographic hash function1
Q1749235 [CC | ]nonceCryptographic nonce1
Q246593 [CC | ]cryptographic primitiveCryptographic primitive1
Q1254335 [CC | ]cryptographic protocolCryptographic protocol1
Q1790389 [CC | ]cryptographically secure pseudo-random number generatorCryptographically secure pseudorandom number generator1
Q8789 [CC | ]cryptographyCryptography1
Q105626027 [CC | ]cryptojacking malwareCryptojacking malware1
Q2930732 [CC | ]Cryptomeria cipherCryptomeria cipher1
Q976521 [CC | ]cryptosystemCryptosystem1
Q3506050 [CC | ]cryptovirologyCryptovirology1
Q2357684 [CC | ]DES supplementary materialDES supplementary material1
Q568825 [CC | ]Davies' attackDavies attack1
Q3984122 [CC | ]Decorrelation theoryDecorrelation theory1
Q1224471 [CC | ]differential cryptanalysisDifferential cryptanalysis1
Q5275344 [CC | ]differential fault analysisDifferential fault analysis1
Q3005749 [CC | ]Differential-linear attackDifferential-linear attack1
Q220849 [CC | ]digital signatureDigital signature1
Q5283008 [CC | ]distinguishing attackDistinguishing attack1
Q2573233 [CC | ]Don CoppersmithDon Coppersmith1
Q2735168 [CC | ]EFF DES crackerEFF DES cracker1
Q25305279 [CC | ]Electromagnetic attackElectromagnetic attack1
Q1340257 [CC | ]end-to-end encryptionEnd-to-end encryption1
Q5425305 [CC | ]FEA-MFEA-M1
Q5436988 [CC | ]Fast Software EncryptionFast Software Encryption1
Q2327219 [CC | ]GDESGDES1
Q5523472 [CC | ]garlic routingGarlic routing1
Q117476494 [CC | ]harvest now, decrypt laterHarvest now, decrypt later1
Q183427 [CC | ]hash functionHash function1
Q11673206 [CC | ]higher-order differential cryptanalysisHigher-order differential cryptanalysis1
Q467928 [CC | ]history of cryptographyHistory of cryptography1
Q1636024 [CC | ]ICEICE (cipher)1
Q1389431 [CC | ]Idea NXTIDEA NXT1
Q3005748 [CC | ]impossible differential cryptanalysisImpossible differential cryptanalysis1
Q3510462 [CC | ]information-theoretic securityInformation-theoretic security1
Q1663550 [CC | ]Initialization vectorInitialization vector1
Q55643093 [CC | ]Insecure channelInsecure channel1
Q3005754 [CC | ]Integral cryptanalysisIntegral cryptanalysis1
Q6043447 [CC | ]Intel Cascade CipherIntel Cascade Cipher1
Q11078257 [CC | ]Interpolation attackInterpolation attack1
Q3801848 [CC | ]Iraqi block cipherIraqi block cipher1
Q93087 [CC | ]Jacques SternJacques Stern1
Q6334123 [CC | ]KN-CipherKN-Cipher1
Q961691 [CC | ]KademliaKademlia1
Q29045264 [CC | ]KalynaKalyna (cipher)1
Q1737729 [CC | ]KeeLoqKeeLoq1
Q3268404 [CC | ]kendall tau rank correlationKendall rank correlation coefficient1
Q3496793 [CC | ]key derivation functionKey derivation function1
Q1414155 [CC | ]key exchange protocolKey exchange1
Q6398160 [CC | ]Key generatorKey generator1
Q2569509 [CC | ]key scheduleKey schedule1
Q6398189 [CC | ]key stretchingKey stretching1
Q743153 [CC | ]key whiteningKey whitening1
Q6397992 [CC | ]Key-based routingKey-based routing1
Q849945 [CC | ]keygenKeygen1
Q1526275 [CC | ]kleptographyKleptography1
Q22678508 [CC | ]known-key distinguishing attackKnown-key distinguishing attack1
Q96416915 [CC | ]LEALEA (cipher)1
Q378566 [CC | ]LOKILOKI1
Q6469303 [CC | ]Ladder-DESLadder-DES1
Q2995268 [CC | ]Lai-Massey schemeLai–Massey scheme1
Q1826463 [CC | ]linear cryptanalysisLinear cryptanalysis1
Q6713909 [CC | ]M6M6 (cipher)1
Q6713956 [CC | ]M8M8 (cipher)1
Q548973 [CC | ]MAGENTAMAGENTA1
Q2894267 [CC | ]MMBMMB (cipher)1
Q3273310 [CC | ]MULTI2MULTI21
Q2075709 [CC | ]MadrygaMadryga1
Q938066 [CC | ]meet-in-the-middle attackMeet-in-the-middle attack1
Q17082481 [CC | ]MercyMercy (cipher)1
Q1052621 [CC | ]message authentication codeMessage authentication code1
Q497516 [CC | ]Mix networkMix network1
Q3005747 [CC | ]Mod n cryptanalysisMod n cryptanalysis1
Q6934537 [CC | ]MultiSwapMultiSwap1
Q1663719 [CC | ]NESSIENESSIE1
Q6954867 [CC | ]NOEKEONNOEKEON1
Q7037633 [CC | ]NimbusNimbus (cipher)1
Q392095 [CC | ]onion routingOnion routing1
Q620009 [CC | ]outline of cryptographyOutline of cryptography1
Q42332 [CC | ]Portable Document FormatPDF1
Q1509884 [CC | ]paddingPadding (cryptography)1
Q7140656 [CC | ]partitioning cryptanalysisPartitioning cryptanalysis1
Q672628 [CC | ]permutation boxPermutation box1
Q3229327 [CC | ]piling-up lemmaPiling-up lemma1
Q1162538 [CC | ]plaintextPlaintext1
Q7233576 [CC | ]post-quantum cryptographyPost-quantum cryptography1
Q218170 [CC | ]PostScriptPostScript1
Q2845210 [CC | ]Power analysisPower analysis1
Q28135258 [CC | ]PrincePrince (cipher)1
Q1053352 [CC | ]Product cipherProduct cipher1
Q852594 [CC | ]provable securityProvable security1
Q910571 [CC | ]pseudorandom noisePseudorandom noise1
Q201339 [CC | ]public-key cryptographyPublic-key cryptography1
Q7265633 [CC | ]QQ (cipher)1
Q471906 [CC | ]quantum cryptographyQuantum cryptography1
Q1027298 [CC | ]quantum key distributionQuantum key distribution1
Q1753382 [CC | ]RC2RC21
Q228206 [CC | ]random number generationRandom number generation1
Q926331 [CC | ]ransomwareRansomware1
Q7759767 [CC | ]The Rebound AttackRebound attack1
Q615772 [CC | ]Red PikeRed Pike (cipher)1
Q515265 [CC | ]related-key attackRelated-key attack1
Q220 [CC | ]RomeRome1
Q7370323 [CC | ]Rotational cryptanalysisRotational cryptanalysis1
Q117336726 [CC | ]RoundRound (cryptography)1
Q2093306 [CC | ]rubber-hose cryptanalysisRubber-hose cryptanalysis1
Q727476 [CC | ]S-1 block cipherS-1 block cipher1
Q748364 [CC | ]substitution boxS-box1
Q2205067 [CC | ]SAVILLESAVILLE1
Q7395234 [CC | ]SXAL/MBALSXAL/MBAL1
Q3304359 [CC | ]Secure channelSecure channel1
Q3478074 [CC | ]Selected Areas in CryptographySelected Areas in Cryptography1
Q3479573 [CC | ]Serge VaudenaySerge Vaudenay1
Q462624 [CC | ]Shared secretShared secret1
Q2267081 [CC | ]side-channel attackSide-channel attack1
Q7540343 [CC | ]Slide attackSlide attack1
Q7575152 [CC | ]Spectr-H64Spectr-H641
Q15032 [CC | ]steganographySteganography1
Q7631517 [CC | ]Subliminal channelSubliminal channel1
Q18394427 [CC | ]Time/memory/data tradeoff attackTime/memory/data tradeoff attack1
Q627620 [CC | ]trapdoor functionTrapdoor function1
Q7839625 [CC | ]TreyferTreyfer1
Q3307263 [CC | ]truncated differential cryptanalysisTruncated differential cryptanalysis1
Q3132224 [CC | ]trusted timestampingTrusted timestamping1
Q7864434 [CC | ]UESUES (cipher)1
Q639408 [CC | ]WaterlooWaterloo, Ontario1
Q513687 [CC | ]weak keyWeak key1
Q7996185 [CC | ]Whitening transformationWhitening transformation1
Q2443442 [CC | ]XSL attackXSL attack1
Q8044864 [CC | ]xmxXmx1
Q8073224 [CC | ]ZodiacZodiac (cipher)1
Q280129 [CC | ]No label in en!A3 (шифр)1
Q783541 [CC | ]A5/1A5 (алгоритм шифрования)1
Q280446 [CC | ]No label in en!A8 (шифр)1
Q3600479 [CC | ]No label in en!ABC (криптография)1
Q4034976 [CC | ]No label in en!BelT1
Q4037123 [CC | ]DECIMDecim1
Q4037294 [CC | ]No label in en!Diamond21
Q4038037 [CC | ]EnRUPTEnRUPT1
Q3736465 [CC | ]F-FCSRF-FCSR1
Q5593489 [CC | ]GrainGrain1
Q660919 [CC | ]HC-256HC-2561
Q21652109 [CC | ]No label in en!Hierocrypt-L11
Q17990776 [CC | ]KCipher-2KCipher-21
Q21844922 [CC | ]No label in en!Khafre1
Q3841332 [CC | ]MICKEYMICKEY1
Q4043510 [CC | ]MUGIMUGI1
Q4046203 [CC | ]PikePIKE1
Q3901296 [CC | ]PhelixPhelix1
Q846955 [CC | ]RC4RC41
Q4047895 [CC | ]No label in en!RTEA1
Q492162 [CC | ]RabbitRabbit1
Q4047975 [CC | ]No label in en!Raiden (алгоритм)1
Q4047981 [CC | ]No label in en!Rainbow (алгоритм)1
Q474401 [CC | ]SEALSEAL (криптографический алгоритм)1
Q339387 [CC | ]SIMDSIMD1
Q3943791 [CC | ]SNOWSNOW (шифр)1
Q3943814 [CC | ]SOSEMANUKSOSEMANUK1
Q97198827 [CC | ]STRUMOKSTRUMOK1
Q2563030 [CC | ]Salsa20 and ChaCha20Salsa201
Q4049545 [CC | ]No label in en!Sinople1
Q666421 [CC | ]TriviumTrivium (шифр)1
Q4052549 [CC | ]Variably Modified Permutation CompositionVMPC1
Q648266 [CC | ]Wayback MachineWayback Machine1
Q2142762 [CC | ]Eli BihamБихам, Эли1
Q83259 [CC | ]École Normale SupérieureВысшая нормальная школа (Париж)1
Q2574238 [CC | ]Lars Ramkilde KnudsenКнудсен, Ларс1
Q5297 [CC | ]microprocessorМикропроцессор1
Q5967371 [CC | ]subarctic climateСубарктический климат1
Q690265 [CC | ]lookup tableТаблица поиска1
Q320624 [CC | ]Adi ShamirШамир, Ади1
Q82828 [CC | ]hexadecimalШестнадцатеричная система счисления1