This tool looks for unlabeled Wikidata items in your language. It starts with a Wikidata item,
looks at all the associated Wikipedia pages, the links on all those pages, and lists the Wikidata items corresponding to the link targets.
Q53735 - CAST-128
Searching link targets on 12 Wikipedias...
Item | Label [en] | Wikilabels | Link # |
---|---|---|---|
Q190746 [CC | ] | Advanced Encryption Standard | Advanced Encryption Standard | AES (стандарт шифрования) | AES | 11 |
Q1022875 [CC | ] | CAST-256 | CAST-256 | 9 |
Q8789 [CC | ] | cryptography | Криптография | Cryptography | Criptografía | رمزنگاری | Crittografia | 暗号理論 | Criptografia | Kryptologia | Криптографія | 9 |
Q135035 [CC | ] | Data Encryption Standard | Data Encryption Standard | DES | 8 |
Q1227452 [CC | ] | Pretty Good Privacy | Pretty Good Privacy | PGP | 8 |
Q1044361 [CC | ] | Feistel cipher | Сеть Фейстеля | Xarxa de Feistel | Feistelchiffre | Feistel cipher | Réseau de Feistel | Rete di Feistel | Feistel構造 | Feistel-salaus | 8 |
Q815853 [CC | ] | Blowfish | Blowfish | Blowfish (cipher) | 7 |
Q848204 [CC | ] | International Data Encryption Algorithm | International Data Encryption Algorithm | IDEA | 7 |
Q1349650 [CC | ] | RC5 | RC5 | RC5 (chiffrement) | 7 |
Q747320 [CC | ] | Twofish | Twofish | 7 |
Q223204 [CC | ] | GNU Privacy Guard | GNU Privacy Guard | 7 |
Q2454245 [CC | ] | DES-X | DES-X | DESX | 6 |
Q1388053 [CC | ] | FEAL | FEAL | 6 |
Q1356939 [CC | ] | RC6 | RC6 | 6 |
Q1501904 [CC | ] | Serpent | Serpent | Serpent (cipher) | Serpent (cryptographie) | Serpent (cifrario) | Serpent (暗号) | 6 |
Q134983 [CC | ] | Triple DES | Triple DES | トリプルDES | 3DES | 6 |
Q253623 [CC | ] | patent | Patent | Patente | ثبت اختراع | Brevetto | 特許 | 6 |
Q543151 [CC | ] | block cipher | Block cipher | Cifrado por bloques | Chiffrement par bloc | Cifratura a blocchi | ブロック暗号 | Cifra de bloco | 6 |
Q840633 [CC | ] | ARIA | ARIA (криптография) | ARIA (cipher) | ARIA (algorithme) | ARIA (cifrario) | ARIA (暗号) | 5 |
Q1028476 [CC | ] | Camellia | Camellia (алгоритм) | Camellia (cipher) | Camellia (algorithme) | Camellia (cifrario) | Camellia | 5 |
Q284899 [CC | ] | DEAL | DEAL | DEAL (cryptologie) | 5 |
Q1718415 [CC | ] | KASUMI | KASUMI | 5 |
Q1343482 [CC | ] | Lucifer | Lucifer (криптография) | Lucifer (cipher) | Lucifer (cryptographie) | Lucifer (cifrario) | Lucifer (暗号) | 5 |
Q1881198 [CC | ] | MARS | MARS (криптография) | MARS (cipher) | MARS (cryptographie) | MARS (cifrario) | MARS (criptografia) | 5 |
Q2601463 [CC | ] | SAFER | SAFER | SAFER (cryptographie) | 5 |
Q1061548 [CC | ] | SEED | SEED | SEED (cifrario) | SEED (暗号) | 5 |
Q1433692 [CC | ] | substitution–permutation network | SP-сеть | Substitution–permutation network | Réseau de substitution-permutation | Rete a sostituzione e permutazione | SPN構造 | 5 |
Q2755328 [CC | ] | Square | SQUARE | Square (cipher) | Square (cryptographie) | Square (cifrario) | Square (暗号) | 5 |
Q1422306 [CC | ] | SKIPJACK | Skipjack | Skipjack (cipher) | Skipjack (cryptographie) | スキップジャック (暗号) | 5 |
Q2070 [CC | ] | 1996 | 1996 | 1996年 | 5 |
Q8366 [CC | ] | algorithm | Algorisme | Algorithmus | Algoritmo | الگوریتم | アルゴリズム | 5 |
Q8805 [CC | ] | bit | Bit | 5 |
Q368328 [CC | ] | Bruce Schneier | Bruce Schneier | 5 |
Q748364 [CC | ] | substitution box | S-Box | Caixes-S | S-box | 5 |
Q897511 [CC | ] | cryptanalysis | Criptoanàlisi | Cryptanalysis | Cryptanalyse | 暗号解読 | Criptoanálise | 5 |
Q1663550 [CC | ] | Initialization vector | Initialization vector | Vecteur d'initialisation | Vettore di inizializzazione | 初期化ベクトル | Vetor de inicialização | 5 |
Q223123 [CC | ] | 3-Way | 3-Way | 3-WAY | 3-Way (cifrario) | 4 |
Q2326939 [CC | ] | Akelarre | Akelarre | Akelarre (cipher) | Akelarre (cryptographie) | Akelarre (cifrario) | 4 |
Q1609474 [CC | ] | CS-Cipher | CS-Cipher | 4 |
Q3063412 [CC | ] | FROG | FROG | 4 |
Q1110200 [CC | ] | KHAZAD | KHAZAD | 4 |
Q2329462 [CC | ] | Khufu and Khafre | Khufu | Khufu and Khafre | Khufu et Khafre | Khufu e Khafre | 4 |
Q1648054 [CC | ] | LOKI97 | LOKI97 | 4 |
Q4043435 [CC | ] | MISTY1 | MISTY1 | Misty1 | 4 |
Q11127451 [CC | ] | MacGuffin | MacGuffin (шифр) | MacGuffin (cipher) | MacGuffin (cryptologie) | MacGuffin (cifrario) | 4 |
Q2735449 [CC | ] | NewDES | NewDES | 4 |
Q2658354 [CC | ] | SHARK | SHARK | 4 |
Q1595597 [CC | ] | Tiny Encryption Algorithm | Tiny Encryption Algorithm | TEA | 4 |
Q1384945 [CC | ] | XTEA | XTEA | 4 |
Q2507783 [CC | ] | GOST 28147-89 | ГОСТ 28147-89 | GOST (block cipher) | GOST 28147-89 | GOST (cifrario) | 4 |
Q327675 [CC | ] | symmetric-key algorithm | Симметричные криптосистемы | Symmetric-key algorithm | 共通鍵暗号 | Symmetrinen salaus | 4 |
Q16 [CC | ] | Canada | Canada | Canadà | Canadá | 4 |
Q1053357 [CC | ] | block size | Mida del bloc | Block size (cryptography) | Taille de bloc (cryptographie) | Dimensione del blocco | 4 |
Q471771 [CC | ] | key | Schlüssel (Kryptologie) | Key (cryptography) | Clé de chiffrement | 鍵 (暗号) | 4 |
Q154021 [CC | ] | block cipher mode of operation | Block cipher mode of operation | Mode d'opération (cryptographie) | Modalità di funzionamento dei cifrari a blocchi | 暗号利用モード | 4 |
Q869370 [CC | ] | brute-force attack | Brute-force attack | Attaque par force brute | 総当たり攻撃 | Ataque de força bruta | 4 |
Q141090 [CC | ] | encryption | Encryption | رمزگذاری | 暗号 | Salaus | 4 |
Q2327219 [CC | ] | GDES | GDES | G-DES | 4 |
Q1753382 [CC | ] | RC2 | RC2 | 4 |
Q474108 [CC | ] | Anubis | Anubis | Anubis (cipher) | Anubis (cifrario) | 3 |
Q3635532 [CC | ] | BaseKing | BaseKing | 3 |
Q926394 [CC | ] | BassOmatic | BassOmatic | 3 |
Q3648747 [CC | ] | CIPHERUNICORN-A | CIPHERUNICORN-A | 3 |
Q3648745 [CC | ] | CIPHERUNICORN-E | CIPHERUNICORN-E | 3 |
Q978814 [CC | ] | CLEFIA | CLEFIA | 3 |
Q3648911 [CC | ] | CRYPTON | CRYPTON | 3 |
Q946821 [CC | ] | Cobra ciphers | Cobra (шифр) | Cobra ciphers | Cobra (cifrario) | 3 |
Q3045761 [CC | ] | E2 | E2 (шифр) | E2 (cipher) | E2 (algorithme) | 3 |
Q3272892 [CC | ] | MESH | MESH (шифр) | MESH (cipher) | MESH (cryptographie) | 3 |
Q2028197 [CC | ] | REDOC | REDOC | 3 |
Q3459272 [CC | ] | SC2000 | SC2000 | SC2000 (шифр) | 3 |
Q474055 [CC | ] | SHACAL | SHACAL | Shacal | 3 |
Q4021631 [CC | ] | XXTEA | XXTEA | 3 |
Q864718 [CC | ] | stream cipher | Потоковый шифр | Stream cipher | ストリーム暗号 | 3 |
Q1557574 [CC | ] | key size | Размер ключа | Key size | Dimensione della chiave | 3 |
Q1053286 [CC | ] | Advanced Encryption Standard process | Advanced Encryption Standard process | Processo di standardizzazione dell'Advanced Encryption Standard | 3 |
Q4890350 [CC | ] | bent function | Bent function | Fonction courbe | Бент-функція | 3 |
Q1024309 [CC | ] | CRYPTREC | CRYPTREC | Cryptography Research and Evaluation Committee | 3 |
Q338574 [CC | ] | Cellular Message Encryption Algorithm | Cellular Message Encryption Algorithm | CMEA (cryptographie) | 3 |
Q477202 [CC | ] | cryptographic hash function | Cryptographic hash function | 暗号学的ハッシュ関数 | Kryptografinen tiiviste | 3 |
Q2930732 [CC | ] | Cryptomeria cipher | Cryptomeria cipher | C2 (cryptographie) | C2 (cifrario) | 3 |
Q1224471 [CC | ] | differential cryptanalysis | Differential cryptanalysis | Cryptanalyse différentielle | 差分解読法 | 3 |
Q1389431 [CC | ] | Idea NXT | IDEA NXT | FOX (cryptographie) | 3 |
Q2569509 [CC | ] | key schedule | Key schedule | Gestore della chiave | 3 |
Q378566 [CC | ] | LOKI | LOKI | LOKI89/91 | 3 |
Q1826463 [CC | ] | linear cryptanalysis | Linear cryptanalysis | Cryptanalyse linéaire | 線形解読法 | 3 |
Q548973 [CC | ] | MAGENTA | MAGENTA | 3 |
Q2894267 [CC | ] | MMB | MMB (cipher) | MMB (cryptographie) | Modular Multiplication-based Block | 3 |
Q3273310 [CC | ] | MULTI2 | MULTI2 | 3 |
Q319400 [CC | ] | modular arithmetic | Modular arithmetic | Aritmética modular | Aritmetica modulare | 3 |
Q1663719 [CC | ] | NESSIE | NESSIE | Projet Nessie | 3 |
Q1053352 [CC | ] | Product cipher | Product cipher | Chiffrement par produit | Cifrario del prodotto | 3 |
Q201339 [CC | ] | public-key cryptography | Public-key cryptography | 公開鍵暗号 | Julkisen avaimen salaus | 3 |
Q515265 [CC | ] | related-key attack | Related-key attack | 関連鍵攻撃 | Ataque de chave relacionada | 3 |
Q727476 [CC | ] | S-1 block cipher | S-1 block cipher | S-1 (chiffrement) | S-1 | 3 |
Q3496350 [CC | ] | Stafford Emanuel Tavares | Stafford Tavares | 3 |
Q3600479 [CC | ] | No label in en! | ABC (криптография) | ABC (cifrario) | 2 |
Q4036876 [CC | ] | DFC | DFC | DFC (cipher) | 2 |
Q4039650 [CC | ] | Grand Cru | Grand Cru | Grand Cru (cipher) | 2 |
Q4040285 [CC | ] | Hasty Pudding cipher | HPC (шифр) | Hasty Pudding cipher | 2 |
Q4040651 [CC | ] | Hierocrypt | Hierocrypt-3 | Hierocrypt | 2 |
Q4045002 [CC | ] | NUSH | NUSH | 2 |
Q17082957 [CC | ] | New Data Seal | New Data Seal | 2 |
Q4047327 [CC | ] | PRESENT | Present (шифр) | PRESENT | 2 |
Q846955 [CC | ] | RC4 | RC4 | 2 |
Q1333561 [CC | ] | ShangMi 4 | SM4 | SM4 (cipher) | 2 |
Q2563030 [CC | ] | Salsa20 and ChaCha20 | Salsa20 | 2 |
Q17084394 [CC | ] | Simon | Simon (блочный шифр) | Simon (cipher) | 2 |
Q17084934 [CC | ] | Speck | Speck | Speck (cipher) | 2 |
Q4051445 [CC | ] | Threefish | Threefish | 2 |
Q21655497 [CC | ] | Kuznyechik | Кузнечик (шифр) | Kuznyechik | 2 |
Q15263584 [CC | ] | authenticated encryption | Authenticated encryption | 認証付き暗号 | 2 |
Q1208241 [CC | ] | avalanche effect | Avalanche effect | Effet avalanche | 2 |
Q3631710 [CC | ] | BATON | BATON | 2 |
Q2869899 [CC | ] | boomerang attack | Boomerang attack | Ataque bumerangue | 2 |
Q3648731 [CC | ] | CIKS-1 | CIKS-1 | 2 |
Q3648824 [CC | ] | COCONUT98 | COCONUT98 | 2 |
Q2939134 [CC | ] | Carlisle M. Adams | Carlisle Adams | 2 |
Q3696410 [CC | ] | Crab | Crab (cipher) | Crab (cifrario) | 2 |
Q1254335 [CC | ] | cryptographic protocol | Cryptographic protocol | Salausprotokolla | 2 |
Q1790389 [CC | ] | cryptographically secure pseudo-random number generator | Cryptographically secure pseudorandom number generator | 暗号論的擬似乱数生成器 | 2 |
Q2735168 [CC | ] | EFF DES cracker | EFF DES cracker | 2 |
Q422404 [CC | ] | Government of Canada | Government of Canada | دولت کانادا | 2 |
Q11673206 [CC | ] | higher-order differential cryptanalysis | Higher-order differential cryptanalysis | 高階差分解読法 | 2 |
Q467928 [CC | ] | history of cryptography | History of cryptography | 暗号史 | 2 |
Q1636024 [CC | ] | ICE | ICE (cipher) | ICE (cryptographie) | 2 |
Q3801848 [CC | ] | Iraqi block cipher | Iraqi block cipher | 2 |
Q29045264 [CC | ] | Kalyna | Kalyna (cipher) | Kalyna (cifrario) | 2 |
Q743153 [CC | ] | key whitening | Key whitening | 2 |
Q2995268 [CC | ] | Lai-Massey scheme | Lai–Massey scheme | Construction de Lai-Massey | 2 |
Q2075709 [CC | ] | Madryga | Madryga | 2 |
Q938066 [CC | ] | meet-in-the-middle attack | Meet-in-the-middle attack | 中間一致攻撃 | 2 |
Q1052621 [CC | ] | message authentication code | Message authentication code | Viestin todennuskoodi | 2 |
Q3005747 [CC | ] | Mod n cryptanalysis | Mod n cryptanalysis | Cryptanalyse Mod n | 2 |
Q3229327 [CC | ] | piling-up lemma | Piling-up lemma | Lemme d'empilement | 2 |
Q1162538 [CC | ] | plaintext | Plaintext | متن آشکار | 2 |
Q615772 [CC | ] | Red Pike | Red Pike (cipher) | Red Pike | 2 |
Q15032 [CC | ] | steganography | Steganography | ステガノグラフィー | 2 |
Q3307263 [CC | ] | truncated differential cryptanalysis | Truncated differential cryptanalysis | 切詰差分解読法 | 2 |
Q513687 [CC | ] | weak key | Weak key | Clé faible | 2 |
Q2443442 [CC | ] | XSL attack | XSL attack | Attaque XSL | 2 |
Q1479654 [CC | ] | Wiley | John Wiley & Sons | 2 |
Q212971 [CC | ] | Request for Comments | Request for comments | Request for Comments | 2 |
Q280129 [CC | ] | No label in en! | A3 (шифр) | 1 |
Q783541 [CC | ] | A5/1 | A5 (алгоритм шифрования) | 1 |
Q280446 [CC | ] | No label in en! | A8 (шифр) | 1 |
Q4034976 [CC | ] | No label in en! | BelT | 1 |
Q4035570 [CC | ] | CAST | CAST | 1 |
Q4037123 [CC | ] | DECIM | Decim | 1 |
Q4037294 [CC | ] | No label in en! | Diamond2 | 1 |
Q4038037 [CC | ] | EnRUPT | EnRUPT | 1 |
Q3736465 [CC | ] | F-FCSR | F-FCSR | 1 |
Q5593489 [CC | ] | Grain | Grain | 1 |
Q660919 [CC | ] | HC-256 | HC-256 | 1 |
Q21652109 [CC | ] | No label in en! | Hierocrypt-L1 | 1 |
Q17990776 [CC | ] | KCipher-2 | KCipher-2 | 1 |
Q21844922 [CC | ] | No label in en! | Khafre | 1 |
Q3841332 [CC | ] | MICKEY | MICKEY | 1 |
Q4043510 [CC | ] | MUGI | MUGI | 1 |
Q4046203 [CC | ] | Pike | PIKE | 1 |
Q3901296 [CC | ] | Phelix | Phelix | 1 |
Q4047895 [CC | ] | No label in en! | RTEA | 1 |
Q492162 [CC | ] | Rabbit | Rabbit | 1 |
Q4047975 [CC | ] | No label in en! | Raiden (алгоритм) | 1 |
Q4047981 [CC | ] | No label in en! | Rainbow (алгоритм) | 1 |
Q474401 [CC | ] | SEAL | SEAL (криптографический алгоритм) | 1 |
Q3943791 [CC | ] | SNOW | SNOW (шифр) | 1 |
Q3943814 [CC | ] | SOSEMANUK | SOSEMANUK | 1 |
Q97198827 [CC | ] | STRUMOK | STRUMOK | 1 |
Q4049545 [CC | ] | No label in en! | Sinople | 1 |
Q666421 [CC | ] | Trivium | Trivium (шифр) | 1 |
Q4052549 [CC | ] | Variably Modified Permutation Composition | VMPC | 1 |
Q648266 [CC | ] | Wayback Machine | Wayback Machine | 1 |
Q347066 [CC | ] | real-time | Echtzeit | 1 |
Q461 [CC | ] | Internet Archive | Internet Archive | 1 |
Q2062069 [CC | ] | web archiving | Web-Archivierung | 1 |
Q17508476 [CC | ] | 3-Subset Meet-in-the-Middle attack | 3-subset meet-in-the-middle attack | 1 |
Q955164 [CC | ] | Acoustic cryptanalysis | Acoustic cryptanalysis | 1 |
Q60772781 [CC | ] | Adiantum | Adiantum (cipher) | 1 |
Q116757386 [CC | ] | Ascon | Ascon (cipher) | 1 |
Q4825885 [CC | ] | authentication protocol | Authentication protocol | 1 |
Q4835404 [CC | ] | BEAR and LION ciphers | BEAR and LION ciphers | 1 |
Q16937479 [CC | ] | Biclique attack | Biclique attack | 1 |
Q4920072 [CC | ] | black-bag cryptanalysis | Black-bag cryptanalysis | 1 |
Q361466 [CC | ] | CERN Axion Solar Telescope | CERN Axion Solar Telescope | 1 |
Q1071004 [CC | ] | chi-square test | Chi-squared test | 1 |
Q1071695 [CC | ] | Chiasmus | Chiasmus (cipher) | 1 |
Q4681865 [CC | ] | cipher | Cipher | 1 |
Q5121273 [CC | ] | Cipher security summary | Cipher security summary | 1 |
Q1589480 [CC | ] | ciphertext | Ciphertext | 1 |
Q597935 [CC | ] | Communications Security Establishment Canada | Communications Security Establishment | 1 |
Q1224520 [CC | ] | confusion and diffusion | Confusion and diffusion | 1 |
Q13479982 [CC | ] | cryptocurrency | Cryptocurrency | 1 |
Q1749235 [CC | ] | nonce | Cryptographic nonce | 1 |
Q246593 [CC | ] | cryptographic primitive | Cryptographic primitive | 1 |
Q105626027 [CC | ] | cryptojacking malware | Cryptojacking malware | 1 |
Q976521 [CC | ] | cryptosystem | Cryptosystem | 1 |
Q3506050 [CC | ] | cryptovirology | Cryptovirology | 1 |
Q2357684 [CC | ] | DES supplementary material | DES supplementary material | 1 |
Q568825 [CC | ] | Davies' attack | Davies attack | 1 |
Q5275344 [CC | ] | differential fault analysis | Differential fault analysis | 1 |
Q3005749 [CC | ] | Differential-linear attack | Differential-linear attack | 1 |
Q220849 [CC | ] | digital signature | Digital signature | 1 |
Q5283008 [CC | ] | distinguishing attack | Distinguishing attack | 1 |
Q25305279 [CC | ] | Electromagnetic attack | Electromagnetic attack | 1 |
Q1340257 [CC | ] | end-to-end encryption | End-to-end encryption | 1 |
Q5380812 [CC | ] | Entrust | Entrust | 1 |
Q5425305 [CC | ] | FEA-M | FEA-M | 1 |
Q5523472 [CC | ] | garlic routing | Garlic routing | 1 |
Q117476494 [CC | ] | harvest now, decrypt later | Harvest now, decrypt later | 1 |
Q183427 [CC | ] | hash function | Hash function | 1 |
Q3005748 [CC | ] | impossible differential cryptanalysis | Impossible differential cryptanalysis | 1 |
Q3510462 [CC | ] | information-theoretic security | Information-theoretic security | 1 |
Q55643093 [CC | ] | Insecure channel | Insecure channel | 1 |
Q3005754 [CC | ] | Integral cryptanalysis | Integral cryptanalysis | 1 |
Q6043447 [CC | ] | Intel Cascade Cipher | Intel Cascade Cipher | 1 |
Q11078257 [CC | ] | Interpolation attack | Interpolation attack | 1 |
Q6334123 [CC | ] | KN-Cipher | KN-Cipher | 1 |
Q961691 [CC | ] | Kademlia | Kademlia | 1 |
Q1737729 [CC | ] | KeeLoq | KeeLoq | 1 |
Q3268404 [CC | ] | kendall tau rank correlation | Kendall rank correlation coefficient | 1 |
Q3496793 [CC | ] | key derivation function | Key derivation function | 1 |
Q1414155 [CC | ] | key exchange protocol | Key exchange | 1 |
Q6398160 [CC | ] | Key generator | Key generator | 1 |
Q6398189 [CC | ] | key stretching | Key stretching | 1 |
Q6397992 [CC | ] | Key-based routing | Key-based routing | 1 |
Q849945 [CC | ] | keygen | Keygen | 1 |
Q1526275 [CC | ] | kleptography | Kleptography | 1 |
Q22678508 [CC | ] | known-key distinguishing attack | Known-key distinguishing attack | 1 |
Q96416915 [CC | ] | LEA | LEA (cipher) | 1 |
Q6469303 [CC | ] | Ladder-DES | Ladder-DES | 1 |
Q6713909 [CC | ] | M6 | M6 (cipher) | 1 |
Q6713956 [CC | ] | M8 | M8 (cipher) | 1 |
Q17082481 [CC | ] | Mercy | Mercy (cipher) | 1 |
Q497516 [CC | ] | Mix network | Mix network | 1 |
Q6934537 [CC | ] | MultiSwap | MultiSwap | 1 |
Q6954867 [CC | ] | NOEKEON | NOEKEON | 1 |
Q7037633 [CC | ] | Nimbus | Nimbus (cipher) | 1 |
Q392095 [CC | ] | onion routing | Onion routing | 1 |
Q620009 [CC | ] | outline of cryptography | Outline of cryptography | 1 |
Q1509884 [CC | ] | padding | Padding (cryptography) | 1 |
Q7140656 [CC | ] | partitioning cryptanalysis | Partitioning cryptanalysis | 1 |
Q672628 [CC | ] | permutation box | Permutation box | 1 |
Q7233576 [CC | ] | post-quantum cryptography | Post-quantum cryptography | 1 |
Q2845210 [CC | ] | Power analysis | Power analysis | 1 |
Q28135258 [CC | ] | Prince | Prince (cipher) | 1 |
Q910571 [CC | ] | pseudorandom noise | Pseudorandom noise | 1 |
Q7265633 [CC | ] | Q | Q (cipher) | 1 |
Q471906 [CC | ] | quantum cryptography | Quantum cryptography | 1 |
Q1027298 [CC | ] | quantum key distribution | Quantum key distribution | 1 |
Q228206 [CC | ] | random number generation | Random number generation | 1 |
Q926331 [CC | ] | ransomware | Ransomware | 1 |
Q7759767 [CC | ] | The Rebound Attack | Rebound attack | 1 |
Q7370323 [CC | ] | Rotational cryptanalysis | Rotational cryptanalysis | 1 |
Q117336726 [CC | ] | Round | Round (cryptography) | 1 |
Q1866665 [CC | ] | royalty-free | Royalty-free | 1 |
Q2093306 [CC | ] | rubber-hose cryptanalysis | Rubber-hose cryptanalysis | 1 |
Q2205067 [CC | ] | SAVILLE | SAVILLE | 1 |
Q7395234 [CC | ] | SXAL/MBAL | SXAL/MBAL | 1 |
Q3304359 [CC | ] | Secure channel | Secure channel | 1 |
Q462624 [CC | ] | Shared secret | Shared secret | 1 |
Q2267081 [CC | ] | side-channel attack | Side-channel attack | 1 |
Q7540343 [CC | ] | Slide attack | Slide attack | 1 |
Q7575152 [CC | ] | Spectr-H64 | Spectr-H64 | 1 |
Q7631517 [CC | ] | Subliminal channel | Subliminal channel | 1 |
Q18394427 [CC | ] | Time/memory/data tradeoff attack | Time/memory/data tradeoff attack | 1 |
Q2665075 [CC | ] | timing attack | Timing attack | 1 |
Q627620 [CC | ] | trapdoor function | Trapdoor function | 1 |
Q7839625 [CC | ] | Treyfer | Treyfer | 1 |
Q3132224 [CC | ] | trusted timestamping | Trusted timestamping | 1 |
Q7864434 [CC | ] | UES | UES (cipher) | 1 |
Q7996185 [CC | ] | Whitening transformation | Whitening transformation | 1 |
Q8044864 [CC | ] | xmx | Xmx | 1 |
Q8073224 [CC | ] | Zodiac | Zodiac (cipher) | 1 |
Q270159 [CC | ] | 8-bit computing | 8 bits | 1 |
Q118455746 [CC | ] | authority control | Control de autoridades | 1 |
Q234829 [CC | ] | GPG | GPG | 1 |
Q28500947 [CC | ] | binary logic | Lógica binaria | 1 |
Q2013 [CC | ] | Wikidata | Wikidata | 1 |
Q40754 [CC | ] | subtraction | تفریق | 1 |
Q1860 [CC | ] | English | زبان انگلیسی | 1 |
Q328 [CC | ] | English Wikipedia | ویکیپدیای انگلیسی | 1 |
Q365229 [CC | ] | Cast | Cast | 1 |
Q33057 [CC | ] | International Standard Book Number | International Standard Book Number | 1 |
Q637416 [CC | ] | codebook | Livre-code | 1 |
Q20293166 [CC | ] | Rijndael | Rijndael | 1 |
Q97278616 [CC | ] | No label in en! | Skinny (chiffrement) | 1 |
Q2088 [CC | ] | 1997 | 1997 | 1 |
Q101244 [CC | ] | acronym | Acronimo | 1 |
Q3631791 [CC | ] | No label in en! | BEAR e LION | 1 |
Q884718 [CC | ] | block diagram | Diagramma a blocchi | 1 |
Q498186 [CC | ] | exclusive or | Disgiunzione esclusiva | 1 |
Q11224332 [CC | ] | ISO/IEC 18033 | ISO/IEC 18033 | 1 |
Q1052790 [CC | ] | OpenSSL | OpenSSL | 1 |
Q68 [CC | ] | computer | コンピュータ | 1 |
Q1139146 [CC | ] | rainbow table | レインボーテーブル | 1 |
Q15028 [CC | ] | International Organization for Standardization | 国際標準化機構 | 1 |
Q193858 [CC | ] | International Electrotechnical Commission | 国際電気標準会議 | 1 |
Q15279482 [CC | ] | BLAKE | BLAKE (tiivistealgoritmi) | 1 |
Q856069 [CC | ] | CCMP | CCMP | 1 |
Q1224829 [CC | ] | Digital Signature Algorithm | DSA | 1 |
Q623447 [CC | ] | Diffie–Hellman key exchange | Diffie–Hellman | 1 |
Q1162410 [CC | ] | ElGamal encryption | ElGamal | 1 |
Q1048911 [CC | ] | elliptic curve cryptography | Elliptisten käyrien salausmenetelmät | 1 |
Q217082 [CC | ] | Internet Engineering Task Force | IETF | 1 |
Q185235 [CC | ] | MD5 | MD5 | 1 |
Q181551 [CC | ] | RSA | RSA | 1 |
Q387688 [CC | ] | SHA hash functions | SHA | 1 |
Q1190947 [CC | ] | SHA-3 | SHA-3 | 1 |
Q7525546 [CC | ] | SipHash | SipHash | 1 |
Q908608 [CC | ] | Temporal Key Integrity Protocol | TKIP | 1 |
Q206494 [CC | ] | Transport Layer Security | TLS | 1 |
Q11661 [CC | ] | information technology | Tietotekniikka | 1 |
Q273673 [CC | ] | Wired Equivalent Privacy | WEP | 1 |
Q272165 [CC | ] | Wi-Fi Protected Access | WPA (salausprotokolla) | 1 |
Q1065865 [CC | ] | X.509 | X.509 | 1 |
Q75687 [CC | ] | Mac | Macintosh | 1 |