Size of this PNG preview of this SVG file: 128 × 128 pixels. Other resolutions: 240 × 240 pixels | 480 × 480 pixels | 768 × 768 pixels | 1,024 × 1,024 pixels | 2,048 × 2,048 pixels.
Original file (SVG file, nominally 128 × 128 pixels, file size: 2 KB)
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 06:20, 3 March 2020 | 128 × 128 (2 KB) | Losonszki Zoli | Reverted to version as of 10:48, 20 August 2014 (UTC) | |
19:25, 27 May 2017 | 128 × 128 (1 KB) | Ebrahim | update | ||
20:45, 19 May 2017 | 512 × 512 (2 KB) | Ebrahim | update | ||
10:48, 20 August 2014 | 128 × 128 (2 KB) | Ebrahim | VicuñaUploader 1.20 |
File usage
More than 100 pages use this file. The following list shows the first 100 pages that use this file only. A full list is available.
- ABA digital signature guidelines
- Adversary (cryptography)
- Bernstein v. United States
- Brute Force: Cracking the Data Encryption Standard
- CAST-256
- CS-Cipher
- Ciphertext expansion
- Code word (communication)
- Codress message
- Communication Theory of Secrecy Systems
- Concrete security
- Controlled Cryptographic Item
- Cover (telecommunications)
- Cryptanalytic computer
- Crypto (book)
- Crypto API (Linux)
- Cryptographic Message Syntax
- Cryptographic Module Validation Program
- Cryptographie indéchiffrable
- Cryptography newsgroups
- Cryptologia
- Cryptology ePrint Archive
- Cryptosystem
- DEAL
- Data Authentication Algorithm
- Delegated Path Discovery
- Digital Signature Standard
- Distribution ensemble
- Enigmail
- FISH (cipher)
- FORK-256
- Floradora
- Full Domain Hash
- HAS-160
- HAVAL
- HX-63
- IBM 4758
- IDEA NXT
- Initiative for Open Authentication
- Iraqi block cipher
- JADE (cipher machine)
- Java Cryptography Architecture
- Journal of Cryptology
- KCDSA
- KOV-14
- KSD-64
- KY-58
- Key generator
- Key signature (cryptography)
- Key signing party
- Keysigning
- Kiss (cryptanalysis)
- Link encryption
- MMB (cipher)
- Matt Curtin
- Mcrypt
- Message forgery
- Mimic function
- N-hash
- Nonlinear-feedback shift register
- Oakley protocol
- Open Media Commons
- PGPfone
- Passive attack
- Password-based cryptography
- Pike (cipher)
- Pinwheel (cryptography)
- Polyinstantiation
- Product cipher
- Pseudo-Hadamard transform
- Pseudorandom ensemble
- REDOC
- Red/black concept
- Reeds–Sloane algorithm
- Reflector (cipher machine)
- Residual block termination
- Russian copulation
- S-1 block cipher
- SAVILLE
- SEAL (cipher)
- SECG
- SHARK
- SOBER-128
- Schnorr group
- Scramdisk
- Secure Communication based on Quantum Cryptography
- Secure access module
- Security protocol notation
- Small subgroup confinement attack
- Smart cow problem
- Snefru
- Square (cipher)
- Strong RSA assumption
- Torus-based cryptography
- Transmission security
- Turing (cipher)
- VINSON
- WAKE (cipher)
- Zero-knowledge password proof
- Zimmermann–Sassaman key-signing protocol
View more links to this file.
Global file usage
The following other wikis use this file:
- Usage on ar.wikipedia.org
- Usage on he.wikipedia.org
- Usage on ja.wikipedia.org
- Usage on mn.wikipedia.org
- Usage on no.wikipedia.org
- Usage on pt.wikipedia.org
- Cifra
- Criptograma
- MD2
- MD4
- Sistema criptográfico
- RSA Data Security, Inc.
- Predefinição:Esboço-criptografia
- Esteganografia
- 3DES
- Senha
- Encriptação
- Wikipédia:Lista de predefinições/Esboços/Ciências e tecnologia
- Análise de frequência
- Algoritmo de dispersão
- Canal seguro
- Cifra de substituição monoalfabética
- Atbash
- Selo cronológico
- Esteganoanálise
- Java Cryptography Extension
- Autoridade de certificação
- JMF
- PSK (criptografia)
- Tamanho de chave
- Eli Biham
- Adi Shamir
- EFF DES cracker
- RC5
- SAFER
- CAST5
- FEAL
- GOST 28147-89
View more global usage of this file.