File:Emoji u1f510.svg
From Wikipedia, the free encyclopedia
Size of this preview: 128 × 128 pixels. Other resolutions: 240 × 240 pixels | 480 × 480 pixels | 600 × 600 pixels | 768 × 768 pixels | 1,024 × 1,024 pixels.
Original file (SVG file, nominally 128 × 128 pixels, file size: 2 KB)
File history
Click on a date/time to view the file as it appeared at that time.
| Date/Time | Thumbnail | Dimensions | User | Comment | |
|---|---|---|---|---|---|
| current | 10:48, 20 August 2014 | 128 × 128 (2 KB) | Ebraminio | VicuñaUploader 1.20 |
File usage
More than 100 pages link to this file. The following list shows the first 100 page links to this file only. A full list is available.
- A5/2
- ABA digital signature guidelines
- Adversary (cryptography)
- Akelarre (cipher)
- Assassination market
- BATON
- Blind credential
- CAST-256
- Cipherspace
- Codress message
- Communication Theory of Secrecy Systems
- Computational indistinguishability
- Confusion and diffusion
- Cover (telecommunications)
- Cryptanalytic computer
- Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
- Cryptographic Message Syntax
- Cryptographic Module Validation Program
- Cryptographie indéchiffrable
- Cryptography newsgroups
- Cryptologia
- Cryptology ePrint Archive
- Cryptosystem
- DEAL
- Datagram Transport Layer Security
- Delegated Path Discovery
- Delegated Path Validation
- ECRYPT
- Enigmail
- FISH (cipher)
- Floradora
- GDES
- GMR (cryptography)
- Gardening (cryptanalysis)
- HAS-160
- HAVAL
- HX-63
- IBM 4758
- International Association for Cryptologic Research
- Iraqi block cipher
- JADE (cypher machine)
- Java Cryptography Architecture
- Journal of Cryptology
- KCDSA
- KOV-14
- KSD-64
- KY-57
- Key generation
- Key generator
- Key signature (cryptography)
- Key signing party
- Keysigning
- Link encryption
- MMB
- Message forgery
- N-Hash
- NSA Suite B Cryptography
- Null cipher
- On-the-fly encryption
- One-key MAC
- Otway–Rees protocol
- Passive attack
- Pike (cipher)
- Pinwheel (cryptography)
- Polyinstantiation
- Preimage attack
- Probabilistic encryption
- Product cipher
- Pseudo-Hadamard transform
- REDOC
- Random function
- Red/black concept
- Reeds–Sloane algorithm
- Reihenschieber
- Russian copulation
- SAVILLE
- SEAL (cipher)
- SECG
- SHARK
- SOBER-128
- Schnorr group
- Secure Communication based on Quantum Cryptography
- Security protocol notation
- Self-certifying key
- Self-signed certificate
- Snefru
- Square (cipher)
- Strong RSA assumption
- Torus-based cryptography
- Transmission security
- Trigram
- Turing (cipher)
- Type 1 product
- Type 2 product
- Type 3 product
- Type 4 product
- VINSON
- WAKE (cipher)
- Yarrow algorithm
- Zimmermann–Sassaman key-signing protocol
Global file usage
The following other wikis use this file:
- Usage on tl.wikipedia.org