File:Emoji u1f510.svg
Jump to navigation
Jump to search
Size of this PNG preview of this SVG file: 128 × 128 pixels. Other resolutions: 240 × 240 pixels | 480 × 480 pixels | 768 × 768 pixels | 1,024 × 1,024 pixels | 2,048 × 2,048 pixels.
Original file (SVG file, nominally 128 × 128 pixels, file size: 2 KB)
File history
Click on a date/time to view the file as it appeared at that time.
| Date/Time | Thumbnail | Dimensions | User | Comment | |
|---|---|---|---|---|---|
| current | 06:20, 3 March 2020 | 128 × 128 (2 KB) | wikimediacommons>Losonszki Zoli | Reverted to version as of 10:48, 20 August 2014 (UTC) |
File usage
More than 100 pages use this file. The following list shows the first 100 pages that use this file only. A full list is available.
- 4C Entity
- ABA digital signature guidelines
- Adversary (cryptography)
- BID 770
- Brute Force: Cracking the Data Encryption Standard
- CAST-256
- CS-Cipher
- Ciphertext expansion
- Code word (communication)
- Codress message
- Communication Theory of Secrecy Systems
- Concrete security
- Controlled Cryptographic Item
- Cover (telecommunications)
- Cryptanalytic computer
- Crypto (book)
- Crypto API (Linux)
- Cryptographic Message Syntax
- Cryptographic Module Validation Program
- Cryptographie indéchiffrable
- Cryptography newsgroups
- Cryptologia
- Cryptology ePrint Archive
- DEAL
- Data Authentication Algorithm
- Delegated Path Discovery
- Digital Signature Standard
- Distribution ensemble
- Enigmail
- FISH (cipher)
- FORK-256
- Firefly (key exchange protocol)
- Floradora
- Full Domain Hash
- HAS-160
- HAVAL
- HX-63
- IBM 4758
- IDEA NXT
- Initiative for Open Authentication
- JADE (cipher machine)
- Java Cryptography Architecture
- Journal of Cryptology
- KCDSA
- KOV-14
- KSD-64
- KY-58
- Key generator
- Key signature (cryptography)
- Key signing party
- Keysigning
- Kiss (cryptanalysis)
- Link encryption
- MMB (cipher)
- Matt Curtin
- Mcrypt
- Message forgery
- Mimic function
- N-hash
- Nonlinear-feedback shift register
- Oakley protocol
- Open Media Commons
- PGPfone
- Passive attack
- Password-based cryptography
- Pike (cipher)
- Pinwheel (cryptography)
- Polyinstantiation
- Product cipher
- Pseudo-Hadamard transform
- Pseudorandom ensemble
- REDOC
- Red/black concept
- Reeds–Sloane algorithm
- Reflector (cipher machine)
- Residual block termination
- Russian copulation
- S-1 block cipher
- SAVILLE
- SEAL (cipher)
- SECG
- SHARK
- SOBER-128
- Schnorr group
- Scramdisk
- Secure Communication based on Quantum Cryptography
- Secure access module
- Security protocol notation
- Small subgroup confinement attack
- Smart cow problem
- Snefru
- Square (cipher)
- Strong RSA assumption
- Torus-based cryptography
- Transmission security
- Turing (cipher)
- VINSON
- WAKE (cipher)
- Zero-knowledge password proof
- Zimmermann–Sassaman key-signing protocol
View more links to this file.