File:Emoji u1f510.svg

Size of this PNG preview of this SVG file: 128 × 128 pixels. Other resolutions: 240 × 240 pixels | 480 × 480 pixels | 768 × 768 pixels | 1,024 × 1,024 pixels | 2,048 × 2,048 pixels.
Original file (SVG file, nominally 128 × 128 pixels, file size: 2 KB)
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 07:20, 3 March 2020 | ![]() | 128 × 128 (2 KB) | wikimediacommons>Losonszki Zoli | Reverted to version as of 10:48, 20 August 2014 (UTC) |
File usage
More than 100 pages use this file. The following list shows the first 100 pages that use this file only. A full list is available.
- ANDVT
- Adiantum (cipher)
- Ascon (cipher)
- Authenticated Identity Body
- Bar mitzvah attack
- Batch cryptography
- CAPICOM
- CIKS-1
- COSIC
- CS-Cipher
- Capstone (cryptography)
- Card Verifiable Certificate
- Certification on demand
- Ciphertext expansion
- Client-side encryption
- Code word (communication)
- Commercial National Security Algorithm Suite
- Common reference string model
- Communications Machine
- Concrete security
- Conjugate coding
- Coset leader
- Crypto-1
- Cryptographic log on
- Cryptographic module
- Cryptology ePrint Archive
- Cryptoperiod
- Decorrelation theory
- Detached signature
- Differential fault analysis
- Digital signature forgery
- Distribution ensemble
- Dragon (cipher)
- Dusting attack
- Ephemeral key
- Even code
- Export of cryptography
- FASCINATOR
- FEA-M
- Full Domain Hash
- GBDE
- Geli (software)
- Generic group model
- Group Domain of Interpretation
- Harvest now, decrypt later
- Hyper-encryption
- IBM 4768
- IDEA NXT
- ISO/IEC 18014
- Japanese M-1 cipher machine
- Journal of Cryptology
- Junger v. Daley
- KL-51
- Key clustering
- Kmc-Subset137
- Knapsack cryptosystems
- LEX (cipher)
- M6 (cipher)
- MDS matrix
- MESH (cipher)
- MICKEY
- Message authentication
- Messaging Layer Security
- Mimic function
- Mod openpgp
- Multi-party fair exchange protocol
- NSA Suite A Cryptography
- NUSH
- National Institute of Cryptology Research and Development
- Null encryption
- OPIE Authentication System
- ORYX
- Oakley protocol
- PEGASUS
- PGPfone
- PMAC (cryptography)
- Password-based cryptography
- Permutation box
- Pseudorandom ensemble
- RCCA security
- Rotational cryptanalysis
- SC2000
- SIGTOT
- SOSEMANUK
- STU-I
- Secure access module
- Slidex
- Small subgroup confinement attack
- Spectr-H64
- Spectral Hash
- Static key
- StegFS
- The American Black Chamber
- Time stamp protocol
- U-229
- U-Prove
- UES (cipher)
- Wireless Public Key Infrastructure
- Xor–encrypt–xor
- ZUC stream cipher
View more links to this file.