Knowledge

Talk:Cryptography

Source 📝

1372:: "variable length of encryption blocks/cryptoblocks". In this system, we don't codify a standard length of bit-quanta, instead inside the key there is a code of the pattern block-change. It is safer to use a separate key in order to select (algorithmically) a variablock pattern. All users of this encryptive method should know beforehand the algorithms of the variable bit-quanta. Also if we have 30 different sizes of bit-quanta, we need 30 different encryptional vocabularies for the translation (they can be algorithmically related; if they are not related, the system is safer, but you have to use more keys). This system has some problems though. 1. you might have to use two or more keys, 2. if your message has noise you might lose the correct pattern of bit-length-variation, you can protect your message from noise by adding one more layer of anti-noise transcription, but that makes your message longer 234: 1778:. In response, I got an essay with a brilliant lead sentence ("The social issues of cryptography are the study of cryptographic technology and its interactions with society.") but which then degrades into an inane discussion of public policy and various applications of cryptography (it starts going into a tangent about electronic voting, which is where I cut generation off). I tried this several times with different models and creativity settings and got similar results each time. Absolutely useless. 21: 224: 196: 163: 1277: 759: 1001: 980: 428: 1094: 1069: 1148: 699: 672: 44: 351: 1717: 330: 948: 888: 861: 1234: 154: 797: 300: 210: 1470:
The article's description and categorization of cryptographic hash functions is currently incorrect. Cryptographic hash functions can be used in either symmetric or asymmetric encryption and are essentially kinds of keys. The 'symmetric' vs. 'asymmetric' distinction refers to how the keys are shared,
1568:
What is in the applications section currently is a bit light for an article, I think, and does not seem not undue here. If you or someone else were to write more content in a separate article, then one could replace the content currently here with a summary of that article. Otherwise, I would say we
1443:
Each bit-width corresponds to many different bit-width encoded dictionaries. This method creates huge dictionaries with many languages that have different widths for the same input. You don't have to know all the codes beforehand. Algorithms do it for you. It still remains a big-data option, but it
1204:
Add a mention of the widespread uses of 'rot13' on Usenet postings and other places in the early computer era, explaining that it is a Caesar substitution with a displacement of 13, so that encryption is the same operation as decryption, and that it was widely used to transmit potentially offensive
1429:
And the most important thing is that we add meaningless random digits at certain (pseudorandom-dedicated) partitions the algorithm dedicates for randomness. That also might cause some problems. If your noise is thoroughly random, the infringer might understand some bit-width partition sections. We
1444:
works fine if programmed well. This system has huge hidden entropy. We never repeal the whole pattern of our systemic entropy, because we use many "cryptolanguages" and we only know how we apply each one. And that code doesn't always work. A Russian girl fucks an agent. No crypt-anal-ysis needed.
1375:
If you design it carefully it works just fine, but you have to apply anti-noise encoding, otherwise you might lose track of the variable sections. Remember, variable sections means variable cryptographic dictionary. You must create great algorithms, otherwise it won't work well! It's a very old
1387:
simple English: Hell_i|s_empty_a|nd_all_t|he|_dev|i|ls_are_|here. (6-9-8-2-4-1-7-5-etc... modular variablock section, each number of digits per section corresponds to a different cryptodictionary, even the result can be of variable block length, but you then need more keys and more anti-noise
449: 1415:
If you rotate the same bit-widths in exact order, infiltrators might be able to find your partition pattern either your message. The whole point is to complicate the order, but that might cause problems to the sender if (s)he's a bad programmer. If you're Japanese it always
1729: 1650:. I can't source this at this time. Some of the issues referred to what happened in Viet Nam, during the Viet Nam War, and this cipher system was in these articles. There are variations of this system, all created to confuse the Vietnamese guards. 1401:
We deliver some key components via different e-mails, some via-different telephones and some face to face at many meetings, also we deliver separately the order of usage. Lazy people deliver one finalized huge key, and everybody reads their
1209:"Distinguish between the essential aspects and variations of"Science", "Engineering", "Philosophy", Application" and "Management" of cryptography because the language, contexts and perspectives are complicated and different.. 1816: 1430:
use pseudorandom algorithms, in order the result is "natural". Do it well, or don't do it at all! It saves or betrays you!!! (we know which partitions have pseudorandom digits, and we simply delete these)
34: 1612:
Did you guys know about this code? If not, you set up a square that has five letters in a row, then you set up five rows on it. Then you place certain letters in it that has dual sounds in it, such as
1811: 1891: 1051: 938: 1936: 1041: 473: 105: 86: 1696:
Do we have to have a working phone to do this is it all done through the network as long as you have a Wi-Fi network or some sort to use it and what is the encryption technology 256 or what
290: 1521:
I also added the section "Social issues". However, I have no idea what to put in it, so I left it blank. (Presumably, it should have enough stuff that it would have to be a mere summary of
828: 613: 1841: 1503: 124: 1931: 530: 468: 1634:, tap five times, wait for one sec.,tap three times. You repeat this, only you adjust what you are doing for each letter as you spell out your words. In this one, the letter 1886: 749: 739: 1871: 962: 401: 391: 50: 1861: 1831: 1876: 1921: 1846: 928: 1941: 715: 1881: 1806: 367: 308: 1926: 1901: 1866: 1856: 773: 575: 280: 1946: 1826: 1100: 1074: 1017: 1911: 1836: 904: 786: 706: 677: 549: 1916: 957: 871: 414: 358: 335: 256: 1851: 1511: 638: 1008: 985: 1510:
we're hardly getting started!), the various applications of cryptography is a vast topic (as evidenced, for example, by the sheer size of
1896: 1697: 521: 1262: 895: 866: 30: 502: 247: 201: 1737: 1514:) and so deserves its own article. Therefore, I propose that this section be expanded and then split into another article titled 167: 20: 1906: 1821: 768: 682: 594: 1457:
Before we do that, we encrypt our message with other methods. Always use many layers of different methods of encryption.
559: 440: 176: 1569:
should just keep expanding the section here and split it when it is actually too large to remain at the main article.
1351: 1319: 1313: 1307: 1301: 1295: 569: 483: 1214: 1775: 1662: 1526: 604: 366:
related articles on Knowledge. If you would like to participate, please visit the project page, where you can join
1774:(on default creativity settings) to imagine the contents of the (as of now hypothetical) Knowledge article titled 1515: 837:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
33:. Please see the links under Article milestones below for its original nomination page (for older articles, check 631: 1330: 1210: 811: 1701: 1681: 1476: 43: 1658: 540: 182: 233: 1753: 1595: 1551: 1538: 1198: 1152: 1105: 1079: 153: 1265:
for that content in the latter page, and it must not be deleted as long as the latter page exists.
1016:
on Knowledge. If you would like to participate, please visit the project page, where you can join
903:
on Knowledge. If you would like to participate, please visit the project page, where you can join
714:
on Knowledge. If you would like to participate, please visit the project page, where you can join
255:
on Knowledge. If you would like to participate, please visit the project page, where you can join
1720:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
1677: 1574: 1472: 1336: 312: 239: 1194:
Give an overview of cryptography standards: at least, what they are and some important examples.
223: 195: 806: 711: 459: 1332: 1276: 1250: 511: 363: 1657:
ISBN, pre Internet, print media sourced for Knowledge? Thanks. Knowledge is the best. 😘🥰
1646:
who ended up in the Hanoi Hilton, a Viet Nam prison camp. This was in a print issue of The
1749: 1741: 1643: 1591: 1563: 1547: 1534: 1530: 1630:
From this, you tap(on a excellent sound conducting surface, like a pipe), for the letter
1647: 1013: 585: 427: 840:
Find editors who have shown interest in this subject and ask them to take a look here.
450:
Requested articles/Applied arts and sciences/Computer science, computing, and Internet
1800: 1788: 1733: 1585: 1570: 758: 1156: 1000: 979: 900: 1529:, but that's another story.) I would ask Nageh himself, but, alas, it seems that 1716: 252: 1093: 1068: 1499: 1205:
matter, spoilers, and other things meant not to be understood upon inspection.
698: 671: 229: 209: 492: 1506:. Though I was able to add a lot of stuff to the Applications section (and 947: 350: 329: 1673: 1771: 1711:
Wiki Education assignment: INFO 505 - Foundations of Information Science
1334: 887: 860: 796: 1757: 1705: 1685: 1666: 1599: 1578: 1555: 1542: 1498:
the sections "Applications" and "Social issues" to this article per
1480: 1590:
Fine, I removed the split tag; thanks for your astute observation.
299: 1624:
in it to replace certain other letters in it. Here is a example:
1486:
Added sections "Applications" and "Social issues" + split request
1627:
A B C D E F G H I L M N O P Q R T U V W X Z J K Y
1337: 1270: 1228: 1138: 568:
Find pictures for the biographies of computer scientists (see
147: 946: 795: 757: 298: 1817:
Featured articles that have appeared on the main page once
1495: 1258: 1254: 1245: 1240: 1197:
Wikilink to a few of the most popular protocols, e.g.,
1180: 1174: 1168: 1162: 117: 98: 79: 1812:
Featured articles that have appeared on the main page
1892:
C-Class Computer Security articles of Top-importance
1012:, a collaborative effort to improve the coverage of 899:, a collaborative effort to improve the coverage of 710:, a collaborative effort to improve the coverage of 362:, a collaborative effort to improve the coverage of 251:, a collaborative effort to improve the coverage of 1937:Top-importance WikiProject Cryptocurrency articles 818:Review importance and quality of existing articles 474:Computer science articles needing expert attention 49:This article appeared on Knowledge's Main Page as 1103:, a project which is currently considered to be 821:Identify categories related to Computer Security 1842:Knowledge level-3 vital articles in Technology 614:WikiProject Computer science/Unreferenced BLPs 1345:This page has archives. Sections older than 8: 1932:C-Class WikiProject Cryptocurrency articles 1770:Because I am That Kind of Person™, I asked 1494:year ago, technically (how time flies!), I 531:Computer science articles without infoboxes 469:Computer science articles needing attention 1787:At least, in the featured article review, 1232: 1063: 974: 855: 827:Identify articles for creation (see also: 781: 666: 435:Here are some tasks awaiting attention: 409: 324: 190: 58: 15: 1887:Top-importance Computer Security articles 1201:in the "Cryptographic protocols" section. 1115:Knowledge:WikiProject Citizendium Porting 809:. Please allow some days for processing. 1872:Top-importance Computer science articles 1376:method, but great (if programmed well)! 1239:Text and/or other creative content from 1118:Template:WikiProject Citizendium Porting 1862:Featured articles on Mathematics Portal 1763: 1368:A method used by cyberespionage is the 1065: 976: 857: 724:Knowledge:WikiProject Computer Security 668: 326: 192: 151: 1832:Knowledge vital articles in Technology 1355:when more than 5 sections are present. 727:Template:WikiProject Computer Security 376:Knowledge:WikiProject Computer science 1877:WikiProject Computer science articles 1512:Category:Applications of cryptography 379:Template:WikiProject Computer science 7: 1922:Top-importance Cryptography articles 1847:C-Class vital articles in Technology 1099:This article is within the scope of 1026:Knowledge:WikiProject Cryptocurrency 1006:This article is within the scope of 893:This article is within the scope of 704:This article is within the scope of 356:This article is within the scope of 245:This article is within the scope of 1942:WikiProject Cryptocurrency articles 1791:refers to Nageh with male pronouns. 1642:. This was created by shot down US 1032:WikiProject Cryptocurrency articles 1029:Template:WikiProject Cryptocurrency 181:It is of interest to the following 1882:C-Class Computer Security articles 1807:Knowledge former featured articles 1725: 1721: 913:Knowledge:WikiProject Cryptography 550:Timeline of computing 2020–present 14: 1927:WikiProject Cryptography articles 1902:Top-importance Computing articles 1867:C-Class Computer science articles 1857:Top-priority mathematics articles 1672:There's an article about this at 1349:may be automatically archived by 916:Template:WikiProject Cryptography 834:Identify articles for improvement 576:Computing articles needing images 265:Knowledge:WikiProject Mathematics 1947:Knowledge pages with to-do lists 1827:Knowledge level-3 vital articles 1728:. Further details are available 1715: 1275: 1146: 1092: 1067: 999: 978: 886: 859: 697: 670: 426: 349: 328: 268:Template:WikiProject Mathematics 232: 222: 208: 194: 161: 152: 42: 19: 1101:WikiProject Citizendium Porting 1046:This article has been rated as 933:This article has been rated as 744:This article has been rated as 396:This article has been rated as 285:This article has been rated as 1912:All Computer Security articles 1837:C-Class level-3 vital articles 1706:19:27, 29 September 2023 (UTC) 1217:) 14:15, 16 August 2019 (UTC) 1: 1917:C-Class Cryptography articles 1776:Social issues of cryptography 1758:01:58, 12 December 2023 (UTC) 1748:— Assignment last updated by 1600:05:36, 21 November 2023 (UTC) 1579:19:19, 18 November 2023 (UTC) 1527:Social issues of cryptography 1481:17:31, 7 September 2021 (UTC) 1364:A method used by intelligence 1020:and see a list of open tasks. 955:This article is supported by 907:and see a list of open tasks. 805:will be generated shortly by 787:WikiProject Computer Security 766:This article is supported by 718:and see a list of open tasks. 707:WikiProject Computer Security 630:Tag all relevant articles in 370:and see a list of open tasks. 259:and see a list of open tasks. 1852:C-Class mathematics articles 1638:will be used for the letter 1533:due to excessive wikidrama. 1516:Applications of cryptography 1504:2011 featured article review 1466:Cryptographic Hash Functions 1121:Citizendium Porting articles 958:WikiProject Computer science 639:WikiProject Computer science 415:WikiProject Computer science 359:WikiProject Computer science 1556:18:42, 2 January 2022 (UTC) 1543:18:42, 2 January 2022 (UTC) 570:List of computer scientists 1963: 1897:C-Class Computing articles 1471:if they're shared at all. 1370:modular variablocks method 1009:WikiProject Cryptocurrency 750:project's importance scale 730:Computer Security articles 402:project's importance scale 106:Featured article candidate 87:Featured article candidate 1686:18:53, 16 July 2023 (UTC) 1667:09:35, 15 July 2023 (UTC) 1531:he left Knowledge in 2013 1249:was copied or moved into 1087: 1045: 994: 954: 932: 881: 780: 765: 743: 692: 632:Category:Computer science 408: 395: 382:Computer science articles 344: 306: 284: 217: 189: 138: 61: 57: 37:) and why it was removed. 896:WikiProject Cryptography 634:and sub-categories with 291:project's priority scale 51:Today's featured article 248:WikiProject Mathematics 141:Former featured article 125:Featured article review 31:former featured article 1907:All Computing articles 1822:C-Class vital articles 1352:Lowercase sigmabot III 951: 800: 762: 595:Computer science stubs 303: 35:the nomination archive 1732:. Student editor(s): 1211:Roy D. Follendore III 950: 919:Cryptography articles 799: 769:WikiProject Computing 761: 302: 168:level-3 vital article 1257:. The former page's 1199:Secure Sockets Layer 824:Tag related articles 785:Things you can help 413:Things you can help 271:mathematics articles 1740:). Peer reviewers: 1502:'s feedback on the 1304:— Aug '04 – Mar '06 1263:provide attribution 1112:Citizendium Porting 1075:Citizendium Porting 812:More information... 1730:on the course page 1186:Updated 2019-08-16 952: 801: 763: 313:Mathematics Portal 304: 240:Mathematics portal 177:content assessment 62:Article milestones 1608:Viet Nam POW code 1359: 1358: 1269: 1268: 1227: 1226: 1137: 1136: 1133: 1132: 1129: 1128: 1062: 1061: 1058: 1057: 973: 972: 969: 968: 854: 853: 850: 849: 846: 845: 721:Computer Security 712:computer security 678:Computer Security 665: 664: 661: 660: 657: 656: 653: 652: 323: 322: 319: 318: 146: 145: 134: 133: 53:on July 22, 2006. 1954: 1792: 1785: 1779: 1768: 1760: 1738:article contribs 1727: 1726:11 December 2023 1723: 1719: 1659:Nuclear Sergeant 1589: 1567: 1354: 1338: 1316:— Jun – Dec 2006 1310:— Mar – Jun 2006 1279: 1271: 1251:Cryptography law 1248: 1236: 1235: 1229: 1221:Priority 1 (top) 1187: 1150: 1149: 1139: 1123: 1122: 1119: 1116: 1113: 1096: 1089: 1088: 1083: 1071: 1064: 1052:importance scale 1034: 1033: 1030: 1027: 1024: 1003: 996: 995: 990: 982: 975: 939:importance scale 921: 920: 917: 914: 911: 890: 883: 882: 877: 874: 872:Computer science 863: 856: 829:Article requests 814: 782: 732: 731: 728: 725: 722: 701: 694: 693: 688: 685: 674: 667: 643: 637: 512:Computer science 441:Article requests 430: 423: 422: 410: 384: 383: 380: 377: 374: 373:Computer science 364:Computer science 353: 346: 345: 340: 336:Computer science 332: 325: 309:selected article 273: 272: 269: 266: 263: 242: 237: 236: 226: 219: 218: 213: 212: 211: 206: 198: 191: 174: 165: 164: 157: 156: 148: 139:Current status: 120: 101: 82: 59: 46: 23: 16: 1962: 1961: 1957: 1956: 1955: 1953: 1952: 1951: 1797: 1796: 1795: 1786: 1782: 1769: 1765: 1747: 1713: 1694: 1628: 1610: 1583: 1561: 1525:article titled 1488: 1468: 1366: 1350: 1339: 1333: 1284: 1244: 1233: 1223: 1222: 1219: 1161: 1147: 1120: 1117: 1114: 1111: 1110: 1077: 1031: 1028: 1025: 1022: 1021: 988: 918: 915: 912: 909: 908: 875: 869: 815: 810: 729: 726: 723: 720: 719: 686: 680: 649: 646: 641: 635: 623:Project-related 618: 599: 580: 554: 535: 516: 497: 478: 454: 381: 378: 375: 372: 371: 338: 270: 267: 264: 261: 260: 238: 231: 207: 204: 175:on Knowledge's 172: 162: 116: 97: 78: 12: 11: 5: 1960: 1958: 1950: 1949: 1944: 1939: 1934: 1929: 1924: 1919: 1914: 1909: 1904: 1899: 1894: 1889: 1884: 1879: 1874: 1869: 1864: 1859: 1854: 1849: 1844: 1839: 1834: 1829: 1824: 1819: 1814: 1809: 1799: 1798: 1794: 1793: 1780: 1762: 1722:22 August 2023 1712: 1709: 1693: 1692:Security lines 1690: 1689: 1688: 1648:Readers Digest 1626: 1609: 1606: 1605: 1604: 1603: 1602: 1487: 1484: 1467: 1464: 1463: 1462: 1461: 1460: 1459: 1458: 1450: 1449: 1448: 1447: 1446: 1445: 1436: 1435: 1434: 1433: 1432: 1431: 1422: 1421: 1420: 1419: 1418: 1417: 1408: 1407: 1406: 1405: 1404: 1403: 1394: 1393: 1392: 1391: 1390: 1389: 1379: 1365: 1362: 1357: 1356: 1344: 1341: 1340: 1335: 1331: 1329: 1326: 1325: 1324: 1323: 1317: 1311: 1305: 1299: 1298:— Feb–May 2004 1290: 1289: 1286: 1285: 1280: 1274: 1267: 1266: 1261:now serves to 1237: 1225: 1224: 1220: 1207: 1206: 1202: 1195: 1189: 1144: 1142: 1135: 1134: 1131: 1130: 1127: 1126: 1124: 1097: 1085: 1084: 1072: 1060: 1059: 1056: 1055: 1048:Top-importance 1044: 1038: 1037: 1035: 1023:Cryptocurrency 1018:the discussion 1014:cryptocurrency 1004: 992: 991: 989:Top‑importance 986:Cryptocurrency 983: 971: 970: 967: 966: 963:Top-importance 953: 943: 942: 935:Top-importance 931: 925: 924: 922: 905:the discussion 891: 879: 878: 876:Top‑importance 864: 852: 851: 848: 847: 844: 843: 842: 841: 838: 835: 832: 825: 822: 819: 803:Article alerts 794: 791: 790: 778: 777: 774:Top-importance 764: 754: 753: 746:Top-importance 742: 736: 735: 733: 716:the discussion 702: 690: 689: 687:Top‑importance 675: 663: 662: 659: 658: 655: 654: 651: 650: 648: 647: 645: 644: 627: 619: 617: 616: 610: 600: 598: 597: 591: 581: 579: 578: 573: 565: 555: 553: 552: 546: 536: 534: 533: 527: 517: 515: 514: 508: 498: 496: 495: 489: 479: 477: 476: 471: 465: 455: 453: 452: 446: 434: 432: 431: 419: 418: 406: 405: 398:Top-importance 394: 388: 387: 385: 368:the discussion 354: 342: 341: 339:Top‑importance 333: 321: 320: 317: 316: 305: 295: 294: 283: 277: 276: 274: 257:the discussion 244: 243: 227: 215: 214: 199: 187: 186: 180: 158: 144: 143: 136: 135: 132: 131: 128: 121: 113: 112: 109: 102: 94: 93: 90: 83: 75: 74: 71: 68: 64: 63: 55: 54: 47: 39: 38: 24: 13: 10: 9: 6: 4: 3: 2: 1959: 1948: 1945: 1943: 1940: 1938: 1935: 1933: 1930: 1928: 1925: 1923: 1920: 1918: 1915: 1913: 1910: 1908: 1905: 1903: 1900: 1898: 1895: 1893: 1890: 1888: 1885: 1883: 1880: 1878: 1875: 1873: 1870: 1868: 1865: 1863: 1860: 1858: 1855: 1853: 1850: 1848: 1845: 1843: 1840: 1838: 1835: 1833: 1830: 1828: 1825: 1823: 1820: 1818: 1815: 1813: 1810: 1808: 1805: 1804: 1802: 1790: 1789:User:Tijfo098 1784: 1781: 1777: 1773: 1767: 1764: 1761: 1759: 1755: 1751: 1745: 1743: 1739: 1735: 1731: 1718: 1710: 1708: 1707: 1703: 1699: 1698:71.219.144.28 1691: 1687: 1683: 1679: 1678:JaggedHamster 1675: 1671: 1670: 1669: 1668: 1664: 1660: 1656: 1651: 1649: 1645: 1641: 1637: 1633: 1625: 1623: 1619: 1615: 1607: 1601: 1597: 1593: 1587: 1582: 1581: 1580: 1576: 1572: 1565: 1560: 1559: 1558: 1557: 1553: 1549: 1545: 1544: 1540: 1536: 1532: 1528: 1524: 1519: 1517: 1513: 1509: 1505: 1501: 1497: 1493: 1485: 1483: 1482: 1478: 1474: 1473:CessnaMan1989 1465: 1456: 1455: 1454: 1453: 1452: 1451: 1442: 1441: 1440: 1439: 1438: 1437: 1428: 1427: 1426: 1425: 1424: 1423: 1414: 1413: 1412: 1411: 1410: 1409: 1400: 1399: 1398: 1397: 1396: 1395: 1386: 1385: 1384: 1383: 1382: 1381: 1380: 1377: 1373: 1371: 1363: 1361: 1353: 1348: 1343: 1342: 1328: 1327: 1321: 1318: 1315: 1312: 1309: 1306: 1303: 1300: 1297: 1294: 1293: 1292: 1291: 1288: 1287: 1283: 1278: 1273: 1272: 1264: 1260: 1256: 1252: 1247: 1242: 1238: 1231: 1230: 1218: 1216: 1212: 1203: 1200: 1196: 1193: 1192: 1191: 1188: 1185: 1182: 1179: 1176: 1173: 1170: 1167: 1164: 1160: 1158: 1154: 1143: 1141: 1140: 1125: 1108: 1107: 1102: 1098: 1095: 1091: 1090: 1086: 1081: 1076: 1073: 1070: 1066: 1053: 1049: 1043: 1040: 1039: 1036: 1019: 1015: 1011: 1010: 1005: 1002: 998: 997: 993: 987: 984: 981: 977: 964: 961:(assessed as 960: 959: 949: 945: 944: 940: 936: 930: 927: 926: 923: 906: 902: 898: 897: 892: 889: 885: 884: 880: 873: 868: 865: 862: 858: 839: 836: 833: 830: 826: 823: 820: 817: 816: 813: 808: 804: 798: 793: 792: 788: 784: 783: 779: 775: 772:(assessed as 771: 770: 760: 756: 755: 751: 747: 741: 738: 737: 734: 717: 713: 709: 708: 703: 700: 696: 695: 691: 684: 679: 676: 673: 669: 640: 633: 629: 628: 626: 624: 620: 615: 612: 611: 609: 607: 606: 601: 596: 593: 592: 590: 588: 587: 582: 577: 574: 571: 567: 566: 564: 562: 561: 556: 551: 548: 547: 545: 543: 542: 537: 532: 529: 528: 526: 524: 523: 518: 513: 510: 509: 507: 505: 504: 499: 494: 491: 490: 488: 486: 485: 480: 475: 472: 470: 467: 466: 464: 462: 461: 456: 451: 448: 447: 445: 443: 442: 437: 436: 433: 429: 425: 424: 421: 420: 416: 412: 411: 407: 403: 399: 393: 390: 389: 386: 369: 365: 361: 360: 355: 352: 348: 347: 343: 337: 334: 331: 327: 314: 310: 301: 297: 296: 292: 288: 282: 279: 278: 275: 258: 254: 250: 249: 241: 235: 230: 228: 225: 221: 220: 216: 203: 200: 197: 193: 188: 184: 178: 170: 169: 159: 155: 150: 149: 142: 137: 129: 127: 126: 122: 119: 115: 114: 110: 108: 107: 103: 100: 96: 95: 91: 89: 88: 84: 81: 80:July 21, 2005 77: 76: 72: 69: 66: 65: 60: 56: 52: 48: 45: 41: 40: 36: 32: 28: 25: 22: 18: 17: 1783: 1766: 1746: 1714: 1695: 1654: 1652: 1639: 1635: 1631: 1629: 1621: 1617: 1613: 1611: 1546: 1522: 1520: 1507: 1491: 1489: 1469: 1378: 1374: 1369: 1367: 1360: 1346: 1281: 1246:Cryptography 1241:this version 1208: 1190: 1183: 1177: 1171: 1165: 1157:Cryptography 1151: 1145: 1104: 1047: 1007: 956: 934: 910:Cryptography 901:Cryptography 894: 867:Cryptography 802: 767: 745: 705: 622: 621: 605:Unreferenced 603: 602: 584: 583: 558: 557: 539: 538: 520: 519: 501: 500: 482: 481: 458: 457: 439: 438: 397: 357: 287:Top-priority 286: 246: 205:Top‑priority 183:WikiProjects 166: 140: 123: 118:May 26, 2011 104: 99:July 2, 2006 92:Not promoted 85: 27:Cryptography 26: 307:This was a 262:Mathematics 253:mathematics 202:Mathematics 1801:Categories 1750:Chillimune 1742:Chillimune 1592:Duckmather 1564:Duckmather 1548:Duckmather 1535:Duckmather 1500:User:Nageh 1320:/Archive 5 1314:/Archive 4 1308:/Archive 3 1302:/Archive 2 1296:/Archive 1 1153:To-do list 1492:few weeks 1402:messages. 1255:this edit 807:AAlertBot 683:Computing 493:Computing 171:is rated 1734:Mayoosan 1674:Tap code 1586:Felix QW 1571:Felix QW 1322:— 2007 – 1282:Archives 1106:inactive 1080:inactive 541:Maintain 484:Copyedit 111:Promoted 1653:How is 1523:another 1388:layers) 1347:90 days 1259:history 1181:refresh 1169:history 1050:on the 937:on the 748:on the 522:Infobox 460:Cleanup 400:on the 311:on the 289:on the 173:C-class 130:Demoted 70:Process 1416:works! 503:Expand 179:scale. 73:Result 1772:GPT-J 1496:added 1253:with 1175:watch 789:with: 586:Stubs 560:Photo 417:with: 160:This 29:is a 1754:talk 1724:and 1702:talk 1682:talk 1663:talk 1644:POWs 1596:talk 1575:talk 1552:talk 1539:talk 1477:talk 1215:talk 1163:edit 1155:for 67:Date 1655:pre 1508:I'm 1243:of 1042:Top 929:Top 740:Top 392:Top 281:Top 1803:: 1756:) 1744:. 1704:) 1684:) 1676:. 1665:) 1620:, 1616:, 1598:) 1577:) 1554:) 1541:) 1518:. 1490:A 1479:) 965:). 870:: 776:). 681:: 642:}} 636:{{ 1752:( 1736:( 1700:( 1680:( 1661:( 1640:S 1636:C 1632:Q 1622:Y 1618:G 1614:C 1594:( 1588:: 1584:@ 1573:( 1566:: 1562:@ 1550:( 1537:( 1475:( 1213:( 1184:· 1178:· 1172:· 1166:· 1159:: 1109:. 1082:) 1078:( 1054:. 941:. 831:) 752:. 625:: 608:: 589:: 572:) 563:: 544:: 525:: 506:: 487:: 463:: 444:: 404:. 315:. 293:. 185::

Index

Former featured article
former featured article
the nomination archive
Main Page trophy
Today's featured article
July 21, 2005
Featured article candidate
July 2, 2006
Featured article candidate
May 26, 2011
Featured article review

level-3 vital article
content assessment
WikiProjects
WikiProject icon
Mathematics
WikiProject icon
icon
Mathematics portal
WikiProject Mathematics
mathematics
the discussion
Top
project's priority scale
Note icon
selected article
Mathematics Portal
WikiProject icon
Computer science

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.