Rank |
Article |
Hits |
Size (bytes) |
Redirects |
Images |
1 | Enigma machine | 6535 | 32450 | Naval Engima -- Enigma code machine -- Enigma (machine) -- ENIGMA -- Enigma cryptography machine -- Enigma code -- Enigma cipher machine -- Enigma cypher machine -- Enigma cipher -- Enigma cypher -- Naval Enigma -- Enigma Machine |
|
2 | Cryptanalysis of the Enigma | 1993 | 22520 | |
|
3 | Cryptanalysis | 1993 | 18187 | CryptanalysiS -- Cryptanalytic -- Cryptoanalysis -- Codebreaking -- Codebreaker -- Cryptanalyst -- Code-breaking -- Cryptanalysts |
|
4 | Alan Turing | 1579 | 15031 | Turing, A.M. -- Alan Mathison Turing |
|
5 | History of cryptography | 1450 | 20091 | | |
6 | ECHELON | 1322 | 13300 | EcheloN -- Eschelon | |
7 | Cryptography | 1290 | 17810 | CryptologY -- CryptographY -- Cryptology -- CryptographY/Hashfunctions -- Cryptographic -- Codes and ciphers -- Decrypting -- Crypto -- Data encryption -- Cyptography | |
8 | Digital rights management | 1255 | 24954 | Digital Rights Management -- Digital-rights management -- Digital restrictions management -- Digital Restrictions Management | |
9 | MD5 | 1059 | 7679 | Md5 -- MD5 - A Message Digest Algorithm -- Md5sum |
|
10 | RSA | 986 | 13207 | RSA Cryptosystem | |
11 | Bombe | 786 | 6929 | |
|
12 | Steganography | 766 | 11798 | Secret writing -- Stegonagraphy -- Stegotext |
|
13 | Encryption | 668 | 4549 | CipheR -- Cipher -- Cyphertext -- Ciphertext -- Cipher text -- Decryption -- Encryption key -- Encryption algorithm -- Codetext -- Encrypt -- Encrypted -- Encipher |
|
14 | Ultra | 580 | 26381 | UltrA -- Ultra secret -- ULTRA | |
15 | Bletchley Park | 525 | 9696 | Bletchley Park Museum -- Station X |
|
16 | Blowfish (cipher) | 487 | 6891 | Blowfish encryption algorithm |
|
17 | Colossus computer | 480 | 9965 | Colossus (computer) |
|
18 | National Security Agency | 432 | 11249 | NSA -- Armed Forces Security Agency -- AFSA -- No such agency -- The Puzzle Palace |
|
19 | Advanced Encryption Standard | 431 | 10743 | AES -- Rijndael -- Rijndael encryption algorithm | |
20 | Data Encryption Standard | 421 | 29907 | DataEncryptionStandard -- Data Encryption Algorithm -- DES |
|
21 | Quantum cryptography | 414 | 16077 | Quantum Cryptography | |
22 | Topics in cryptography | 409 | 18271 | Topics in Cryptography | |
23 | Cryptographic hash function | 403 | 9408 | Message digest -- Cryptographic hash -- Cryptographic message digest -- One-way hash -- Modification Detection Code |
|
24 | Cryptonomicon | 384 | 3079 | Neal Stephenson/Cryptonomicon | |
25 | Wi-Fi Protected Access | 376 | 3319 | | |
26 | Digital signature | 357 | 11899 | Digital signatures -- Digitally Signed -- Cryptographic signature | |
27 | One-time pad | 342 | 18815 | OneTimePads -- One time pads -- One time pad -- Vernam cipher | |
28 | Block cipher | 328 | 4828 | Codebook algorithm |
|
29 | Zimmermann Telegram | 325 | 9474 | Zimmermann telegram -- Zimmerman telegram -- Zimmerman Note -- The Zimmermann Telegram |
|
30 | Integer factorization | 324 | 7283 | Prime factorization -- Prime factorisation -- Prime decomposition -- Integer factorization problem -- Integer factorisation | |
31 | HTTPS | 324 | 2053 | Https | |
32 | Rotor machine | 323 | 12564 | Rotor cypher machine | |
33 | X.509 | 320 | 4415 | | |
34 | Brute force attack | 319 | 3623 | Combinatorial explosion | |
35 | Triple DES | 315 | 2454 | 3DES -- Triple-DES | |
36 | DeCSS | 313 | 8286 | DeCSS source code -- Decss |
|
37 | Birthday attack | 312 | 3250 | | |
38 | Public-key cryptography | 298 | 7275 | Private key -- Public key -- Public key cryptography -- Asymmetric key cryptography -- Public key encyption -- Public key crytography -- Public key encryption -- Public-key encryption -- Public-key -- PKC -- Non-secret encryption | |
39 | Frequency analysis | 286 | 7354 | | |
40 | Substitution cipher | 274 | 18038 | Substitution ciphers -- Substitution alphabet -- Letter-substitution cipher -- Simple substitution cipher -- Monoalphabetic substitution cipher |
|
41 | Asymmetric key algorithm | 267 | 7622 | Asymmetric Algorithms -- Asymmetric algorithm -- Public key algorithm -- Asymmetric key -- Asymmetric key encryption algorithm -- Asymmetric key encryption -- Asymmetric cryptography | |
42 | Authentication | 264 | 4953 | Authenticate | |
43 | ROT13 | 262 | 14597 | Rot13 -- ROT-13 -- ROT-47 -- Rot47 -- Rot-13 -- Rot-47 -- ROT47 -- ROT 13 -- ROT26 -- Double ROT13 -- Ebg13 -- Memfrob -- Furrfu |
|
44 | Kerberos (protocol) | 247 | 4528 | | |
45 | Elliptic curve cryptography | 241 | 6894 | Elliptical Curve Cryptography | |
46 | Pseudorandom number generator | 238 | 6097 | Pseudorandom number generators -- Pseudo-random number generator -- Pseudorandom sequence -- PRNG -- Pseudo Random -- Pseudo-random -- Pseudo-randomness | |
47 | Stream cipher | 231 | 2999 | Key stream -- Combiner-type algorithm | |
48 | RC4 | 230 | 9179 | RC4 Cipher -- ARCFOUR -- RC4 cipher -- RC4 (cipher) |
|
49 | Kryptos | 219 | 3030 | |
|
Image:Pd cia krypt-lg.jpg |
|
50 | Symmetric key algorithm | 216 | 1699 | Symmetric Algorithms -- Symmetric algorithm -- Symmetric key -- Symmetric encryption -- Symmetric key cryptography -- Symmetric cypher -- Shared key -- Symmetric cipher | |
51 | Claude E. Shannon | 216 | 5503 | Claude Shannon -- Claude Elwood Shannon | |
52 | Transport Layer Security | 207 | 5380 | Secure Sockets Layer -- Transport Layer Security Protocol -- Transport layer security -- Secure Socket Layer | |
53 | Bomba (cryptography) | 202 | 3402 | | |
54 | Electronic voting | 198 | 16364 | E-voting -- EVoting -- E voting -- Computer voting -- Electronic Voting -- Online voting -- Paper trail | |
55 | List of cryptography topics | 196 | 33375 | List of cryptology topics | |
56 | International Data Encryption Algorithm | 194 | 4461 | IDEA encryption algorithm -- IDEA (cipher) -- Idea encryption | |
57 | Differential cryptanalysis | 192 | 4864 | Differential attack | |
58 | Caesar cipher | 188 | 7402 | Shift cipher -- Caesar shift cipher -- Caesar cypher | |
59 | Typex | 186 | 4242 | Type X -- TypeX | |
60 | Marian Rejewski | 185 | 4990 | | |
61 | Hardware random number generator | 180 | 21945 | True random number generator -- Random device -- Entropy pool -- TRNG -- True Random Number Generator | |
62 | Perforated sheets | 179 | 1010 | Zygalski sheets -- Perforated sheet | |
63 | TEMPEST | 178 | 4065 | Van Eck Phreaking -- Emission security -- Van Eck radiation -- Emissions security -- EMSEC | |
64 | Numbers station | 171 | 3510 | Numbers stations -- Number station | |
65 | Crypto-anarchism | 168 | 4574 | Crypto-anarchy | |
66 | Man in the middle attack | 167 | 2950 | Man-in-the-middle attack -- Man in the middle -- MITM | |
67 | Block cipher modes of operation | 165 | 5509 | Electronic codebook -- Cipher-block chaining -- Cipher feedback -- Output feedback -- Counter mode -- Modes of operation -- Block cipher mode of operation | |
68 | Password cracking | 164 | 10256 | | |
69 | Password | 164 | 15629 | Passcode | |
70 | VENONA project | 160 | 9320 | VENONA -- Venona -- VENONA Project -- Venona project -- Venona Project | |
71 | Twofish | 156 | 1747 | Twofish encryption algorithm | |
72 | Information security | 156 | 4644 | Information systems security -- Information assurance -- INFOSEC -- It security | |
73 | Atbash | 156 | 911 | Atbash cipher -- Atbash cypher | |
74 | Digital Signature Algorithm | 155 | 2167 | DSA | |
75 | Code talkers | 152 | 5603 | Codetalker -- Navajo code -- Codetalkers |
|
76 | Public key infrastructure | 151 | 9476 | PKI -- Public Key Infrastructure -- Pki | |
77 | Codebook | 145 | 950 | Code book |
|
78 | Cryptographically secure pseudo-random number generator | 144 | 5972 | CSPRNG | |
79 | Certificate authority | 144 | 3173 | Certificate Authority | |
80 | Cypherpunk | 143 | 1621 | Cypherpunks | |
81 | Polyalphabetic cipher | 142 | 4159 | Polyalphabetic substitution | |
82 | Knapsack problem | 139 | 2223 | 0/1 knapsack problem | |
83 | Adi Shamir | 135 | 2830 | |
|
84 | Skipjack (cipher) | 134 | 3692 | Skipjack encryption algorithm | |
85 | Secure shell | 134 | 3626 | SSH -- Secure Shell -- Ssh | |
86 | Transposition cipher | 133 | 7779 | Transposition (cryptography) -- Columnar disposition -- Transposition (cipher) | |
87 | Pretty Good Privacy | 133 | 28570 | PrettyGoodPrivacy -- PGP -- Pgp | |
88 | Meet-in-the-middle attack | 129 | 2170 | | |
89 | Key (cryptography) | 128 | 7368 | CryptographY/Keys -- Cryptography/Key -- Secret key -- Cryptographic keys -- Cryptographic key | |
90 | RIPEMD | 126 | 2604 | RIPEMD-160 | |
91 | Illegal prime | 126 | 3745 | Illegal prime number |
|
92 | Blum Blum Shub | 126 | 2513 | Blum Blum Shub generator | |
93 | Fritz-chip | 124 | 11332 | | |
94 | Scytale | 123 | 4652 | Skytale | |
95 | Invisible ink | 123 | 3893 | | |
96 | Advanced Encryption Standard process | 121 | 2512 | AES process -- AES competition -- AES contest -- Advanced Encryption Standard competition -- AES candidate | |
97 | Deniable encryption | 119 | 2060 | Deniable Encryption | |
98 | Voynich manuscript | 117 | 38042 | Voynich Manuscript -- Voynich -- Voynich MS |
|
99 | Rabin cryptosystem | 117 | 10488 | | |
100 | Plaintext | 115 | 5249 | | |
101 | National Cryptologic Museum | 114 | 545 | National cryptologic museum |
|
102 | Confidentiality | 114 | 2056 | Data confidentiality | |
103 | Weak key | 113 | 3961 | | |
104 | Diffie-Hellman key exchange | 113 | 9947 | Diffie-Hellman -- Diffie Hellman -- Diffie-Hellman-Merkle key exchange -- Diffie-Hellman-Merkle -- Diffie-Hellman key agreement | |
105 | Content-scrambling system | 112 | 2426 | Content Scrambling System -- Content scrambling system | |
106 | RC2 | 110 | 3383 | | |
107 | Geheimfernschreiber | 110 | 3255 | STURGEON (cryptography) |
|
108 | Security engineering | 107 | 2579 | | |
109 | SIGABA | 106 | 9000 | Sigaba -- ECM Mark II |
|
110 | Public key certificate | 105 | 4773 | Digital certificate -- Digital Certificate -- Identity certificate -- Digital identity certificate | |
111 | XSL attack | 103 | 9990 | |
|
112 | Security through obscurity | 103 | 8332 | Security by obscurity | |
113 | Autokey cipher | 103 | 3820 | | |
114 | Magic (cryptography) | 101 | 12477 | Magic cryptography | |
115 | ElGamal discrete log cryptosystem | 101 | 2938 | Elgamal discrete logarithm cryptosystem -- El Gamal discrete log cryptosystem -- ElGamal -- El Gamal -- Elgamal -- Elgamal discrete log cryptosystem | |
116 | Dmitry Sklyarov | 99 | 2832 | Dmitri Sklyarov -- Dimitri Sklyarov -- Dimitri Skylarov -- Sklyarov -- Dimitry Sklyarov -- Dimitry Sklyarov -- Dimitry Sklyarov | |
117 | SHA family | 96 | 10977 | SHA -- SHA1 -- SHA-256 -- SHA-384 -- SHA-512 -- SHA-1 -- Secure Hash Algorithm family -- Secure Hash Algorithm -- SHA-0 -- SHA512 |
|
118 | EFF DES cracker | 96 | 3960 | Deep Crack -- Deep crack -- DES cracker |
|
119 | SIGINT | 95 | 2944 | Signals intelligence -- Sigint -- Signals Intelligence -- Signal intelligence | |
120 | RSA number | 93 | 13287 | RSA numbers | |
121 | Key size | 93 | 8328 | Cryptography/key length -- Cryptographic key length -- Key length | |
122 | RC5 | 92 | 2767 | RC5 cipher -- RC5 encryption algorithm |
|
123 | Collision attack | 92 | 348 | | |
124 | Alice and Bob | 92 | 4303 | Characters in cryptography | |
125 | OpenSSL | 91 | 970 | Openssl | |
126 | Web of trust | 90 | 6797 | Web of Trust | |
127 | The Gold Bug | 90 | 2121 | | |
128 | Digital Fortress | 90 | 1184 | | |
129 | Crib | 90 | 1334 | Cribbing | |
130 | SEED | 89 | 419 | SEED (cipher) | |
131 | Beale ciphers | 89 | 6121 | Beale Ciphers | |
132 | Linear cryptanalysis | 88 | 1758 | | |
133 | S/MIME | 87 | 902 | Smime -- SMIME | |
134 | Pseudonymity | 87 | 2790 | | |
135 | SSH file transfer protocol | 86 | 1672 | Secure file transfer program | |
136 | OpenSSH | 85 | 3512 | Openssh | |
137 | 802.11i | 85 | 1135 | IEEE 802.11i -- WEP2 -- WPA2 | |
138 | MD4 | 84 | 1360 | | |
139 | Electronic money | 84 | 1651 | Digital cash -- EFT -- Electronic cash | |
140 | Cryptographic protocol | 84 | 1514 | Cyptographic protocol -- Security protocol | |
141 | Code (cryptography) | 84 | 7701 | Codetext | |
142 | Adversary | 84 | 1877 | | |
143 | XTEA | 83 | 4138 | | |
144 | Discrete logarithm | 83 | 2293 | Discrete log problem -- Discrete logarithm problem -- Discrete logarithms -- Discrete log | |
145 | Anonymous remailer | 83 | 14590 | Anonymous Remailer -- Remailer | |
146 | OpenPGP | 82 | 688 | RFC 2440 | |
147 | MD5CRK | 82 | 2781 | |
|
148 | Traffic analysis | 81 | 7292 | | |
149 | Computer surveillance | 80 | 7294 | | |
150 | Communications Security Establishment | 80 | 2100 | | |
151 | Preimage attack | 79 | 382 | | |
152 | MI8 | 78 | 1266 | | |
153 | Bruce Schneier | 78 | 2342 | Schneier | |
154 | Decipherment | 77 | 1480 | Decipher -- Decypher | |
155 | Ron Rivest | 76 | 2132 | Rivest -- Ronald Rivest -- Ronald L. Rivest |
|
156 | Linear feedback shift register | 76 | 2242 | LFSR | |
157 | Secret sharing | 75 | 10531 | Key splitting | |
158 | GNU Privacy Guard | 75 | 6251 | Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG |
|
159 | Confusion and diffusion | 75 | 1716 | Diffusion (cryptography) -- Confusion (cryptography) -- Diffusion and confusion | |
160 | Avalanche effect | 75 | 1879 | Avalanche (cryptography) | |
161 | The Magic Words are Squeamish Ossifrage | 73 | 2685 | Squeamish ossifrage | |
162 | TKIP | 71 | 1195 | | |
163 | Defence Signals Directorate | 71 | 943 | | |
164 | Wikipedia:WikiProject Cryptography [[Talk:Wikipedia:WikiProject Cryptography| ]] | 70 | 12011 | User:Matt Crypto/prop[[Talk:User:Matt Crypto/prop| ]]-- Wikipedia:WikiProject Cryptology[[Talk:Wikipedia:WikiProject Cryptology| ]] | |
165 | TICOM | 70 | 1185 | | |
166 | RC6 | 70 | 1421 | RC6 cipher -- RC6 encryption algorithm | |
167 | List of famous ciphertexts | 70 | 548 | Famous ciphertexts | |
168 | Cryptogram | 70 | 1215 | | |
169 | KL-7 | 69 | 3814 | |
|
170 | IPsec | 69 | 8845 | RFC 2401 -- IPSEC -- Authentication Header -- Encapsulating Security Payload -- IPSec -- IPsec implementations | |
171 | William F. Friedman | 68 | 11954 | William Friedman -- William Frederick Friedman -- Wolfe Frederick Friedman |
|
172 | Khufu and Khafre | 68 | 4898 | Khafre (cipher) -- Khufu (cipher) | |
173 | Replay attack | 67 | 1595 | | |
174 | Initialization vector | 67 | 1874 | Initialisation vector | |
175 | FISH (cryptography) | 67 | 1311 | | |
176 | Dictionary attack | 67 | 2734 | | |
177 | Computer insecurity | 67 | 13931 | | |
178 | Polybius square | 66 | 3213 | | |
179 | Lucifer (cipher) | 65 | 3954 | Lucifer cipher | |
180 | Export of cryptography | 65 | 11772 | | |
181 | Feistel cipher | 64 | 3491 | Feistel network -- Feistel scheme -- Feistel | |
182 | Classical cipher | 64 | 800 | Classical cryptography | |
183 | Block size (cryptography) | 64 | 2183 | | |
184 | A5/1 | 64 | 7257 | A5 (cryptography) |
|
185 | Substitution-permutation network | 63 | 1087 | SP-network -- SPN -- Substitution-Permutation network | |
186 | Hebern rotor machine | 63 | 6767 | Hebern Rotor Machine |
|
187 | Quadratic sieve | 62 | 11164 | Multiple Polynomial Quadratic Sieve | |
188 | Johannes Trithemius | 62 | 4041 | |
|
189 | Leone Battista Alberti | 61 | 5229 | Leone Battista Alrerti -- Leon Battista Alberti -- Alberti, Leone Battista -- Leone Alberti | |
190 | Chosen plaintext attack | 61 | 2016 | Chosen plaintext -- Chosen-text attack -- Chosen-plaintext attack -- Chosen-plaintext -- Adaptive chosen-plaintext attack -- Adaptive chosen plaintext attack | |
191 | Zero-knowledge proof | 60 | 6332 | Zero knowledge proof -- Zero-knowledge | |
192 | Chaffing and winnowing | 60 | 716 | | |
193 | Dorabella Cipher | 59 | 490 | |
100px| |
Image:Dorabella.gif |
|
194 | Tiger (hash) | 58 | 731 | Tiger hash function -- Tiger (cryptography) | |
195 | Government Communications Headquarters | 58 | 4047 | GCHQ -- GC&CS -- Government Code and Cypher School -- Government Code and Cipher School -- Communications-Electronics Security Group -- CESG | |
196 | CAST-128 | 58 | 2790 | CAST5 -- CAST -- CAST-5 |
|
197 | Books on cryptography | 58 | 16355 | |
|
198 | Rubber-hose cryptanalysis | 57 | 2543 | Rubber hose cryptanalysis | |
199 | Ross Anderson | 57 | 1709 | Ross J. Anderson | |
200 | Distributed.net | 57 | 1137 | | |
201 | Wired Equivalent Privacy | 56 | 3326 | WEP | |
202 | Null cipher | 56 | 1124 | Null cypher | |
203 | Max Newman | 56 | 1516 | Maxwell Newman | |
204 | Hashcash | 55 | 3076 | | |
205 | Fortezza | 55 | 1280 | KOV-8 |
|
206 | Gardening (cryptanalysis) | 54 | 1048 | | |
207 | Clifford Cocks | 54 | 1942 | | |
208 | Clipper chip | 53 | 4545 | Clipper Chip | |
209 | Playfair cipher | 52 | 5154 | Playfair -- Playfair square | |
210 | Message Authentication Code | 52 | 1309 | Message authentication code | |
211 | Substitution box | 50 | 6284 | S-box -- Cryptography/s-box -- Substitution boxes | |
212 | Snake oil (cryptography) | 50 | 9433 | Snake oil cryptography | |
213 | Physical security | 50 | 1596 | Physical Security | |
214 | Lorenz cypher | 50 | 2646 | Tunny (cryptography) -- Lorenz cipher -- Fish cyphers -- TUNNY -- Fish ciphers -- Lorentz Cipher -- Lorentz Cypher -- Lorenz Machine -- Lorentz Machine |
|
215 | JN-25 | 50 | 2478 | | |
216 | Secure cryptoprocessor | 49 | 2889 | | |
217 | Kasiski examination | 48 | 2760 | Kasiski test | |
218 | Steganalysis | 47 | 4527 | | |
219 | STU-III | 47 | 4236 | |
|
220 | Leonard Adleman | 47 | 2595 | Len Adleman -- Adleman -- Leonard M. Adleman -- Adleman, Leonard |
|
221 | KASUMI | 47 | 1494 | Kasumi (cipher) | |
222 | Daniel J. Bernstein | 47 | 919 | Dan Bernstein -- D. J. Bernstein -- Daniel Bernstein -- Djb | |
223 | Secret decoder ring | 45 | 897 | | |
224 | RSA Factoring Challenge | 44 | 1530 | | |
225 | NSA encryption systems | 44 | 15126 | | |
226 | Chosen ciphertext attack | 44 | 1013 | | |
227 | Affine cipher | 44 | 1486 | | |
228 | Serpent (cipher) | 43 | 1364 | Serpent encryption algorithm | |
229 | Permutation cipher | 43 | 2076 | | |
230 | MARS | 43 | 996 | Mars (cipher) | |
231 | List of cryptographers | 43 | 11426 | Cryptographer -- Cryptographers -- Cryptologist -- List of cryptologists | |
232 | Enigmail | 43 | 914 | |
|
233 | S-1 | 42 | 882 | S-1 block cipher | |
234 | Merkle-Hellman | 42 | 2370 | | |
235 | Key schedule | 42 | 1316 | Key scheduling -- Subkey |
|
236 | HAVAL | 42 | 2183 | | |
237 | New Zealand Government Communications Security Bureau | 41 | 1262 | Government Communications Security Bureau | |
238 | Index of coincidence | 41 | 2858 | Coincidence counting | |
239 | Cipherspace | 41 | 923 | | |
240 | Adaptive chosen ciphertext attack | 41 | 2203 | Adaptive chosen-ciphertext attack | |
241 | GOST | 40 | 3123 | |
|
242 | FEAL | 40 | 4829 | | |
243 | Diplomatic bag | 40 | 1456 | Diplomatic pouch | |
244 | Challenge–response authentication | 40 | 2274 | | |
245 | Book cipher | 40 | 831 | | |
246 | Arthur Scherbius | 40 | 1865 | | |
247 | Square (cipher) | 39 | 1181 | | |
248 | MD2 | 39 | 1149 | Message Digest Algorithm 2 | |
249 | Covert channel | 39 | 1439 | | |
250 | The Codebreakers | 38 | 1110 | | |
251 | SAFER | 38 | 5605 | SAFER-K -- SAFER (cipher) -- SAFER SK -- SAFER plus -- SAFER plus plus |
|
252 | RSA Security | 38 | 777 | RSA Data Security -- RSA Laboratories | |
253 | MacGuffin (cipher) | 38 | 3265 | |
|
254 | KW-26 | 38 | 4250 | |
|
255 | Cipher Block Chaining | 38 | 1548 | | |
256 | Cardan grille | 38 | 494 | | |
257 | CRYPTREC | 38 | 9428 | | |
258 | Tabula recta | 37 | 1685 | | |
259 | Red Pike | 37 | 1489 | Red pike | |
260 | NESSIE | 37 | 3611 | | |
261 | Key exchange | 37 | 4058 | | |
262 | ADFGVX cipher | 37 | 3542 | ADFGVX | |
263 | Shugborough House inscription | 36 | 1557 | | |
264 | Room 40 | 36 | 2720 | | |
265 | PC Bruno | 36 | 1809 | | |
266 | One way function | 36 | 2565 | One-way -- One way | |
267 | Microdot | 36 | 1685 | |
|
268 | Security protocol notation | 35 | 973 | | |
269 | Secure channel | 35 | 3599 | | |
270 | Secure FTP | 35 | 1315 | | |
271 | SIGSALY | 35 | 6480 | |
|
272 | Product cipher | 35 | 921 | | |
273 | Padding (cryptography) | 35 | 2881 | | |
274 | Key management | 35 | 1579 | Key management protocol | |
275 | Iraqi block cipher | 35 | 580 | Iraqi Block Cipher | |
276 | EKMS | 35 | 5662 | Electronic Key Management System |
|
277 | Decrypt | 35 | 731 | | |
278 | Cryptography standards | 35 | 4621 | | |
279 | A5/2 | 35 | 601 | | |
280 | Whitfield Diffie | 34 | 2304 | Diffie | |
281 | Unicity distance | 34 | 2667 | Spurious key | |
282 | Tiny Encryption Algorithm | 34 | 4516 | TEA |
|
283 | Russian copulation | 34 | 1445 | | |
284 | PKCS | 34 | 3734 | | |
285 | KY-57 | 34 | 999 | VINSON device | |
286 | CAST-256 | 34 | 1469 | | |
287 | Arne Beurling | 34 | 1412 | | |
288 | 40-bit encryption | 34 | 2334 | 40 bit encryption | |
289 | Side channel attack | 33 | 6001 | | |
290 | Running key cipher | 33 | 7964 | | |
291 | NewDES | 33 | 3291 | | |
292 | NTLM | 33 | 1975 | | |
293 | Mod n cryptanalysis | 33 | 2531 | Mod-n cryptanalysis | |
294 | Key authentication | 33 | 2643 | | |
295 | GnuTLS | 33 | 743 | | |
296 | Cleartext | 33 | 1477 | Clear message -- In clear -- In the clear | |
297 | Auguste Kerckhoffs | 33 | 2927 | | |
298 | Yarrow algorithm | 32 | 1117 | | |
299 | Salt (cryptography) | 32 | 759 | | |
300 | Key escrow | 32 | 1779 | | |
301 | GMR | 32 | 1135 | | |
302 | Camellia (cipher) | 32 | 1704 | | |
303 | Bernstein v. United States | 32 | 1489 | Bernstein v. U.S. Dept. of State | |
304 | Trusted third party | 31 | 3564 | Trusted Third Party | |
305 | Taher ElGamal | 31 | 1824 | Taher El-Gamal -- Taher Elgamal | |
306 | Snuffle | 31 | 1107 | | |
307 | Cryptographic engineering | 31 | 7785 | | |
308 | Ciphertext-only attack | 31 | 1019 | Ciphertext only attack -- Ciphertext-only | |
309 | Kerckhoffs' law | 30 | 4087 | Kerckhoff's principle -- Kerckhoffs' principle -- Shannon's maxim -- Kerkhoffs' law -- Kerkhoffs law -- Kerckhoffs law -- Kirckhoffs law -- Kerkchoffs law -- Kerchoffs law -- Kerchoff's law -- Kerchoff's Law -- Shannon's Maxim -- Kerchoffs' Law -- Kerckhoffs' Law -- Kerchkoffs' Law -- Kerkhoffs' Law | |
310 | 3-Way | 30 | 1777 | 3-WAY | |
311 | Tommy Flowers | 29 | 1962 | Tommy flowers -- Thomas Flowers -- Thomas Harold Flowers | |
312 | Straddling checkerboard | 29 | 5879 | | |
313 | RSA-2048 | 29 | 2509 | | |
314 | Needham-Schroeder | 29 | 1892 | | |
315 | Wide Mouth Frog | 28 | 1002 | | |
316 | Ralph Merkle | 28 | 1792 | | |
317 | Piling-up lemma | 28 | 4106 | Piling up lemma | |
318 | Phil Zimmermann | 28 | 2321 | PhilZimmermann -- Philip Zimmermann | |
319 | PURPLE | 28 | 4151 | Purple code -- Purple (cryptography) |
|
320 | Hushmail | 28 | 1489 | | |
321 | Friedrich Kasiski | 28 | 2803 | Kasiski -- Friedrich Wilhelm Kasiski | |
322 | David Kahn | 28 | 1931 | | |
323 | Type 1 encryption | 27 | 980 | Type 1 algorithm -- Type 1 product -- High-grade encryption -- Type I encryption | |
324 | RSA-100 | 27 | 522 | | |
325 | Malleability | 27 | 633 | Malleable -- Maellability | |
326 | Hans Thilo-Schmidt | 27 | 1850 | Asch -- Hans Thilo Schmidt | |
327 | Financial cryptography | 27 | 347 | | |
328 | Communication Theory of Secrecy Systems | 27 | 662 | | |
329 | Secure Terminal Equipment | 26 | 1721 | STE |
|
330 | Passphrase | 26 | 5716 | Pass-phrase -- Pass phrase | |
331 | OMAC | 26 | 637 | | |
332 | Josef Pieprzyk | 26 | 176 | | |
333 | Horst Feistel | 26 | 2462 | | |
334 | FNBDT | 26 | 5772 | | |
335 | SEAL (cipher) | 25 | 436 | SEAL (cryptography) | |
336 | MISTY1 | 25 | 1644 | MISTY-1 -- MISTY | |
337 | Known-plaintext attack | 25 | 767 | Known plaintext attack -- Known plaintext | |
338 | Elliptic Curve DSA | 25 | 759 | ECDSA | |
339 | DigiCipher 2 | 25 | 1545 | | |
340 | David Chaum | 25 | 339 | | |
341 | The Alphabet Cipher | 24 | 3442 | | |
342 | Tamper resistance | 24 | 1959 | Tamper-resistant -- Tamper resistant -- Tamper-resistance | |
343 | Secure multiparty computation | 24 | 3172 | Millionaire problem | |
344 | RSA-640 | 24 | 735 | | |
345 | RSA-129 | 24 | 1222 | | |
346 | Madryga | 24 | 4492 | | |
347 | Keyed-hash message authentication code | 24 | 1171 | HMAC -- Keyed-Hashing Message Authentication -- Hmac | |
348 | Key generation | 24 | 1562 | | |
349 | DES-X | 24 | 1683 | DESX | |
350 | RSA-140 | 23 | 1230 | | |
351 | RSA-1024 | 23 | 872 | | |
352 | Martin Hellman | 23 | 1329 | |
|
353 | ISAAC (cipher) | 23 | 1698 | ISAAC -- ISAAC (cryptography) | |
354 | Helix (cipher) | 23 | 1765 | | |
355 | Elizebeth Friedman | 23 | 11786 | Elizabeth Friedman |
|
356 | David Wagner | 23 | 1933 | | |
357 | Cryptome | 23 | 1173 | Cryptome.org | |
358 | Cryptologia | 23 | 451 | | |
359 | Common Scrambling Algorithm | 23 | 1971 | | |
360 | Blind signature | 23 | 3755 | | |
361 | Al Bhed | 23 | 2510 | | |
362 | VIC cipher | 22 | 1121 | | |
363 | Session key | 22 | 1592 | | |
364 | SHARK | 22 | 1468 | Shark (cipher) -- SHARK (cipher) | |
365 | Poem code | 22 | 1570 | | |
366 | Leo Marks | 22 | 7538 | Leopold Samuel Marks | |
367 | KHAZAD | 22 | 1480 | Khazad (cipher) -- KHAZAD (cipher) | |
368 | Henryk Zygalski | 22 | 627 | | |
369 | Central Security Service | 22 | 947 | | |
370 | TWIRL | 21 | 1770 | | |
371 | SHACAL | 21 | 2710 | SHACAL-1 -- Shacal-2 | |
372 | RSA-576 | 21 | 1119 | | |
373 | KW-37 | 21 | 3688 | KWR-37 -- KWT-37 | |
374 | John Tiltman | 21 | 3149 | | |
375 | Jerzy Rozycki | 21 | 1088 | Jerzy Różycki[[Talk:Jerzy R%F3%C5%BCycki| ]] | |
376 | EFS | 21 | 1523 | | |
377 | David Wheeler | 21 | 814 | | |
378 | DES supplementary material | 21 | 7677 | |
|
379 | Agnes Meyer Driscoll | 21 | 3301 | | |
380 | TrueCrypt | 20 | 1478 | Truecrypt | |
381 | Shrinking generator | 20 | 1152 | | |
382 | Electronic signature | 20 | 1367 | | |
383 | DEAL | 20 | 1447 | | |
384 | CAcert | 20 | 392 | | |
385 | Baby-step giant-step | 20 | 1142 | BSGS | |
386 | Arlington Hall | 20 | 1590 | |
|
387 | Visual cryptography | 19 | 986 | | |
388 | Snefru | 19 | 1116 | Snefru (cryptography) | |
389 | RSA-130 | 19 | 1351 | | |
390 | Lars Knudsen | 19 | 1668 | Lars R. Knudsen |
|
391 | Great Cypher | 19 | 829 | Great Cipher | |
392 | CRYPTO | 19 | 756 | | |
393 | CCMP | 19 | 286 | | |
394 | Semantic security | 18 | 1643 | | |
395 | Scrambler | 18 | 2458 | Descrambler | |
396 | Pike (cipher) | 18 | 637 | Pike (cryptography) | |
397 | Oblivious transfer | 18 | 899 | | |
398 | M-209 | 18 | 16425 | |
|
399 | Internet Security Association and Key Management Protocol | 18 | 486 | ISAKMP | |
400 | Frank Rowlett | 18 | 2867 | |
|
401 | Don Coppersmith | 18 | 829 | Donald Coppersmith | |
402 | Burrows-Abadi-Needham logic | 18 | 9097 | BAN logic -- BAN Logic | |
403 | Bifid cipher | 18 | 1536 | | |
404 | WAKE | 17 | 650 | | |
405 | Vincent Rijmen | 17 | 1325 | | |
406 | Secure copy | 17 | 1690 | SCP -- Scp -- Secure Copy Protocol -- Secure Copy | |
407 | Online Certificate Status Protocol | 17 | 495 | Ocsp -- OCSP | |
408 | M-94 | 17 | 3032 | M-94 (cypher) |
|
409 | Internet key exchange | 17 | 807 | IKE -- Internet Key Exchange | |
410 | Herbert Yardley | 17 | 6638 | Herbert O. Yardley |
|
411 | Digital timestamping | 17 | 2011 | | |
412 | Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age | 17 | 525 | | |
413 | Certificate revocation list | 17 | 3553 | CRL -- Certificate Revocation List -- Compromised key list | |
414 | W. T. Tutte | 16 | 1698 | Bill Tutte | |
415 | Trapdoor function | 16 | 1463 | Trapdoor one way function -- Trapdoor permutation | |
416 | Secure Communication based on Quantum Cryptography | 16 | 978 | SECOQC | |
417 | RED/BLACK concept | 16 | 806 | RED signal | |
418 | Merkle's Puzzles | 16 | 1684 | Merkle's puzzles -- Ralph Merkle puzzle cryptographic system | |
419 | MAGENTA | 16 | 1736 | MAGENTA (cipher) | |
420 | LOKI | 16 | 2934 | LOKI91 -- LOKI89 | |
421 | Key signing party | 16 | 1514 | Keysigning party |
|
422 | Key distribution center | 16 | 2297 | KDC | |
423 | Eli Biham | 16 | 725 | | |
424 | AxCrypt | 16 | 299 | | |
425 | Zeroise | 15 | 2504 | Zeroization | |
426 | Type 4 encryption | 15 | 627 | Type 4 algorithm | |
427 | Timing attack | 15 | 1795 | | |
428 | TWINKLE | 15 | 2690 | | |
429 | Stunnel | 15 | 564 | | |
430 | SYSKEY | 15 | 1055 | | |
431 | Root certificate | 15 | 1548 | | |
432 | RSA-768 | 15 | 767 | | |
433 | RSA-160 | 15 | 1212 | | |
434 | PMAC | 15 | 706 | | |
435 | Louis W. Tordella | 15 | 3060 | | |
436 | LOKI97 | 15 | 1553 | | |
437 | Key-agreement protocol | 15 | 1529 | | |
438 | Babington Plot | 15 | 1437 | Babington plot -- Anthony Babington's plot | |
439 | Type 2 encryption | 14 | 1060 | Type 2 product | |
440 | Simple public key infrastructure | 14 | 462 | Simple Public Key Infrastructure -- SPKI | |
441 | RSA-1536 | 14 | 1046 | | |
442 | RSA-150 | 14 | 880 | | |
443 | RSA-120 | 14 | 561 | | |
444 | Privacy-enhanced Electronic Mail | 14 | 308 | Privacy-enhanced electronic mail -- Privacy Enhanced Mail | |
445 | NTRUEncrypt | 14 | 1404 | NTRU | |
446 | Key server | 14 | 1197 | | |
447 | Joan Daemen | 14 | 512 | | |
448 | James H. Ellis | 14 | 2321 | | |
449 | ID-based cryptography | 14 | 2316 | ID Based Cryptography | |
450 | Hugo Hadwiger | 14 | 859 | | |
451 | Ciphony | 14 | 811 | | |
452 | The Code Book | 13 | 2658 | | |
453 | RSA-170 | 13 | 491 | | |
454 | Niels Ferguson | 13 | 659 | | |
455 | Mitsuru Matsui | 13 | 758 | | |
456 | McEliece | 13 | 1155 | | |
457 | Communications security | 13 | 2069 | COMSEC | |
458 | BATON | 13 | 1708 | | |
459 | Yuliang Zheng | 12 | 373 | | |
460 | World War II cryptography | 12 | 1944 | | |
461 | RSA-110 | 12 | 542 | | |
462 | Paillier cryptosystem | 12 | 1005 | Paillier | |
463 | N-Hash | 12 | 1076 | N-hash | |
464 | MMB | 12 | 1170 | | |
465 | Joseph Mauborgne | 12 | 352 | | |
466 | Gilbert Vernam | 12 | 1441 | | |
467 | Dining cryptographers protocol | 12 | 973 | Dining cryptographers -- Dining cryptographer -- Dining Cryptographers Protocol -- Dining cryptographer protocol -- Dining cryptographer's protocol | |
468 | Cryptographic Message Syntax | 12 | 843 | | |
469 | Crypto system | 12 | 1975 | Cryptosystem | |
470 | Boris Hagelin | 12 | 1360 | |
|
471 | Blind credential | 12 | 992 | | |
472 | Attacker | 12 | 285 | | |
473 | Strict avalanche criterion | 11 | 681 | Strict Avalanche Criterion | |
474 | Shafi Goldwasser | 11 | 1774 | Shafrira Goldwasser | |
475 | Secrets and Lies | 11 | 198 | | |
476 | SAVILLE | 11 | 1267 | Saville (cipher) | |
477 | RSA-896 | 11 | 805 | | |
478 | RSA-704 | 11 | 735 | | |
479 | RSA-480 | 11 | 849 | | |
480 | RSA-310 | 11 | 655 | | |
481 | KOV-14 | 11 | 668 | Fortezza Plus | |
482 | KCDSA | 11 | 858 | EC-KCDSA | |
483 | Edward Hebern | 11 | 1838 | Edward Hugh Hebern | |
484 | Challenge–response test | 11 | 825 | Challenge–response system | |
485 | Certification path validation algorithm | 11 | 306 | | |
486 | Certicom | 11 | 717 | | |
487 | COMSEC equipment | 11 | 340 | | |
488 | AN/CYZ-10 | 11 | 1214 | AN/CYZ-10 DTD |
|
489 | Superencryption | 10 | 202 | | |
490 | Schnorr signature | 10 | 1205 | | |
491 | Random oracle | 10 | 1139 | Random oracle model | |
492 | RSA-410 | 10 | 767 | | |
493 | RSA-250 | 10 | 571 | | |
494 | RSA-155 | 10 | 1406 | | |
495 | Probabilistic encryption | 10 | 1442 | Probabilistic Encryption | |
496 | Message forgery | 10 | 240 | | |
497 | Information-theoretically secure | 10 | 946 | | |
498 | FreeLIP | 10 | 134 | | |
499 | Direct anonymous attestation | 10 | 285 | | |
500 | Dilly Knox | 10 | 720 | Dilwyn Knox | |
501 | Cellular Message Encryption Algorithm | 10 | 1222 | CMEA (cipher) | |
502 | VINSON | 9 | 626 | | |
503 | SecurID | 9 | 1457 | | |
504 | RSA-617 | 9 | 1022 | | |
505 | RSA-500 | 9 | 869 | | |
506 | RSA-440 | 9 | 797 | | |
507 | RSA-330 | 9 | 675 | | |
508 | RSA-230 | 9 | 563 | | |
509 | RSA-200 | 9 | 521 | | |
510 | Power analysis | 9 | 3461 | | |
511 | Otway-Rees | 9 | 1274 | | |
512 | NSA encryption algorithms | 9 | 4758 | | |
513 | I. J. Good | 9 | 1665 | I.J. Good -- Irving Good | |
514 | Crypto-society | 9 | 1048 | Crypto-societies | |
515 | Blinding (cryptography) | 9 | 1631 | Blinding | |
516 | Bazeries cylinder | 9 | 12555 | Bazeries Cylinder | |
517 | Abraham Sinkov | 9 | 6920 | | |
518 | Type 3 encryption | 8 | 500 | Type 3 algorithm | |
519 | Trench code | 8 | 4412 | | |
520 | Torus based cryptography | 8 | 677 | | |
521 | Solomon Kullback | 8 | 368 | | |
522 | RSA-450 | 8 | 807 | | |
523 | RSA-370 | 8 | 715 | | |
524 | RSA-350 | 8 | 695 | | |
525 | RSA-300 | 8 | 633 | | |
526 | RSA-270 | 8 | 603 | | |
527 | RSA-210 | 8 | 531 | | |
528 | Peter Gutmann | 8 | 1128 | | |
529 | Paul Kocher | 8 | 1185 | | |
530 | Passive attack | 8 | 667 | | |
531 | CrossCrypt | 8 | 1560 | | |
532 | S/KEY | 7 | 514 | S/Key | |
533 | RSA-470 | 7 | 839 | | |
534 | RSA-460 | 7 | 829 | | |
535 | RSA-400 | 7 | 757 | | |
536 | RSA-360 | 7 | 705 | | |
537 | RSA-280 | 7 | 613 | | |
538 | RSA-260 | 7 | 593 | | |
539 | RSA-240 | 7 | 573 | | |
540 | RSA-232 | 7 | 565 | | |
541 | RSA-190 | 7 | 511 | | |
542 | Jefferson disk | 7 | 1440 | |
|
543 | George Scovell | 7 | 842 | | |
544 | Cryptology ePrint Archive | 7 | 425 | EPrint | |
545 | Crypto AG | 7 | 921 | | |
546 | CipherSaber | 7 | 804 | | |
547 | Certificate-based encryption | 7 | 1471 | | |
548 | Cayley-Purser algorithm | 7 | 997 | | |
549 | Bit-flipping attack | 7 | 1225 | | |
550 | Self-signed certificate | 6 | 2570 | Self signed certificate | |
551 | RSA-490 | 6 | 859 | | |
552 | RSA-420 | 6 | 777 | | |
553 | RSA-390 | 6 | 747 | | |
554 | RSA-340 | 6 | 685 | | |
555 | RSA-320 | 6 | 665 | | |
556 | RSA-309 | 6 | 654 | | |
557 | RSA-220 | 6 | 541 | | |
558 | RSA-180 | 6 | 501 | | |
559 | List of cryptographic key types | 6 | 5044 | Transmission security key | |
560 | Link encryption | 6 | 928 | End-to-end encryption -- Bulk encryption | |
561 | Key derivation function | 6 | 2370 | | |
562 | Journal of Cryptology | 6 | 320 | Journal of cryptology | |
563 | Joseph Rochefort | 6 | 5292 | John Joseph Rochefort | |
564 | Hyperelliptic curve cryptography | 6 | 1355 | | |
565 | HAS-160 | 6 | 395 | | |
566 | Garble | 6 | 929 | | |
567 | Cryptomathic | 6 | 367 | | |
568 | CryptoStick | 6 | 505 | | |
569 | Cryptanalytic computer | 6 | 341 | | |
570 | Anonymous publication | 6 | 1617 | | |
571 | WHIRLPOOL | 5 | 610 | Whirlpool (hash) -- Whirlpool (algorithm) | |
572 | Undeniable signature | 5 | 1055 | | |
573 | RSA-380 | 5 | 725 | | |
574 | RSA-290 | 5 | 623 | | |
575 | OTFE | 5 | 188 | | |
576 | Frank A. Stevenson | 5 | 268 | | |
577 | CryptoBuddy | 5 | 516 | | |
578 | Commitment scheme | 5 | 1875 | Bit commitment | |
579 | Codress message | 5 | 206 | | |
580 | Self-certifying key | 4 | 1148 | Self-Certifying Keys | |
581 | RSA-430 | 4 | 786 | | |
582 | LibTom Project | 4 | 1860 | LibTomNet -- LibTomCrypt -- LibTomPoly -- LibTomMath | |
583 | Laurence Safford | 4 | 3148 | |
|
584 | Harold Keen | 4 | 1533 | | |
585 | H.235 | 4 | 648 | | |
586 | FIREFLY | 4 | 340 | | |
587 | DRYAD | 4 | 2595 | DRYAD (Cryptography) |
|
588 | Cryptographically strong | 4 | 1263 | | |
589 | Cover (telecommunications) | 4 | 545 | | |
590 | Adaptive chosen plaintext and chosen ciphertext attack | 4 | 809 | | |
591 | Scott Vanstone | 3 | 213 | | |
592 | International Association for Cryptologic Research | 3 | 512 | IACR | |
593 | Harvest (computer) | 3 | 2270 | Harvest computer | |
594 | Cryptography newsgroups | 3 | 1966 | Sci.crypt | |
595 | Certificateless cryptography | 3 | 1144 | Certificateless Cryptography | |
596 | ABA digital signature guidelines | 3 | 909 | | |
597 | Template:Block ciphers [[Talk:Template:Block ciphers| ]] | 2 | 2018 | MediaWiki:Block ciphers[[Talk:MediaWiki:Block ciphers| ]] | |
598 | Cryptochannel | 2 | 693 | | |
599 | Secure key issuing cryptography | 1 | 1183 | Secure Key Issuing Cryptography | |
600 | Derek Taunt | 1 | 862 | | |
601 | Zimmermann-Sassaman key-signing protocol | 0 | 479 | Zimmmermann-Sassaman key signing protocol -- Zimmerman-Sassaman protocol -- Zimmerman-Sassaman key-signing protocol | |
602 | Vigenère cipher [[Talk:Vigen%E8re cipher| ]] | 0 | 8533 | Vigenère Cipher[[Talk:Vigen%E8re Cipher| ]]-- Vigenère cypher[[Talk:Vigen%E8re cypher| ]]-- Vigenere cipher | |
603 | Transmission security | 0 | 922 | TRANSEC | |
604 | Template:Classical cryptography [[Talk:Template:Classical cryptography| ]] | 0 | 1116 | MediaWiki:Classical cryptography[[Talk:MediaWiki:Classical cryptography| ]] | |
605 | Ståle Schumacher Ytteborg [[Talk:St%E5le Schumacher Ytteborg| ]] | 0 | 877 | Ståle Schumacher[[Talk:St%E5le Schumacher| ]]-- Stale Schumacher | |
606 | Simple XOR cipher | 0 | 1683 | Simple XOR Cipher | |
607 | SOBER-128 | 0 | 950 | | |
608 | Robert Tappan Morris, Sr. | 0 | 568 | | |
609 | NEMA (machine) | 0 | 1682 | | |
610 | Malcolm J. Williamson | 0 | 551 | Malcolm Williamson (cryptographer) | |
611 | List of telecommunications encryption terms | 0 | 1607 | Glossary of telecommunications encryption terms | |
612 | Le chiffre indéchiffrable [[Talk:Le chiffre ind%E9chiffrable| ]] | 0 | 2606 | The unbreakable cypher -- Le chifffre indechiffrable | |
613 | Hill cipher | 0 | 7707 | | |
614 | Cryptographie indéchiffrable [[Talk:Cryptographie ind%E9chiffrable| ]] | 0 | 663 | | |
615 | Blaise de Vigenère [[Talk:Blaise de Vigen%E8re| ]] | 0 | 1386 | |
|
616 | Biuro Szyfrów [[Talk:Biuro Szyfr%F3w| ]] | 0 | 2266 | Biuro Szyfrow | |
617 | Akelarre | 0 | 1241 | | |
618 | Étienne Bazeries [[Talk:%C9tienne Bazeries| ]] | 0 | 2633 | Bazeries -- Etienne Bazeries |
|