Wikipedia:WikiProject Spam/LinkReports/wiki.crypto.rub.de
{{User:COIBot/Summary/LinkReports}}
{{User:COIBot/linksaverdatabases|||||}}
{{NOINDEX}}
Links
- {{LinkSummary|archive.is}}
:* archive.is resolves to 139.99.89.157
:*: {{LinkSummary|139.99.89.157}}
:* Link is not on the blacklist.
:* Link is not on the domainredlist.
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link would be caught by rule \barchive\.is\b on the monitor list (Automonitor: reported to :en:MediaWiki:Spam-blacklist ([https://en.wikipedia.org/w/index.php?diff=712900996&oldid=712859789 diff] - )).
:* Link is whitelisted by \barchive\.is$ on [//af.wikipedia.org/wiki/Mediawiki:Spam-whitelist af.wikipedia.org]
:* Link is whitelisted by \barchive\.is$ on [//en.wikipedia.org/wiki/Mediawiki:Spam-whitelist en.wikipedia.org]
:* Link is whitelisted by \barchive\.is$ on [//ne.wikipedia.org/wiki/Mediawiki:Spam-whitelist ne.wikipedia.org]
- {{LinkSummary|archive.today}}
:* archive.today resolves to 139.99.89.157
:*: {{LinkSummary|139.99.89.157}}
:* archive.today is hosted on archive.phCategory:COIBot LinkReports for redirect sites
:*: {{LinkSummary|archive.ph}}
:* archive.ph resolves to 139.99.89.157
:*: {{LinkSummary|139.99.89.157}}
:* Link is not on the blacklist.
:* COIBot domainredlist search for link wiki.crypto.rub.de gives:
:*: archive.today (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=629829353&oldid=629828703 diff]))
:*: archive.today (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=632264826&oldid=632264642 diff]))
:*: archive.today (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([https://en.wikipedia.org/w/index.php?diff=726510966&oldid=726509279 diff]))
:*: archive.today (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([https://en.wikipedia.org/w/index.php?diff=727063598&oldid=727062755 diff]))
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link would be caught by rule \barchive\.today\b on the monitor list (Automonitor: reported to :en:MediaWiki:Spam-blacklist ([https://en.wikipedia.org/w/index.php?diff=712900996&oldid=712859789 diff] - )).
- {{LinkSummary|web.archive.org}}
:* web.archive.org resolves to 207.241.237.3
:*: {{LinkSummary|207.241.237.3}}
:* {{AdSenseSummary|7067388710469894}}
:* {{AdSenseSummary|9711450032241597}}
:* {{AdSenseSummary|1138714610918520}}
:* Link is not on the blacklist.
:* Link is not on the domainredlist.
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link is not on the monitor list.
- {{LinkSummary|wiki.crypto.rub.de}}
:* wiki.crypto.rub.de resolves to X
:*: {{LinkSummary|X}}
:* Link is not on the blacklist.
:* Link is not on the domainredlist.
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link would be caught by rule .*\.ru on the monitor list (Automonitor: reported to :nl:MediaWiki:Spam-blacklist ([https://nl.wikibooks.org/w/index.php?diff=382493&oldid=382221&rcid=409437 diff] - )).
Users
- {{IPSummary|103.10.66.74}}
- {{IPSummary|107.127.60.57}}
- {{IPSummary|110.11.201.175}}
- {{IPSummary|114.125.245.174}}
- {{IPSummary|116.206.13.170}}
- {{IPSummary|130.126.255.33}}
- {{IPSummary|130.156.110.186}}
- {{IPSummary|136.158.43.60}}
- {{IPSummary|151.37.69.173}}
- {{IPSummary|175.100.55.150}}
- {{IPSummary|175.100.6.26}}
- {{IPSummary|184.19.96.157}}
- {{IPSummary|194.54.48.12}}
- {{IPSummary|2.55.153.152}}
- {{UserSummary|2001:1430:A:420:AE9E:17FF:FEB4:FC80}}
- {{UserSummary|2001:56A:7487:1C00:30C9:41A0:DA84:E0A4}}
- {{IPSummary|202.65.91.7}}
- {{IPSummary|203.144.93.226}}
- {{IPSummary|207.11.1.168}}
- {{IPSummary|223.255.230.69}}
- {{UserSummary|2409:4064:10D:6446:1CCE:E2D5:BBE4:AC57}}
- {{UserSummary|2600:1700:1900:8A70:A5DC:E4D7:B5E6:59E5}}
- {{UserSummary|2600:387:C:7134:0:0:0:6}}
- {{UserSummary|2600:8805:C48D:E400:4A3:9D72:3FF:8F5D}}
- {{UserSummary|2601:3C6:4180:1670:FD6B:DD53:FE98:C9FC}}
- {{UserSummary|2603:7000:4401:7A00:E12D:B5E9:75A7:D750}}
- {{UserSummary|2603:9008:1001:CC49:A571:4F47:54D8:3B23}}
- {{UserSummary|2620:15C:170:110:3FBA:7182:7347:E522}}
- {{UserSummary|2804:214:8492:E63D:D966:DD3B:76BC:8E2}}
- {{IPSummary|37.111.12.32}}
- {{IPSummary|38.126.101.138}}
- {{IPSummary|67.185.21.25}}
- {{IPSummary|69.143.60.230}}
- {{IPSummary|70.114.201.156}}
- {{IPSummary|76.3.65.142}}
- {{IPSummary|84.246.203.253}}
- {{IPSummary|87.116.36.181}}
- {{IPSummary|92.40.171.88}}
- {{IPSummary|96.52.200.194}}
- {{IPSummary|98.239.227.65}}
- {{UserSummary|Alexmutasim}}
- {{UserSummary|Alfred Noble 3141}}
- AnomieBOT
- : User is whitelisted: User is in a trusted group bot on some wikis
- {{UserSummary|Anon lynx}}
- {{UserSummary|Anton.bersh}}
- ArglebargleIV
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- B.Zsoltbot
- : User is whitelisted: User is in a trusted group bot on some wikis
- Baden-Paul
- : User is whitelisted: User is in a trusted group rollbacker on some wikis
- Belbury
- : User is whitelisted: User is in a trusted group rollbacker on some wikis
- {{UserSummary|Bitcoin private key generator}}
- {{UserSummary|BrunnoRB}}
- {{UserSummary|BunnyyHop}}
- C.Fred
- : User is whitelisted: User is in trusted groups sysop, rollbacker on some wikis
- {{UserSummary|Carrag}}
- {{UserSummary|CarterFendley}}
- Citation bot
- : User is whitelisted: User is in a trusted group bot on some wikis
- ClueBot NG
- : User is whitelisted: User is in trusted groups bot, rollbacker, reviewer on some wikis
- {{UserSummary|DavidCary}}
- Dawnseeker2000
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- {{UserSummary|Dirkbb}}
- {{UserSummary|Dtgriscom}}
- {{UserSummary|Eddyd101}}
- Ettrig
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- {{UserSummary|Fullfungo}}
- Gg. Any
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Gillespie09}}
- GoingBatty
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- GreenC bot
- : User is whitelisted: User is in a trusted group bot on some wikis
- Guy Macon
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- Hadron137
- : User is whitelisted: User is in a trusted group rollbacker on some wikis
- InternetArchiveBot
- : User is whitelisted: User is in trusted groups bot, reviewer on some wikis
- JBW
- : User is whitelisted: User is in a trusted group sysop on some wikis
- JPxG
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Jdjlpwfj}}
- {{UserSummary|Jfcarrano}}
- Jim.henderson
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- {{UserSummary|Johnj1995}}
- Johnuniq
- : User is whitelisted: User is in trusted groups sysop, rollbacker on some wikis
- {{UserSummary|Kate Riley2019}}
- {{UserSummary|Liliana Giacalone}}
- LizardJr8
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- {{UserSummary|MalnadachBot}}
- Mean as custard
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- {{UserSummary|Mi Ga}}
- {{UserSummary|Mikhail Ryazanov}}
- Mindmatrix
- : User is whitelisted: User is in a trusted group sysop on some wikis
- Monkbot
- : User is whitelisted: User is in a trusted group bot on some wikis
- Nolispanmo
- : User is whitelisted: User is in trusted groups sysop, rollbacker on some wikis
- OAbot
- : User is whitelisted: User is in a trusted group bot on some wikis
- Otogi
- : User is whitelisted: User is in trusted groups sysop, rollbacker on some wikis
- Pil56-bot
- : User is whitelisted: User is in a trusted group bot on some wikis
- Pppery
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|ProfScience123}}
- {{UserSummary|Rami Mourshedy}}
- {{UserSummary|Renamed user 7z42t3k8qj}}
- {{UserSummary|Rlink2}}
- {{UserSummary|S Rifqi}}
- {{UserSummary|Sangramz}}
- Serols
- : User is whitelisted: User is in a trusted group reviewer on some wikis
- {{UserSummary|Sfwarriors99}}
- {{UserSummary|Shreyashpatodia}}
- {{UserSummary|Siphonarius}}
- {{UserSummary|Studio 101}}
- {{UserSummary|Superunsubscriber}}
- {{UserSummary|TaerimKim}}
- Tamzin
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Tarcieri}}
- TedColes
- : User is whitelisted: User is in a trusted group reviewer on some wikis
- Tedickey
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- Theklan
- : User is whitelisted: User is in trusted groups sysop, bureaucrat on some wikis
- {{UserSummary|Thodg}}
- {{UserSummary|Tiwutt12}}
- {{UserSummary|Tristan88855}}
- {{UserSummary|Tubeee}}
- Tymon.r
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- {{UserSummary|User-duck}}
- {{UserSummary|Vigan.abdurrahmani}}
- {{UserSummary|Vininipanini}}
- {{UserSummary|Wulfricqt}}
- {{UserSummary|პაატა შ}}
Additions
{{User:COIBot/Additionlist_top}}
{{User:COIBot/EditSummary|id=11778897|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Mean as custard|link=wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=http://en.wikipedia.org/w/index.php?diff=605624847&oldid=605624439|edit_id=-2|resolved=X|isIP=0|date=2014-04-24|time=16:24:01|wiki=en.wikipedia.org|revid=605624847|oldid=605624439|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=openssl.org|domain=openssl.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theinquirer.net/inquirer/news/2102435/aes-encryption-cracked/|domain=theinquirer.net|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.formaestudio.com/rijndaelinspector/archivos/Rijndael_Animation_v4_eng.swf|domain=formaestudio.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=webstore.iec.ch/preview/info_isoiec18033-3%7Bed2.0%7Den.pdf|domain=webstore.iec.ch|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/archive/aes/rijndael/wsdindex.html|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/fips197/fips-197.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=embeddedsw.net/Cipher_Reference_Home.html|domain=embeddedsw.net|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/sample_chapters.php|domain=wiki.crypto.rub.de|U=-1|L=173|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=grantmcwilliams.com/tech/technology/item/532-hardware-aes-showdown-via-padlock-vs-intel-aes-ni-vs-amd-hexacore|domain=grantmcwilliams.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/paper-aes-performance.pdf|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=openssl.org/docs/fips/fipsnotes.html|domain=openssl.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/STM/cavp/index.html|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=cnss.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=cnss.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=news.ycombinator.com/item?id=1937902|domain=news.ycombinator.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2010/594.pdf|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/581.pdf|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wisdom.weizmann.ac.il/~tromer/papers/cache.pdf|domain=wisdom.weizmann.ac.il|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cr.yp.to/papers.html#cachetiming|domain=cr.yp.to|U=-1|L=1394|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=research.microsoft.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2010/337.pdf|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/531|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/374|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007%2F978-3-642-03356-8_14|domain=dx.doi.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/317|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/crypto-gram-0010.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.macfergus.com/pub/rdalgeq.html|domain=macfergus.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/crypto-gram-0209.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.isg.rhul.ac.uk/~sean/|domain=isg.rhul.ac.uk|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=zdnet.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/paper-rijndael.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=code.google.com/p/byte-oriented-aes|domain=code.google.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.springerlink.com/index/UVX5NQGNN55VK199.pdf|domain=springerlink.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/paper-twofish-final.pdf|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=findarticles.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=nytimes.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/fips197/fips-197.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=research.microsoft.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=11779010|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=ClueBot NG|link=wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=http://en.wikipedia.org/w/index.php?diff=605624909&oldid=605624901|edit_id=-2|resolved=X|isIP=0|date=2014-04-24|time=16:24:36|wiki=en.wikipedia.org|revid=605624909|oldid=605624901|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups bot, rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=openssl.org|domain=openssl.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theinquirer.net/inquirer/news/2102435/aes-encryption-cracked/|domain=theinquirer.net|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.formaestudio.com/rijndaelinspector/archivos/Rijndael_Animation_v4_eng.swf|domain=formaestudio.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=webstore.iec.ch/preview/info_isoiec18033-3%7Bed2.0%7Den.pdf|domain=webstore.iec.ch|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/archive/aes/rijndael/wsdindex.html|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/fips197/fips-197.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=embeddedsw.net/Cipher_Reference_Home.html|domain=embeddedsw.net|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/sample_chapters.php|domain=wiki.crypto.rub.de|U=-1|L=173|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=grantmcwilliams.com/tech/technology/item/532-hardware-aes-showdown-via-padlock-vs-intel-aes-ni-vs-amd-hexacore|domain=grantmcwilliams.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/paper-aes-performance.pdf|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=openssl.org/docs/fips/fipsnotes.html|domain=openssl.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/STM/cavp/index.html|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=cnss.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=cnss.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=news.ycombinator.com/item?id=1937902|domain=news.ycombinator.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2010/594.pdf|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/581.pdf|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wisdom.weizmann.ac.il/~tromer/papers/cache.pdf|domain=wisdom.weizmann.ac.il|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cr.yp.to/papers.html#cachetiming|domain=cr.yp.to|U=-1|L=1394|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=research.microsoft.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2010/337.pdf|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/531|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/374|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007%2F978-3-642-03356-8_14|domain=dx.doi.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/317|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/crypto-gram-0010.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.macfergus.com/pub/rdalgeq.html|domain=macfergus.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/crypto-gram-0209.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.isg.rhul.ac.uk/~sean/|domain=isg.rhul.ac.uk|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=zdnet.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/paper-rijndael.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=code.google.com/p/byte-oriented-aes|domain=code.google.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.springerlink.com/index/UVX5NQGNN55VK199.pdf|domain=springerlink.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/paper-twofish-final.pdf|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=findarticles.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=nytimes.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/fips197/fips-197.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=research.microsoft.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=42497461|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=ClueBot NG|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=http://en.wikipedia.org/w/index.php?diff=640573586&oldid=640573546|edit_id=-2|resolved=X|isIP=0|date=2015-01-01|time=23:05:12|wiki=en.wikipedia.org|revid=640573586|oldid=640573546|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups bot, rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ladlass.com/intel/archives/010256.html|domain=ladlass.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=conservancy.umn.edu/handle/11299/107353|domain=conservancy.umn.edu|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=-1|L=173|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=grouper.ieee.org/groups/1363|domain=grouper.ieee.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cacr.math.uwaterloo.ca/hac/|domain=cacr.math.uwaterloo.ca|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=httpd.apache.org/docs/2.2/ssl/ssl_intro.html#cryptographictech|domain=httpd.apache.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1080%2F0161-119691884933|domain=dx.doi.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/stream/principlesofscie00jevorich#page/n166/mode/1up|domain=archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.emc.com/emc-plus/rsa-labs/standards-initiatives/what-is-a-digital-envelope.htm|domain=emc.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sans.org/information-security|domain=sans.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=64176603|lang=sq|wikidomain=w|namespace=|pagename=Algoritmi simetrik AES|username=Vigan.abdurrahmani|link=wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=http://sq.wikipedia.org/w/index.php?diff=1537166&oldid=1537163|edit_id=-2|resolved=X|isIP=0|date=2015-06-03|time=20:37:14|wiki=sq.wikipedia.org|revid=1537166|oldid=1537163|usercount=1|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/sample_chapters.php|domain=wiki.crypto.rub.de|U=1|L=173|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=70559026|lang=pt|wikidomain=w|namespace=|pagename=Criptografia de chave pública|username=BrunnoRB|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://pt.wikipedia.org/w/index.php?diff=43077495&oldid=42744031&rcid=59762639|edit_id=-2|resolved=X|isIP=0|date=2015-08-09|time=23:52:43|wiki=pt.wikipedia.org|revid=43077495|oldid=42744031|usercount=64|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=dx.doi.org/10.1080/0161-119691884933|domain=dx.doi.org|U=64|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/stream/principlesofscie00jevorich#page/n166/mode/1up|domain=archive.org|U=64|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.emc.com/emc-plus/rsa-labs/standards-initiatives/what-is-a-digital-envelope.htm|domain=emc.com|U=64|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sans.org/information-security|domain=sans.org|U=64|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.mathstat.dal.ca/~selinger/md5collision/|domain=mathstat.dal.ca|U=64|L=165|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=64|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ladlass.com/intel/archives/010256.html|domain=ladlass.com|U=64|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=conservancy.umn.edu/handle/11299/107353|domain=conservancy.umn.edu|U=64|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=64|L=173|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=grouper.ieee.org/groups/1363|domain=grouper.ieee.org|U=64|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cacr.math.uwaterloo.ca/hac/|domain=cacr.math.uwaterloo.ca|U=64|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=httpd.apache.org/docs/2.2/ssl/ssl_intro.html#cryptographictech|domain=httpd.apache.org|U=64|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=77382212|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=ClueBot NG|link=wiki.crypto.rub.de/Buch/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://en.wikipedia.org/w/index.php?diff=684385700&oldid=684385696|edit_id=-2|resolved=X|isIP=0|date=2015-10-06|time=09:26:55|wiki=en.wikipedia.org|revid=684385700|oldid=684385696|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups bot, rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.rfc-editor.org/rfc/rfc4772.txt|domain=rfc-editor.org|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2004/057.ps.gz|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=cs.technion.ac.il|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dhost.info/pasjagor/des/|domain=dhost.info|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sciengines.com/copacobana|domain=sciengines.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.itl.nist.gov/fipspubs/fip46-2.htm|domain=itl.nist.gov|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php#3|domain=wiki.crypto.rub.de|U=-1|L=173|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.springerlink.com/content/vrteugmt7erqqbw1/|domain=springerlink.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.8472|domain=citeseerx.ist.psu.edu|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.springerlink.com/content/92509p5l4ravyn62/|domain=springerlink.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=crypto.junod.info/sac01.html|domain=crypto.junod.info|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.esat.kuleuven.ac.be/~abiryuko/mla.pdf|domain=esat.kuleuven.ac.be|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.springerlink.com/content/16udaqwwl9ffrtxt/|domain=springerlink.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/details/crackingdessecre00elec|domain=archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=nfotemple.free.fr/site_cryptokg/site_roy/differential%20cryptanalysis%20of%20des-like%20cryptosystems.pdf|domain=nfotemple.free.fr|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.springerlink.com/content/k54h077np8714058/|domain=springerlink.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/fips197/fips-197.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/fips197/fips-197.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/archive/aes/pre-round1/aes_9701.txt|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/archive/aes/pre-round1/aes_9701.txt|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dl.acm.org/citation.cfm?id=705523|domain=dl.acm.org|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sciengines.com/company/news-a-events/74-des-in-1-day.html|domain=sciengines.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.copacobana.org/paper/copacobana_gettingstarted.pdf|domain=copacobana.org|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.itl.nist.gov/fipspubs/fip74.htm|domain=itl.nist.gov|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.itl.nist.gov/fipspubs/fip81.htm|domain=itl.nist.gov|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=edocket.access.gpo.gov/2004/04-16894.htm|domain=edocket.access.gpo.gov|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=nvl.nist.gov|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=nvl.nist.gov|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=iso.org|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnet.com/news/saluting-the-data-encryption-legacy/|domain=cnet.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cryptome.org/0001/nsa-meyer.htm|domain=cryptome.org|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=nsa.gov|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=emc.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=origin-computer.org|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=98766967|lang=fr|wikidomain=w|namespace=|pagename=Fonction de hachage cryptographique|username=Mi Ga|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://fr.wikipedia.org/w/index.php?diff=122735214&oldid=122735187&rcid=161964560|edit_id=-2|resolved=X|isIP=0|date=2016-01-26|time=02:10:59|wiki=fr.wikipedia.org|revid=122735214|oldid=122735187|usercount=8358|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=ehash.iaik.tugraz.at/wiki/The_eHash_Main_Page|domain=ehash.iaik.tugraz.at|U=8358|L=121|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=8358|L=173|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=123030722|lang=ka|wikidomain=w|namespace=|pagename=ასიმეტრიული კრიპტოსისტემა|username=პაატა შ|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://ka.wikipedia.org/w/index.php?diff=3087727&oldid=3003425|edit_id=-2|resolved=X|isIP=0|date=2016-04-19|time=06:46:41|wiki=ka.wikipedia.org|revid=3087727|oldid=3003425|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=books.google.com/books?id=Dam9zrViJjEC|domain=books.google.com|U=2|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=2|L=173|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=grouper.ieee.org/groups/1363|domain=grouper.ieee.org|U=2|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=278867994|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=DavidCary|link=wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://en.wikipedia.org/w/index.php?diff=794767763&oldid=793561889|edit_id=-2|resolved=X|isIP=0|date=2017-08-09|time=22:58:18|wiki=en.wikipedia.org|revid=794767763|oldid=793561889|usercount=3274|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/en/movies.php#3|domain=wiki.crypto.rub.de|U=3274|L=173|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=353559327|lang=it|wikidomain=w|namespace=|pagename=Funzione crittografica di hash|username=Liliana Giacalone|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://it.wikipedia.org/w/index.php?diff=92936853&oldid=92936079&rcid=231935393|edit_id=-2|resolved=X|isIP=0|date=2017-12-01|time=22:45:36|wiki=it.wikipedia.org|revid=92936853|oldid=92936079|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.cheapsslshop.com/blog/difference-between-hashing-and-encryption|domain=cheapsslshop.com|U=18|L=23|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.guardtime.com/educational-series-on-hashes/|domain=guardtime.com|U=18|L=73|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ehash.iaik.tugraz.at/wiki/The_eHash_Main_Page|domain=ehash.iaik.tugraz.at|U=18|L=121|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=18|L=173|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=496412254|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=ClueBot NG|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://en.wikipedia.org/w/index.php?diff=849249656&oldid=849249638|edit_id=-2|resolved=X|isIP=0|date=2018-07-07|time=16:46:30|wiki=en.wikipedia.org|revid=849249656|oldid=849249638|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups bot, rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.guardtime.com/educational-series-on-hashes/|domain=guardtime.com|U=-1|L=73|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.is|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ehash.iaik.tugraz.at/wiki/The_eHash_Main_Page|domain=ehash.iaik.tugraz.at|U=-1|L=121|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=-1|L=173|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/ST/hash/sha-3/sha-3_standardization.html|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ee.technion.ac.il/~hugo/rhash/|domain=ee.technion.ac.il|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/ST/hash/documents/HALEVI_UpdateonRandomizedHashing0824.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.forbes.com/sites/thomasbrewster/2017/02/23/google-sha-1-hack-why-it-matters/#3f73df04c8cd|domain=forbes.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=people.csail.mit.edu/yiqun/SHA1AttackProceedingVersion.pdf|domain=people.csail.mit.edu|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.win.tue.nl/hashclash/rogue-ca/|domain=win.tue.nl|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2008/075.pdf|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=article.gmane.org/gmane.comp.encryption.general/5154|domain=article.gmane.org|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.springerlink.com/index/DWWVMQJU0N0A3UGJ.pdf|domain=springerlink.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.com/books?id=HrCI4ZyuZL0C|domain=books.google.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.com/books?id=jaBuCQAAQBAJ|domain=books.google.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cryptrec.go.jp/estimation/techrep_id2401.pdf|domain=cryptrec.go.jp|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2010/193|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2007/278|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2004/304|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2004/253|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=doi.org/10.6028/NIST.SP.800-63b|domain=doi.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=password-hashing.net/call.html|domain=password-hashing.net|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.techrepublic.com/blog/security/use-md5-hashes-to-verify-software-downloads/374|domain=techrepublic.com|U=-1|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=link.springer.com/chapter/10.1007%2F978-3-540-71039-4_4|domain=link.springer.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=vnhacker.blogspot.com/2009/09/flickrs-api-signature-forgery.html|domain=vnhacker.blogspot.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=662123654|lang=de|wikidomain=w|namespace=|pagename=Kryptographie|username=Siphonarius|link=wiki.crypto.rub.de/Buch/slides_movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://de.wikipedia.org/w/index.php?diff=192364271&oldid=192364268|edit_id=-2|resolved=X|isIP=0|date=2019-09-18|time=12:10:48|wiki=de.wikipedia.org|revid=192364271|oldid=192364268|usercount=20947|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=beacon.findbuch.de/seemore/gnd-aks?format=sources&id=4033329-2|domain=beacon.findbuch.de|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=swb.bsz-bw.de/DB=2.104/SET=1/TTL=1/CMD?retrace=0&trm_old=&ACT=SRCHA&IKT=2999&SRT=RLV&TRM=4033329-2|domain=swb.bsz-bw.de|U=20947|L=247759|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=d-nb.info/gnd/4033329-2|domain=d-nb.info|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theregister.co.uk/2009/11/24/ripa_jfl|domain=theregister.co.uk|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=fm4.orf.at/stories/1728139/|domain=fm4.orf.at|U=20947|L=1658|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=crypto.stanford.edu/craig/craig-thesis.pdf|domain=crypto.stanford.edu|U=20947|L=724|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cs.jhu.edu/~rubin/courses/sp03/papers/diffie.hellman.pdf|domain=cs.jhu.edu|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.labbe.de/zzzebra/index.asp?themaid=472|domain=labbe.de|U=20947|L=52|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.zeit.de/zeit-magazin/2016/10/geheimschrift-botschaft-verschluesselung|domain=zeit.de|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.intypedia.com/?lang=en|domain=intypedia.com|U=20947|L=3|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/slides_movies.php|domain=wiki.crypto.rub.de|U=20947|L=173|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=omegataupodcast.net/2009/02/11/9-krpytographie-konzepte-anwendungen-sicherheit/|domain=omegataupodcast.net|U=20947|L=104|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hp-gramatke.de/crypto/german/page0010.htm|domain=hp-gramatke.de|U=20947|L=19|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.kryptographiespielplatz.de|domain=kryptographiespielplatz.de|U=20947|L=2|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hermetic.ch/crypto/introg.htm|domain=hermetic.ch|U=20947|L=539|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101007101433/http://home.egge.net/~savory/chiffre.htm|domain=web.archive.org|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.heise.de/security/artikel/Harte-Nuesse-Verschluesselungsverfahren-und-ihre-Anwendungen-270266.html?view=print|domain=heise.de|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090325034257/http://dud.inf.tu-dresden.de/~pfitza/SecCryptI_II.pdf|domain=web.archive.org|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070629161040/http://dud.inf.tu-dresden.de/~pfitza/DSuKrypt.pdf|domain=web.archive.org|U=20947|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.crypto-textbook.com|domain=crypto-textbook.com|U=20947|L=17|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=iaks-www.ira.uka.de/eiss/fileadmin/User/enigma.pdf|domain=iaks-ira.uka.de|U=20947|L=2|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=662125122|lang=de|wikidomain=w|namespace=|pagename=Kryptographie|username=Nolispanmo|link=wiki.crypto.rub.de/Buch/slides_movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://de.wikipedia.org/w/index.php?diff=192364352&oldid=192364331|edit_id=-2|resolved=X|isIP=0|date=2019-09-18|time=12:13:59|wiki=de.wikipedia.org|revid=192364352|oldid=192364331|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=beacon.findbuch.de/seemore/gnd-aks?format=sources&id=4033329-2|domain=beacon.findbuch.de|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=swb.bsz-bw.de/DB=2.104/SET=1/TTL=1/CMD?retrace=0&trm_old=&ACT=SRCHA&IKT=2999&SRT=RLV&TRM=4033329-2|domain=swb.bsz-bw.de|U=-1|L=247759|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=d-nb.info/gnd/4033329-2|domain=d-nb.info|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theregister.co.uk/2009/11/24/ripa_jfl|domain=theregister.co.uk|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=fm4.orf.at/stories/1728139/|domain=fm4.orf.at|U=-1|L=1658|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=crypto.stanford.edu/craig/craig-thesis.pdf|domain=crypto.stanford.edu|U=-1|L=724|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cs.jhu.edu/~rubin/courses/sp03/papers/diffie.hellman.pdf|domain=cs.jhu.edu|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.labbe.de/zzzebra/index.asp?themaid=472|domain=labbe.de|U=-1|L=52|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.zeit.de/zeit-magazin/2016/10/geheimschrift-botschaft-verschluesselung|domain=zeit.de|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.intypedia.com/?lang=en|domain=intypedia.com|U=-1|L=3|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/slides_movies.php|domain=wiki.crypto.rub.de|U=-1|L=173|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=omegataupodcast.net/2009/02/11/9-krpytographie-konzepte-anwendungen-sicherheit/|domain=omegataupodcast.net|U=-1|L=104|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hp-gramatke.de/crypto/german/page0010.htm|domain=hp-gramatke.de|U=-1|L=19|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.kryptographiespielplatz.de|domain=kryptographiespielplatz.de|U=-1|L=2|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hermetic.ch/crypto/introg.htm|domain=hermetic.ch|U=-1|L=539|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101007101433/http://home.egge.net/~savory/chiffre.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.heise.de/security/artikel/Harte-Nuesse-Verschluesselungsverfahren-und-ihre-Anwendungen-270266.html?view=print|domain=heise.de|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090325034257/http://dud.inf.tu-dresden.de/~pfitza/SecCryptI_II.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070629161040/http://dud.inf.tu-dresden.de/~pfitza/DSuKrypt.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.crypto-textbook.com|domain=crypto-textbook.com|U=-1|L=17|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=iaks-www.ira.uka.de/eiss/fileadmin/User/enigma.pdf|domain=iaks-ira.uka.de|U=-1|L=2|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=986279576|lang=id|wikidomain=w|namespace=|pagename=Kriptografi kunci publik|username=S Rifqi|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://id.wikipedia.org/w/index.php?oldid=17591328&rcid=37917765|edit_id=-2|resolved=X|isIP=0|date=2020-11-09|time=14:00:03|wiki=id.wikipedia.org|revid=17591328|oldid=0|usercount=2442|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=2442|L=173|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=grouper.ieee.org/groups/1363/|domain=grouper.ieee.org|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/details/handbookofapplie0000mene|domain=archive.org|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/details/Introduction_to_Modern_Cryptography|domain=archive.org|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=httpd.apache.org/docs/2.2/ssl/ssl_intro.html#cryptographictech|domain=httpd.apache.org|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cr.yp.to/antiforgery/forgery-20080501.pdf|domain=cr.yp.to|U=2442|L=1394|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/details/handbookofapplie0000mene|domain=archive.org|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cacr.uwaterloo.ca/hac/about/chap11.pdf|domain=cacr.uwaterloo.ca|U=2442|L=236|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.com/books?id=Dam9zrViJjEC|domain=books.google.com|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1064908990|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=84.246.203.253|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1011062995&oldid=1008274535|edit_id=-2|resolved=X|isIP=1|date=2021-03-08|time=20:32:30|wiki=en.wikipedia.org|revid=1011062995|oldid=1008274535|usercount=3830|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=3830|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=3830|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=3830|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=3830|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1057672869|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=InternetArchiveBot|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1013165618&oldid=1012386755|edit_id=-2|resolved=X|isIP=0|date=2021-03-20|time=11:35:21|wiki=en.wikipedia.org|revid=1013165618|oldid=1012386755|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups bot, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1080713200|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=User-duck|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1015182718&oldid=1012378149|edit_id=-2|resolved=X|isIP=0|date=2021-03-31|time=01:48:29|wiki=en.wikipedia.org|revid=1015182718|oldid=1012378149|usercount=51432|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=51432|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=51432|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=51432|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=51432|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1080790805|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=User-duck|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1015190126&oldid=1015182718|edit_id=-2|resolved=X|isIP=0|date=2021-03-31|time=02:44:41|wiki=en.wikipedia.org|revid=1015190126|oldid=1015182718|usercount=51432|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=51432|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=51432|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=51432|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=51432|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1086284086|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Sfwarriors99|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1015684507&oldid=1015190126|edit_id=-2|resolved=X|isIP=0|date=2021-04-02|time=22:05:32|wiki=en.wikipedia.org|revid=1015684507|oldid=1015190126|usercount=506|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=506|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=506|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=506|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=506|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1093960583|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Johnj1995|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1016384012&oldid=996197167|edit_id=-2|resolved=X|isIP=0|date=2021-04-06|time=21:52:17|wiki=en.wikipedia.org|revid=1016384012|oldid=996197167|usercount=105630|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=105630|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1103253860|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=98.239.227.65|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1017308528&oldid=1013165618|edit_id=-2|resolved=X|isIP=1|date=2021-04-12|time=01:34:57|wiki=en.wikipedia.org|revid=1017308528|oldid=1013165618|usercount=3882|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=3882|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=3882|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=3882|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1105927975|lang=it|wikidomain=w|namespace=|pagename=Funzione crittografica di hash|username=2603:7000:4401:7A00:E12D:B5E9:75A7:D750|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://it.wikipedia.org/w/index.php?diff=119898687&oldid=118354053&rcid=287708103|edit_id=-2|resolved=X|isIP=1|date=2021-04-13|time=09:09:30|wiki=it.wikipedia.org|revid=119898687|oldid=118354053|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.is|U=2|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=2|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1111266179|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Tarcieri|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1018023767&oldid=1008726613|edit_id=-2|resolved=X|isIP=0|date=2021-04-15|time=21:59:58|wiki=en.wikipedia.org|revid=1018023767|oldid=1008726613|usercount=63|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=63|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=63|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1112081477|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=OAbot|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1018103698&oldid=1016384012|edit_id=-2|resolved=X|isIP=0|date=2021-04-16|time=08:29:44|wiki=en.wikipedia.org|revid=1018103698|oldid=1016384012|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1114400308|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Superunsubscriber|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1018307609&oldid=1012336659|edit_id=-2|resolved=X|isIP=0|date=2021-04-17|time=10:32:23|wiki=en.wikipedia.org|revid=1018307609|oldid=1012336659|usercount=560|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=560|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=560|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=560|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=560|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=560|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1118477046|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=96.52.200.194|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1018710918&oldid=1018307609|edit_id=-2|resolved=X|isIP=1|date=2021-04-19|time=13:12:36|wiki=en.wikipedia.org|revid=1018710918|oldid=1018307609|usercount=6|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.7717/peerj.6411/supp-1|domain=dx.doi.org|U=6|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1120557064|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Shreyashpatodia|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1018892072&oldid=1018717279|edit_id=-2|resolved=X|isIP=0|date=2021-04-20|time=13:14:28|wiki=en.wikipedia.org|revid=1018892072|oldid=1018717279|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1122124580|lang=id|wikidomain=w|namespace=|pagename=Penyandian aliran|username=S Rifqi|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://id.wikipedia.org/w/index.php?oldid=18278560&rcid=40150734|edit_id=-2|resolved=X|isIP=0|date=2021-04-21|time=07:00:08|wiki=id.wikipedia.org|revid=18278560|oldid=0|usercount=2442|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=2442|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.cosic.esat.kuleuven.be/publications/thesis-167.pdf|domain=cosic.esat.kuleuven.be|U=2442|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ftp.rsasecurity.com/pub/pdfs/tr701.pdf|domain=ftp.rsasecurity.com|U=2442|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=2442|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=doi.org/10.1007%2F3-540-39757-4_9|domain=doi.org|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=link.springer.com/content/pdf/10.1007/3-540-39757-4_9.pdf|domain=link.springer.com|U=2442|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ftp.rsasecurity.com/pub/pdfs/tr701.pdf|domain=ftp.rsasecurity.com|U=2442|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1125328788|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Anton.bersh|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1019339277&oldid=1015684507|edit_id=-2|resolved=X|isIP=0|date=2021-04-22|time=19:42:12|wiki=en.wikipedia.org|revid=1019339277|oldid=1015684507|usercount=23076|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=23076|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=23076|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=23076|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=23076|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1144338226|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Guy Macon|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1020998813&oldid=1019339277|edit_id=-2|resolved=X|isIP=0|date=2021-05-02|time=09:39:39|wiki=en.wikipedia.org|revid=1020998813|oldid=1019339277|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1144381046|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Anton.bersh|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1021002215&oldid=1020998813|edit_id=-2|resolved=X|isIP=0|date=2021-05-02|time=10:12:26|wiki=en.wikipedia.org|revid=1021002215|oldid=1020998813|usercount=23076|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=23076|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=23076|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=23076|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=23076|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1147002234|lang=ka|wikidomain=w|namespace=|pagename=ასიმეტრიული კრიპტოსისტემა|username=Otogi|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://ka.wikipedia.org/w/index.php?diff=4192968&oldid=4082037|edit_id=-2|resolved=X|isIP=0|date=2021-05-03|time=17:05:20|wiki=ka.wikipedia.org|revid=4192968|oldid=4082037|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1147825294|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=Alexmutasim|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1021315204&oldid=1017308528|edit_id=-2|resolved=X|isIP=0|date=2021-05-04|time=01:36:53|wiki=en.wikipedia.org|revid=1021315204|oldid=1017308528|usercount=461|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=461|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=461|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=461|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1152003713|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=OAbot|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1021658212&oldid=1018023767|edit_id=-2|resolved=X|isIP=0|date=2021-05-05|time=23:04:53|wiki=en.wikipedia.org|revid=1021658212|oldid=1018023767|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1152975293|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Thodg|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1021744080&oldid=1018103698|edit_id=-2|resolved=X|isIP=0|date=2021-05-06|time=12:47:26|wiki=en.wikipedia.org|revid=1021744080|oldid=1018103698|usercount=19|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1155707383|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=OAbot|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1022017300&oldid=1006795658|edit_id=-2|resolved=X|isIP=0|date=2021-05-07|time=23:17:54|wiki=en.wikipedia.org|revid=1022017300|oldid=1006795658|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1165407074|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=92.40.171.88|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1022926534&oldid=1018892072|edit_id=-2|resolved=X|isIP=1|date=2021-05-13|time=09:23:36|wiki=en.wikipedia.org|revid=1022926534|oldid=1018892072|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1167337408|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Tristan88855|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1023101795&oldid=1022926534|edit_id=-2|resolved=X|isIP=0|date=2021-05-14|time=11:20:04|wiki=en.wikipedia.org|revid=1023101795|oldid=1022926534|usercount=6|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=6|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=cryptocellar.org/cesg/possnse.pdf|domain=cryptocellar.org|U=6|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=6|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1179358092|lang=eu|wikidomain=w|namespace=|pagename=Kriptografia asimetriko|username=Theklan|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://eu.wikipedia.org/w/index.php?diff=8531414&oldid=8401592|edit_id=-2|resolved=X|isIP=0|date=2021-05-20|time=16:59:49|wiki=eu.wikipedia.org|revid=8531414|oldid=8401592|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, bureaucrat on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1196028382|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=GoingBatty|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1025616728&oldid=1023101795|edit_id=-2|resolved=X|isIP=0|date=2021-05-28|time=15:06:00|wiki=en.wikipedia.org|revid=1025616728|oldid=1023101795|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1196030109|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=GoingBatty|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1025616886&oldid=1025616728|edit_id=-2|resolved=X|isIP=0|date=2021-05-28|time=15:07:01|wiki=en.wikipedia.org|revid=1025616886|oldid=1025616728|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1210463335|lang=it|wikidomain=w|namespace=|pagename=Funzione crittografica di hash|username=Pil56-bot|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://it.wikipedia.org/w/index.php?diff=121091071&oldid=119898687&rcid=290155494|edit_id=-2|resolved=X|isIP=0|date=2021-06-05|time=11:04:56|wiki=it.wikipedia.org|revid=121091071|oldid=119898687|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1215567401|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Sangramz|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1027510338&oldid=1021301526|edit_id=-2|resolved=X|isIP=0|date=2021-06-08|time=10:17:09|wiki=en.wikipedia.org|revid=1027510338|oldid=1021301526|usercount=905|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=905|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=905|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=905|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=905|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1223058982|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=ProfScience123|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1028234657&oldid=1021658212|edit_id=-2|resolved=X|isIP=0|date=2021-06-12|time=18:02:34|wiki=en.wikipedia.org|revid=1028234657|oldid=1021658212|usercount=39|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=39|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1223069822|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=JBW|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1028235936&oldid=1028234657|edit_id=-2|resolved=X|isIP=0|date=2021-06-12|time=18:12:39|wiki=en.wikipedia.org|revid=1028235936|oldid=1028234657|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1224895678|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=2600:1700:1900:8A70:A5DC:E4D7:B5E6:59E5|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1028414869&oldid=1021315204|edit_id=-2|resolved=X|isIP=1|date=2021-06-13|time=21:05:22|wiki=en.wikipedia.org|revid=1028414869|oldid=1021315204|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1232641448|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=70.114.201.156|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1029142053&oldid=1027510338|edit_id=-2|resolved=X|isIP=1|date=2021-06-18|time=05:00:41|wiki=en.wikipedia.org|revid=1029142053|oldid=1027510338|usercount=145|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=145|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=145|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=145|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=145|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1237707514|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=CarterFendley|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1029634248&oldid=1025616886|edit_id=-2|resolved=X|isIP=0|date=2021-06-21|time=04:45:33|wiki=en.wikipedia.org|revid=1029634248|oldid=1025616886|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1242588998|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=2600:387:C:7134:0:0:0:6|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1030077916&oldid=1028235936|edit_id=-2|resolved=X|isIP=1|date=2021-06-23|time=18:51:17|wiki=en.wikipedia.org|revid=1030077916|oldid=1028235936|usercount=37|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=37|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1242587904|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Renamed user 7z42t3k8qj|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1030077979&oldid=1030077916|edit_id=-2|resolved=X|isIP=0|date=2021-06-23|time=18:51:42|wiki=en.wikipedia.org|revid=1030077979|oldid=1030077916|usercount=0|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=csrc.nist.gov|U=0|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=csrc.nist.gov|U=0|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=0|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}}}
{{User:COIBot/EditSummary|id=1246578113|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=114.125.245.174|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1030427260&oldid=1029142053|edit_id=-2|resolved=X|isIP=1|date=2021-06-25|time=21:04:48|wiki=en.wikipedia.org|revid=1030427260|oldid=1029142053|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1246635966|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Dirkbb|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1030432829&oldid=1030427260|edit_id=-2|resolved=X|isIP=0|date=2021-06-25|time=21:49:49|wiki=en.wikipedia.org|revid=1030432829|oldid=1030427260|usercount=34170|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=34170|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=34170|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=34170|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=34170|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1250528121|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=Tubeee|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1030822489&oldid=1028414869|edit_id=-2|resolved=X|isIP=0|date=2021-06-28|time=06:47:34|wiki=en.wikipedia.org|revid=1030822489|oldid=1028414869|usercount=29|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=29|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=29|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=29|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1255722777|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=2001:56A:7487:1C00:30C9:41A0:DA84:E0A4|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1031393912&oldid=1030077979|edit_id=-2|resolved=X|isIP=1|date=2021-07-01|time=10:46:22|wiki=en.wikipedia.org|revid=1031393912|oldid=1030077979|usercount=39|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=39|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1255734930|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Johnuniq|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1031394894&oldid=1031393912|edit_id=-2|resolved=X|isIP=0|date=2021-07-01|time=10:54:22|wiki=en.wikipedia.org|revid=1031394894|oldid=1031393912|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1264733656|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=175.100.6.26|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1032298032&oldid=1030432829|edit_id=-2|resolved=X|isIP=1|date=2021-07-06|time=15:52:08|wiki=en.wikipedia.org|revid=1032298032|oldid=1030432829|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=5|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=5|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.facebook.com/profile.php?id=100035624976155|domain=facebook.com|U=5|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1264739684|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Serols|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1032298511&oldid=1032298032|edit_id=-2|resolved=X|isIP=0|date=2021-07-06|time=15:56:06|wiki=en.wikipedia.org|revid=1032298511|oldid=1032298032|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1269211396|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Studio 101|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1032697203&oldid=1029634248|edit_id=-2|resolved=X|isIP=0|date=2021-07-09|time=02:49:53|wiki=en.wikipedia.org|revid=1032697203|oldid=1029634248|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1269212464|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=ArglebargleIV|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1032697288&oldid=1032697203|edit_id=-2|resolved=X|isIP=0|date=2021-07-09|time=02:50:48|wiki=en.wikipedia.org|revid=1032697288|oldid=1032697203|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1271389522|lang=fa|wikidomain=w|namespace=|pagename=استاندارد رمزنگاری پیشرفته|username=InternetArchiveBot|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://fa.wikipedia.org/w/index.php?diff=32575366&oldid=30936018&rcid=70340559|edit_id=-2|resolved=X|isIP=0|date=2021-07-10|time=07:06:19|wiki=fa.wikipedia.org|revid=32575366|oldid=30936018|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups bot, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20121031114745/http://www.theinquirer.net/inquirer/news/2102435/aes-encryption-cracked|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1274443129|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=107.127.60.57|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1033156990&oldid=1032697288|edit_id=-2|resolved=X|isIP=1|date=2021-07-11|time=23:56:17|wiki=en.wikipedia.org|revid=1033156990|oldid=1032697288|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1274453093|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=JPxG|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1033158055&oldid=1033156990|edit_id=-2|resolved=X|isIP=0|date=2021-07-12|time=00:05:03|wiki=en.wikipedia.org|revid=1033158055|oldid=1033156990|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1277161155|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=194.54.48.12|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1033379526&oldid=1021744080|edit_id=-2|resolved=X|isIP=1|date=2021-07-13|time=09:46:28|wiki=en.wikipedia.org|revid=1033379526|oldid=1021744080|usercount=62|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=62|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1277177533|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Dawnseeker2000|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1033380758&oldid=1033379526|edit_id=-2|resolved=X|isIP=0|date=2021-07-13|time=09:59:17|wiki=en.wikipedia.org|revid=1033380758|oldid=1033379526|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1287122061|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=37.111.12.32|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1034073197&oldid=1022017300|edit_id=-2|resolved=X|isIP=1|date=2021-07-17|time=16:29:17|wiki=en.wikipedia.org|revid=1034073197|oldid=1022017300|usercount=3|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=3|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=3|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=3|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1307889684|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=203.144.93.226|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1035862245&oldid=1033158055|edit_id=-2|resolved=X|isIP=1|date=2021-07-28|time=03:30:51|wiki=en.wikipedia.org|revid=1035862245|oldid=1033158055|usercount=8|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=8|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=8|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=8|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=8|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=8|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1307917697|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Dawnseeker2000|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1035865695&oldid=1035862245|edit_id=-2|resolved=X|isIP=0|date=2021-07-28|time=04:04:10|wiki=en.wikipedia.org|revid=1035865695|oldid=1035862245|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1309924073|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=2001:1430:A:420:AE9E:17FF:FEB4:FC80|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1036062406&oldid=1030822489|edit_id=-2|resolved=X|isIP=1|date=2021-07-29|time=07:55:08|wiki=en.wikipedia.org|revid=1036062406|oldid=1030822489|usercount=28|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=28|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=28|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=28|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1310351371|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=207.11.1.168|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1036103465&oldid=1035865695|edit_id=-2|resolved=X|isIP=1|date=2021-07-29|time=14:23:35|wiki=en.wikipedia.org|revid=1036103465|oldid=1035865695|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1313178474|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=2600:8805:C48D:E400:4A3:9D72:3FF:8F5D|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1036380924&oldid=1036103465|edit_id=-2|resolved=X|isIP=1|date=2021-07-31|time=05:43:59|wiki=en.wikipedia.org|revid=1036380924|oldid=1036103465|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1319814711|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=2409:4064:10D:6446:1CCE:E2D5:BBE4:AC57|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1036944082&oldid=1033380758|edit_id=-2|resolved=X|isIP=1|date=2021-08-03|time=16:24:15|wiki=en.wikipedia.org|revid=1036944082|oldid=1033380758|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1319816012|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Baden-Paul|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1036944200&oldid=1036944082|edit_id=-2|resolved=X|isIP=0|date=2021-08-03|time=16:24:59|wiki=en.wikipedia.org|revid=1036944200|oldid=1036944082|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1326066378|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=2601:3C6:4180:1670:FD6B:DD53:FE98:C9FC|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1037352745&oldid=1036944200|edit_id=-2|resolved=X|isIP=1|date=2021-08-06|time=01:38:03|wiki=en.wikipedia.org|revid=1037352745|oldid=1036944200|usercount=133|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1326068746|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=2601:3C6:4180:1670:FD6B:DD53:FE98:C9FC|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1037352939&oldid=1031394894|edit_id=-2|resolved=X|isIP=1|date=2021-08-06|time=01:39:40|wiki=en.wikipedia.org|revid=1037352939|oldid=1031394894|usercount=133|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=133|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1326068869|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=C.Fred|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1037352955&oldid=1037352939|edit_id=-2|resolved=X|isIP=0|date=2021-08-06|time=01:39:53|wiki=en.wikipedia.org|revid=1037352955|oldid=1037352939|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1326068978|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=C.Fred|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1037352975&oldid=1037352745|edit_id=-2|resolved=X|isIP=0|date=2021-08-06|time=01:40:04|wiki=en.wikipedia.org|revid=1037352975|oldid=1037352745|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1326071863|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=2601:3C6:4180:1670:FD6B:DD53:FE98:C9FC|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1037353111&oldid=1037352955|edit_id=-2|resolved=X|isIP=1|date=2021-08-06|time=01:41:22|wiki=en.wikipedia.org|revid=1037353111|oldid=1037352955|usercount=133|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=133|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1326072355|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=C.Fred|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1037353186&oldid=1037353111|edit_id=-2|resolved=X|isIP=0|date=2021-08-06|time=01:42:09|wiki=en.wikipedia.org|revid=1037353186|oldid=1037353111|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1326074145|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=2601:3C6:4180:1670:FD6B:DD53:FE98:C9FC|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1037353324&oldid=1037353186|edit_id=-2|resolved=X|isIP=1|date=2021-08-06|time=01:43:45|wiki=en.wikipedia.org|revid=1037353324|oldid=1037353186|usercount=133|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=133|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=133|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1326076931|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Tymon.r|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1037353528&oldid=1037353324|edit_id=-2|resolved=X|isIP=0|date=2021-08-06|time=01:45:41|wiki=en.wikipedia.org|revid=1037353528|oldid=1037353324|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1327269744|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=2620:15C:170:110:3FBA:7182:7347:E522|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1037451117&oldid=1036380924|edit_id=-2|resolved=X|isIP=1|date=2021-08-06|time=16:47:32|wiki=en.wikipedia.org|revid=1037451117|oldid=1036380924|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1335596093|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=2804:214:8492:E63D:D966:DD3B:76BC:8E2|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1038194102&oldid=1037353528|edit_id=-2|resolved=X|isIP=1|date=2021-08-11|time=02:30:43|wiki=en.wikipedia.org|revid=1038194102|oldid=1037353528|usercount=39|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=39|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1337775253|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Kate Riley2019|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1038422908&oldid=1032298511|edit_id=-2|resolved=X|isIP=0|date=2021-08-12|time=13:06:59|wiki=en.wikipedia.org|revid=1038422908|oldid=1032298511|usercount=2764|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=2764|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=2764|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=2764|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=2764|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1345302267|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Mikhail Ryazanov|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1039130480&oldid=1038194102|edit_id=-2|resolved=X|isIP=0|date=2021-08-16|time=21:36:47|wiki=en.wikipedia.org|revid=1039130480|oldid=1038194102|usercount=22359|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=22359|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1345306661|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Mikhail Ryazanov|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1039131031&oldid=1039130480|edit_id=-2|resolved=X|isIP=0|date=2021-08-16|time=21:41:25|wiki=en.wikipedia.org|revid=1039131031|oldid=1039130480|usercount=22359|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=22359|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=22359|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1354349818|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=202.65.91.7|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1040005462&oldid=1038422908|edit_id=-2|resolved=X|isIP=1|date=2021-08-22|time=03:34:31|wiki=en.wikipedia.org|revid=1040005462|oldid=1038422908|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1359937285|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=Jdjlpwfj|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1040581257&oldid=1034073197|edit_id=-2|resolved=X|isIP=0|date=2021-08-25|time=12:00:43|wiki=en.wikipedia.org|revid=1040581257|oldid=1034073197|usercount=72|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=72|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=72|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=72|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1362090608|lang=it|wikidomain=w|namespace=|pagename=Funzione crittografica di hash|username=151.37.69.173|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://it.wikipedia.org/w/index.php?diff=122689778&oldid=121091071&rcid=293543862|edit_id=-2|resolved=X|isIP=1|date=2021-08-26|time=17:59:50|wiki=it.wikipedia.org|revid=122689778|oldid=121091071|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.is|U=2|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=2|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1363024859|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=Jdjlpwfj|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1040875958&oldid=1040581257|edit_id=-2|resolved=X|isIP=0|date=2021-08-27|time=06:13:01|wiki=en.wikipedia.org|revid=1040875958|oldid=1040581257|usercount=72|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=72|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=72|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=72|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1364477020|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Jfcarrano|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1041001153&oldid=1040005462|edit_id=-2|resolved=X|isIP=0|date=2021-08-27|time=23:31:39|wiki=en.wikipedia.org|revid=1041001153|oldid=1040005462|usercount=148|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=148|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=148|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=148|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=148|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1364525315|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=BunnyyHop|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1041005740&oldid=1037451117|edit_id=-2|resolved=X|isIP=0|date=2021-08-28|time=00:17:59|wiki=en.wikipedia.org|revid=1041005740|oldid=1037451117|usercount=17350|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=17350|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=17350|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=17350|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=17350|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=doi.org/10.1007%2F978-3-662-03269-5|domain=doi.org|U=17350|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=17350|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1372015859|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Ettrig|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1041760307&oldid=1041005740|edit_id=-2|resolved=X|isIP=0|date=2021-09-01|time=09:44:41|wiki=en.wikipedia.org|revid=1041760307|oldid=1041005740|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1372508543|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=2603:9008:1001:CC49:A571:4F47:54D8:3B23|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1041808594&oldid=1041760307|edit_id=-2|resolved=X|isIP=1|date=2021-09-01|time=16:42:36|wiki=en.wikipedia.org|revid=1041808594|oldid=1041760307|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1372542709|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=184.19.96.157|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1041811466&oldid=1041808594|edit_id=-2|resolved=X|isIP=1|date=2021-09-01|time=17:04:14|wiki=en.wikipedia.org|revid=1041811466|oldid=1041808594|usercount=642|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=642|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=642|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=642|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=642|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=642|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1375273356|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=Tedickey|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1042112343&oldid=1040875958|edit_id=-2|resolved=X|isIP=0|date=2021-09-03|time=07:50:12|wiki=en.wikipedia.org|revid=1042112343|oldid=1040875958|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.cosic.esat.kuleuven.be/publications/thesis-167.pdf|domain=cosic.esat.kuleuven.be|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.networkdls.com/Articles/tr-701.pdf|domain=networkdls.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1378038878|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Eddyd101|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1042467865&oldid=1041811466|edit_id=-2|resolved=X|isIP=0|date=2021-09-05|time=04:32:06|wiki=en.wikipedia.org|revid=1042467865|oldid=1041811466|usercount=649|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=649|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=649|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=649|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=649|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=649|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1380422540|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=69.143.60.230|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1042741868&oldid=1036062406|edit_id=-2|resolved=X|isIP=1|date=2021-09-06|time=14:47:03|wiki=en.wikipedia.org|revid=1042741868|oldid=1036062406|usercount=498|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=498|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=498|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=498|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1383877348|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=175.100.55.150|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1043144129&oldid=1041001153|edit_id=-2|resolved=X|isIP=1|date=2021-09-08|time=15:31:33|wiki=en.wikipedia.org|revid=1043144129|oldid=1041001153|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1384149764|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=TaerimKim|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1043172841&oldid=1043144129|edit_id=-2|resolved=X|isIP=0|date=2021-09-08|time=18:37:12|wiki=en.wikipedia.org|revid=1043172841|oldid=1043144129|usercount=98|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=98|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=98|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=98|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=98|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1395710489|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Tiwutt12|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1044562245&oldid=1037352975|edit_id=-2|resolved=X|isIP=0|date=2021-09-15|time=22:12:20|wiki=en.wikipedia.org|revid=1044562245|oldid=1037352975|usercount=20|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=20|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1395709955|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=ClueBot NG|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1044562253&oldid=1044562245|edit_id=-2|resolved=X|isIP=0|date=2021-09-15|time=22:12:26|wiki=en.wikipedia.org|revid=1044562253|oldid=1044562245|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups bot, rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1398617543|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=130.126.255.33|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1044936366&oldid=1039131031|edit_id=-2|resolved=X|isIP=1|date=2021-09-17|time=21:05:05|wiki=en.wikipedia.org|revid=1044936366|oldid=1039131031|usercount=39|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=39|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=39|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1400571391|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Eddyd101|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1045159337&oldid=1043172841|edit_id=-2|resolved=X|isIP=0|date=2021-09-19|time=04:56:20|wiki=en.wikipedia.org|revid=1045159337|oldid=1043172841|usercount=649|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=649|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=649|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=649|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=649|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}}}
{{User:COIBot/EditSummary|id=1405334083|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=136.158.43.60|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1045736249&oldid=1045159337|edit_id=-2|resolved=X|isIP=1|date=2021-09-22|time=05:16:44|wiki=en.wikipedia.org|revid=1045736249|oldid=1045159337|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=18|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=18|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1405338006|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Tamzin|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1045736725&oldid=1045736249|edit_id=-2|resolved=X|isIP=0|date=2021-09-22|time=05:21:31|wiki=en.wikipedia.org|revid=1045736725|oldid=1045736249|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1407821671|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=110.11.201.175|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1046034675&oldid=1045736725|edit_id=-2|resolved=X|isIP=1|date=2021-09-23|time=16:32:52|wiki=en.wikipedia.org|revid=1046034675|oldid=1045736725|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1407822357|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=LizardJr8|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1046034723&oldid=1046034675|edit_id=-2|resolved=X|isIP=0|date=2021-09-23|time=16:33:15|wiki=en.wikipedia.org|revid=1046034723|oldid=1046034675|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1411622176|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=Hadron137|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1046535069&oldid=1042112343|edit_id=-2|resolved=X|isIP=0|date=2021-09-26|time=05:47:06|wiki=en.wikipedia.org|revid=1046535069|oldid=1042112343|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1412083834|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=Rami Mourshedy|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1046593799&oldid=1042741868|edit_id=-2|resolved=X|isIP=0|date=2021-09-26|time=13:27:15|wiki=en.wikipedia.org|revid=1046593799|oldid=1042741868|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=18|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=18|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1412104740|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=116.206.13.170|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1046596381&oldid=1042467865|edit_id=-2|resolved=X|isIP=1|date=2021-09-26|time=13:45:14|wiki=en.wikipedia.org|revid=1046596381|oldid=1042467865|usercount=10|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=10|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=10|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=10|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=10|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=10|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=10|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1418402761|lang=it|wikidomain=w|namespace=|pagename=Funzione crittografica di hash|username=Carrag|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://it.wikipedia.org/w/index.php?diff=123224491&oldid=122689778&rcid=294701727|edit_id=-2|resolved=X|isIP=0|date=2021-09-30|time=05:36:18|wiki=it.wikipedia.org|revid=123224491|oldid=122689778|usercount=220|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.is|U=220|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=220|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1418403019|lang=it|wikidomain=w|namespace=|pagename=Funzione crittografica di hash|username=Carrag|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://it.wikipedia.org/w/index.php?diff=123224492&oldid=123224491&rcid=294701731|edit_id=-2|resolved=X|isIP=0|date=2021-09-30|time=05:36:48|wiki=it.wikipedia.org|revid=123224492|oldid=123224491|usercount=220|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.is|U=220|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=220|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1423361322|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Vininipanini|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1047909587&oldid=1044562253|edit_id=-2|resolved=X|isIP=0|date=2021-10-03|time=06:41:40|wiki=en.wikipedia.org|revid=1047909587|oldid=1044562253|usercount=885|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=885|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1429033388|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Alfred Noble 3141|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1048536506&oldid=1047909587|edit_id=-2|resolved=X|isIP=0|date=2021-10-06|time=14:42:44|wiki=en.wikipedia.org|revid=1048536506|oldid=1047909587|usercount=1616|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1429036018|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Alfred Noble 3141|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1048536693&oldid=1048536506|edit_id=-2|resolved=X|isIP=0|date=2021-10-06|time=14:43:58|wiki=en.wikipedia.org|revid=1048536693|oldid=1048536506|usercount=1616|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=1616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1431642853|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Citation bot|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1048789768&oldid=1046596381|edit_id=-2|resolved=X|isIP=0|date=2021-10-08|time=00:30:46|wiki=en.wikipedia.org|revid=1048789768|oldid=1046596381|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=api.semanticscholar.org/CorpusID:24751345|domain=api.semanticscholar.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1433309285|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=GreenC bot|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1048904017&oldid=1046535069|edit_id=-2|resolved=X|isIP=0|date=2021-10-08|time=17:11:47|wiki=en.wikipedia.org|revid=1048904017|oldid=1046535069|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1452259013|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Gillespie09|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1050747367&oldid=1046034723|edit_id=-2|resolved=X|isIP=0|date=2021-10-19|time=17:30:21|wiki=en.wikipedia.org|revid=1050747367|oldid=1046034723|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1452814548|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=Citation bot|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1050803169&oldid=1048536693|edit_id=-2|resolved=X|isIP=0|date=2021-10-20|time=00:15:02|wiki=en.wikipedia.org|revid=1050803169|oldid=1048536693|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1455455354|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Wulfricqt|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24316302&oldid=23230258|edit_id=-2|resolved=X|isIP=0|date=2021-10-21|time=08:38:06|wiki=hu.wikipedia.org|revid=24316302|oldid=23230258|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=16|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=16|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=16|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1456007177|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=38.126.101.138|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1051098448&oldid=1050803169|edit_id=-2|resolved=X|isIP=1|date=2021-10-21|time=15:36:08|wiki=en.wikipedia.org|revid=1051098448|oldid=1050803169|usercount=32|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1456008226|lang=en|wikidomain=w|namespace=|pagename=Data Encryption Standard|username=38.126.101.138|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|sortdomain=de.rub.crypto.wiki.|domain=web.archive.org|origdiff=https://en.wikipedia.org/w/index.php?diff=1051098555&oldid=1051098448|edit_id=-2|resolved=X|isIP=1|date=2021-10-21|time=15:36:43|wiki=en.wikipedia.org|revid=1051098555|oldid=1051098448|usercount=32|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20050312043710/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0891.ps|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080411130511/http://dhost.info/pasjagor/des/|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20181107092824/http://wiki.crypto.rub.de/Buch/en/movies.php#3|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070615132907/http://www.research.ibm.com/journal/rd/383/coppersmith.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110829213229/http://www.scu.edu/cas/research/cryptography.cfm|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20151222123315/http://research.ijcaonline.org/volume104/number2/pxc3899070.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140103013152/http://www.itl.nist.gov/fipspubs/fip74.htm|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060823131553/http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090619181704/http://nvl.nist.gov/pub/nistpubs/sp958-lide/html/250-253.html|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130918020036/http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160517015519/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/has-des-been-broken.htm|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190722030759/https://slideheaven.com/automated-teller-machines-their-history-and-authentication-protocols.html|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140226205104/http://origin-www.computer.org/csdl/mags/co/1977/06/01646525.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625202735/http://csrc.nist.gov/publications/fips/05-9945-DES-Withdrawl.pdf|domain=web.archive.org|U=32|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1459932190|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=Jim.henderson|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1051516129&oldid=1048904017|edit_id=-2|resolved=X|isIP=0|date=2021-10-24|time=00:34:38|wiki=en.wikipedia.org|revid=1051516129|oldid=1048904017|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1459986536|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=67.185.21.25|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1051522520&oldid=1050747367|edit_id=-2|resolved=X|isIP=1|date=2021-10-24|time=01:34:26|wiki=en.wikipedia.org|revid=1051522520|oldid=1050747367|usercount=212|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=212|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=212|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=212|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=212|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1460153344|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=67.185.21.25|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1051544293&oldid=1051522520|edit_id=-2|resolved=X|isIP=1|date=2021-10-24|time=04:52:22|wiki=en.wikipedia.org|revid=1051544293|oldid=1051522520|usercount=212|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=212|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=212|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=212|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=212|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}}}
{{User:COIBot/EditSummary|id=1460380710|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=TedColes|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1051567547&oldid=1051516129|edit_id=-2|resolved=X|isIP=0|date=2021-10-24|time=09:14:11|wiki=en.wikipedia.org|revid=1051567547|oldid=1051516129|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1460394017|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=TedColes|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1051568447&oldid=1051567547|edit_id=-2|resolved=X|isIP=0|date=2021-10-24|time=09:25:03|wiki=en.wikipedia.org|revid=1051568447|oldid=1051567547|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.jstor.org/action/doBasicSearch?Query=%22Stream+cipher%22&acc=on&wc=on|domain=jstor.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1460416842|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=AnomieBOT|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1051570353&oldid=1051568447|edit_id=-2|resolved=X|isIP=0|date=2021-10-24|time=09:45:45|wiki=en.wikipedia.org|revid=1051570353|oldid=1051568447|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1464162746|lang=en|wikidomain=w|namespace=|pagename=Stream cipher|username=Citation bot|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1051986324&oldid=1051570353|edit_id=-2|resolved=X|isIP=0|date=2021-10-26|time=18:16:04|wiki=en.wikipedia.org|revid=1051986324|oldid=1051570353|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20110706225443/http://biblion.epfl.ch/EPFL/theses/2008/4040/EPFL_TH4040.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203082918/http://www.sis.pitt.edu/~is3966/group5_paper2.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1468663162|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=87.116.36.181|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1052482833&oldid=1051544293|edit_id=-2|resolved=X|isIP=1|date=2021-10-29|time=11:51:54|wiki=en.wikipedia.org|revid=1052482833|oldid=1051544293|usercount=9|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=github.com/CRPrinzler/HASH-verify|domain=github.com|U=9|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=9|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=9|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=9|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=9|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1472908878|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Dtgriscom|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1052957004&oldid=1044936366|edit_id=-2|resolved=X|isIP=0|date=2021-11-01|time=02:05:57|wiki=en.wikipedia.org|revid=1052957004|oldid=1044936366|usercount=858|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=858|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=858|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1477205367|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Anon lynx|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1053418187&oldid=1052957004|edit_id=-2|resolved=X|isIP=0|date=2021-11-03|time=19:26:36|wiki=en.wikipedia.org|revid=1053418187|oldid=1052957004|usercount=1123|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=1123|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1477222222|lang=en|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Anon lynx|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1053419880&oldid=1053418187|edit_id=-2|resolved=X|isIP=0|date=2021-11-03|time=19:38:01|wiki=en.wikipedia.org|revid=1053419880|oldid=1053418187|usercount=1123|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.today|U=1123|L=-1|UL=X|WUL=X|base=archive.ph/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110622084238/http://www.schneier.com/paper-aes-performance.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141226152243/http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102044410/http://csrc.nist.gov/groups/STM/cavp/index.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170809152309/http://cseweb.ucsd.edu/~kmowery/papers/aes-cache-timing.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20111003193004/http://news.ycombinator.com/item?id=1937902|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091222070135/http://eprint.iacr.org/2009/581.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060619221046/http://www.wisdom.weizmann.ac.il/%7Etromer/papers/cache.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070212015727/http://www.schneier.com/blog/archives/2005/05/aes_timing_atta_1.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080917042758/http://cr.yp.to/papers.html#cachetiming|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150124202809/http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20150108165723/https://blog.agilebits.com/2011/08/18/aes-encryption-isnt-cracked/|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120905154705/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100604095754/http://eprint.iacr.org/2009/531|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100702184311/http://eprint.iacr.org/2010/337.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100128050656/http://eprint.iacr.org/2009/374|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091005183132/http://www.schneier.com/blog/archives/2009/07/another_new_aes.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090201005720/http://www.schneier.com/crypto-gram-0010.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090131145521/http://www.isg.rhul.ac.uk/~sean/|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100808173034/http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070223215007/http://www.schneier.com/paper-rijndael.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20101106122007/http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130720155538/http://code.google.com/p/byte-oriented-aes/|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100102041117/http://schneier.com/paper-twofish-final.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20131203003348/http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54531|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20071103105501/http://findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170328215407/http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070203204845/https://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170312045558/http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130305143117/http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=1|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090928014006/http://eprint.iacr.org/2009/317|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20091023001419/http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip|domain=web.archive.org|U=1123|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1479387095|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Rlink2|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1053622600&oldid=1048789768|edit_id=-2|resolved=X|isIP=0|date=2021-11-05|time=00:34:50|wiki=en.wikipedia.org|revid=1053622600|oldid=1048789768|usercount=927186|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=927186|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1480670756|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=76.3.65.142|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1053737933&oldid=1052482833|edit_id=-2|resolved=X|isIP=1|date=2021-11-05|time=18:37:22|wiki=en.wikipedia.org|revid=1053737933|oldid=1052482833|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=5|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=5|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=m.facebook.com/login/device-based/ar/login/?ldata=AWdPdf5IdErxkXibtfao_0-5RvFmYA85AkzUC736LJC-EQ0AzB3HLW5cuzOaNgFlXNxFA3JKMjBXZBMJRQSY_ZRQLkWGxiQYIuOHs9Jn1OFBpTDGVpm1nT3hiNeFZL6bW505coaQuL6QQ3Ujdu2NNBGlupVXm6eifkaC4GpS_rd0a3Rhh_asuj1399p2DVxns9wPZ97I1TFGzwZJ92T-m0D7dYwoY2WmNXInl0W3k-K_NT8pN-LMURAW51VMQH2Dah68q1pGKcvDfY3IVfBtEySE&multiple_results=0&scp=1&pls=kevin.dean.397501&c=%2Flogin%2F&refsrc=deprecated&_rdr|domain=m.facebook.com|U=5|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1480758335|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=2.55.153.152|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1053745463&oldid=1053737933|edit_id=-2|resolved=X|isIP=1|date=2021-11-05|time=19:34:51|wiki=en.wikipedia.org|revid=1053745463|oldid=1053737933|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=4|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=4|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1497078929|lang=sq|wikidomain=w|namespace=|pagename=AES|username=MalnadachBot|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://sq.wikipedia.org/w/index.php?diff=2358912&oldid=2250342|edit_id=-2|resolved=X|isIP=0|date=2021-11-14|time=06:31:53|wiki=sq.wikipedia.org|revid=2358912|oldid=2250342|usercount=24721|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=24721|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1505497611|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Fullfungo|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1055888785&oldid=1053745463|edit_id=-2|resolved=X|isIP=0|date=2021-11-18|time=12:22:52|wiki=en.wikipedia.org|revid=1055888785|oldid=1053745463|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=5|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=5|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=5|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1506822272|lang=|wikidomain=d|namespace=User|pagename=Bitcoin private key generator|username=Bitcoin private key generator|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://www.wikidata.org/w/index.php?oldid=1530325516&rcid=1578568239|edit_id=-2|resolved=X|isIP=0|date=2021-11-19|time=03:02:21|wiki=www.wikidata.org|revid=1530325516|oldid=0|usercount=45|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=torlinksplus.com|domain=torlinksplus.com|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.allexamscertificates.com|domain=allexamscertificates.com|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=allcryptosoftwares.net|domain=allcryptosoftwares.net|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=autonym.de/index.php?title=User_talk:Bitcoin-generator-software|domain=autonym.de|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=advkey.quest/index.php/User_talk:Privatekeyswithbalancefinder|domain=advkey.quest|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.openstreetmap.org/wiki/User_talk:Bitcoin_private_key_finder_free_download|domain=wiki.openstreetmap.org|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=u.osmfr.org/m/682435/|domain=u.osmfr.org|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=api.semanticscholar.org/CorpusID:24751345|domain=api.semanticscholar.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=doi.org/10.1007%2F978-3-662-03269-5|domain=doi.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=45|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=45|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.org/details/handbookofapplie0000mene|domain=archive.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/details/Introduction_to_Modern_Cryptography|domain=archive.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=httpd.apache.org/docs/2.2/ssl/ssl_intro.html#cryptographictech|domain=httpd.apache.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.msri.org/people/members/sara/articles/rsa.pdf|domain=msri.org|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=api.semanticscholar.org/CorpusID:2873616|domain=api.semanticscholar.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=doi.org/10.1145%2F359340.359342|domain=doi.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=people.csail.mit.edu/rivest/Rsapaper.pdf|domain=people.csail.mit.edu|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=45|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=doi.org/10.1109%2FTIT.1976.1055638|domain=doi.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/details/codebookevolutio00sing/page/279|domain=archive.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.zdnet.com/article/gchq-pioneers-on-birth-of-public-key-crypto/|domain=zdnet.com|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cryptocellar.org/cesg/possnse.pdf|domain=cryptocellar.org|U=45|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=api.semanticscholar.org/CorpusID:205488749|domain=api.semanticscholar.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=doi.org/10.1080%2F0161-119691884933|domain=doi.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=semanticscholar.org/paper/0b3e9a0c0e8bf84413f49d3a4585c207f58da70e|domain=semanticscholar.org|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/stream/principlesofscie00jevorich#page/n165/mode/2up|domain=archive.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/stream/principlesofscie00jevorich#page/n166/mode/1up|domain=archive.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=en.greatfire.org/blog/2014/sep/authorities-launch-man-middle-attack-google|domain=en.greatfire.org|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=45|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=en.greatfire.org|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.upguard.com/blog/man-in-the-middle-attack#where|domain=upguard.com|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.upguard.com/blog/man-in-the-middle-attack#mitm-sniffing|domain=upguard.com|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=doi.org/10.1109%2FSFCS.1982.5|domain=doi.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ieeexplore.ieee.org/document/4568386|domain=ieeexplore.ieee.org|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arxiv.org/abs/1804.00200|domain=arxiv.org|U=45|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.crypto-textbook.com|domain=crypto-textbook.com|U=45|L=17|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cr.yp.to/antiforgery/forgery-20080501.pdf|domain=cr.yp.to|U=45|L=1394|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.org/details/handbookofapplie0000mene|domain=archive.org|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cacr.uwaterloo.ca/hac/about/chap11.pdf|domain=cacr.uwaterloo.ca|U=45|L=236|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.com/books?id=Dam9zrViJjEC|domain=books.google.com|U=45|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1506823360|lang=|wikidomain=d|namespace=User|pagename=Bitcoin private key generator|username=Bitcoin private key generator|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://www.wikidata.org/w/index.php?diff=1530325871&oldid=1530325516&rcid=1578568599|edit_id=-2|resolved=X|isIP=0|date=2021-11-19|time=03:03:09|wiki=www.wikidata.org|revid=1530325871|oldid=1530325516|usercount=45|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=45|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=45|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=45|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=45|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1506897754|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Pppery|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1056005442&oldid=1053622600|edit_id=-2|resolved=X|isIP=0|date=2021-11-19|time=04:14:57|wiki=en.wikipedia.org|revid=1056005442|oldid=1053622600|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1507765499|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Belbury|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1056074775&oldid=1055888785|edit_id=-2|resolved=X|isIP=0|date=2021-11-19|time=15:51:39|wiki=en.wikipedia.org|revid=1056074775|oldid=1055888785|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160409095104/http://article.gmane.org/gmane.comp.encryption.general/5154|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160316114109/https://www.schneier.com/essays/archives/2004/08/cryptanalysis_of_md5.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1507768454|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=130.156.110.186|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1056074969&oldid=1046593799|edit_id=-2|resolved=X|isIP=1|date=2021-11-19|time=15:52:57|wiki=en.wikipedia.org|revid=1056074969|oldid=1046593799|usercount=36|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=36|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=36|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1507769400|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=130.156.110.186|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://en.wikipedia.org/w/index.php?diff=1056075074&oldid=1056074969|edit_id=-2|resolved=X|isIP=1|date=2021-11-19|time=15:53:40|wiki=en.wikipedia.org|revid=1056075074|oldid=1056074969|usercount=36|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=36|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=36|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1511507198|lang=en|wikidomain=w|namespace=|pagename=Public-key cryptography|username=Monkbot|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1056408675&oldid=1056005442|edit_id=-2|resolved=X|isIP=0|date=2021-11-21|time=16:39:08|wiki=en.wikipedia.org|revid=1056408675|oldid=1056005442|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20081119061833/http://grouper.ieee.org/groups/1363/|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141129035850/https://ee.stanford.edu/%7Ehellman/publications/24.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080625052129/http://www.ladlass.com/intel/archives/010256.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514676751|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=103.10.66.74|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410440&oldid=24316302|edit_id=-2|resolved=X|isIP=1|date=2021-11-23|time=11:38:59|wiki=hu.wikipedia.org|revid=24410440|oldid=24316302|usercount=44|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=44|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514679240|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=103.10.66.74|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410446&oldid=24410440|edit_id=-2|resolved=X|isIP=1|date=2021-11-23|time=11:41:06|wiki=hu.wikipedia.org|revid=24410446|oldid=24410440|usercount=44|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=44|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514680291|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=103.10.66.74|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410449&oldid=24410446|edit_id=-2|resolved=X|isIP=1|date=2021-11-23|time=11:42:51|wiki=hu.wikipedia.org|revid=24410449|oldid=24410446|usercount=44|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=44|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514681809|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=103.10.66.74|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410453&oldid=24410449|edit_id=-2|resolved=X|isIP=1|date=2021-11-23|time=11:43:44|wiki=hu.wikipedia.org|revid=24410453|oldid=24410449|usercount=44|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=44|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514684593|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=103.10.66.74|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410457&oldid=24410453|edit_id=-2|resolved=X|isIP=1|date=2021-11-23|time=11:45:17|wiki=hu.wikipedia.org|revid=24410457|oldid=24410453|usercount=44|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=44|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=44|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514684726|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Gg. Any|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410459&oldid=24410457|edit_id=-2|resolved=X|isIP=0|date=2021-11-23|time=11:45:48|wiki=hu.wikipedia.org|revid=24410459|oldid=24410457|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=openssl.org/docs/fips/fipsnotes.html|domain=openssl.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/STM/cavp/index.html|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=cnss.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.findarticles.com/p/articles/mi_m0IKZ/is_3_107?pnum=2&opg=90984479|domain=findarticles.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html|domain=nytimes.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/publications/fips/fips197/fips-197.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1514688794|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=223.255.230.69|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410465&oldid=24410459|edit_id=-2|resolved=X|isIP=1|date=2021-11-23|time=11:48:30|wiki=hu.wikipedia.org|revid=24410465|oldid=24410459|usercount=37|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=37|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514691049|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Gg. Any|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410468&oldid=24410465|edit_id=-2|resolved=X|isIP=0|date=2021-11-23|time=11:49:06|wiki=hu.wikipedia.org|revid=24410468|oldid=24410465|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=research.microsoft.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/531|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007/978-3-642-03356-8_14|domain=dx.doi.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/317|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.schneier.com/crypto-gram-0010.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.macfergus.com/pub/rdalgeq.html|domain=macfergus.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1514692778|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=223.255.230.69|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410476&oldid=24410468|edit_id=-2|resolved=X|isIP=1|date=2021-11-23|time=11:51:45|wiki=hu.wikipedia.org|revid=24410476|oldid=24410468|usercount=37|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514694456|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Gg. Any|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410477&oldid=24410476|edit_id=-2|resolved=X|isIP=0|date=2021-11-23|time=11:52:09|wiki=hu.wikipedia.org|revid=24410477|oldid=24410476|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=research.microsoft.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/531|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007/978-3-642-03356-8_14|domain=dx.doi.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2009/317|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.schneier.com/crypto-gram-0010.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.macfergus.com/pub/rdalgeq.html|domain=macfergus.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.schneier.com/crypto-gram-0209.html|domain=schneier.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.isg.rhul.ac.uk/~sean/|domain=isg.rhul.ac.uk|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=zdnet.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf|domain=csrc.nist.gov|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1514697185|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Gg. Any|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410481&oldid=24410480|edit_id=-2|resolved=X|isIP=0|date=2021-11-23|time=11:54:34|wiki=hu.wikipedia.org|revid=24410481|oldid=24410480|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514697367|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=223.255.230.69|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410482&oldid=24410481|edit_id=-2|resolved=X|isIP=1|date=2021-11-23|time=11:54:35|wiki=hu.wikipedia.org|revid=24410482|oldid=24410481|usercount=37|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=37|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=37|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1514698557|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=Gg. Any|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24410487&oldid=24410482|edit_id=-2|resolved=X|isIP=0|date=2021-11-23|time=11:55:30|wiki=hu.wikipedia.org|revid=24410487|oldid=24410482|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1517259159|lang=en|wikidomain=w|namespace=|pagename=Elliptic-curve cryptography|username=Rlink2|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=archive.today|origdiff=https://en.wikipedia.org/w/index.php?diff=1056979651&oldid=1056075074|edit_id=-2|resolved=X|isIP=0|date=2021-11-24|time=17:59:13|wiki=en.wikipedia.org|revid=1056979651|oldid=1056075074|usercount=927186|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157|remark=|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=927186|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=927186|L=-1|UL=X|WUL=X|base=archive.ph/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|basedomain=archive.ph|baseip=139.99.89.157}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190702011957/https://seclists.org/fulldisclosure/2019/Jun/46|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140503190338/http://eprint.iacr.org/2011/506|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20060327202009/http://anziamj.austms.org.au/V44/CTAC2001/Hitc/Hitc.pdf|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20110719233751/https://www.certicom.com/index.php/2004-press-releases/36-2004-press-releases/300-solution-required-team-of-mathematicians-2600-computers-and-17-months-|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090715060838/http://lacal.epfl.ch/page81774.html|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130606004254/http://www.secg.org/download/aid-390/gec2.pdf|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161101041810/http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/are-elliptic-curve-cryptosystems-patented.htm|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20190604080321/https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20090207005135/http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20180417212206/http://www.ecc-brainpool.org/download/Domain-parameters.pdf|domain=web.archive.org|U=927186|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1535245787|lang=hu|wikidomain=w|namespace=|pagename=Advanced Encryption Standard|username=B.Zsoltbot|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|sortdomain=de.rub.crypto.wiki.|domain=archive.is|origdiff=https://hu.wikipedia.org/w/index.php?diff=24448732&oldid=24410487|edit_id=-2|resolved=X|isIP=0|date=2021-12-05|time=16:23:31|wiki=hu.wikipedia.org|revid=24448732|oldid=24410487|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=archive.is/20130105232834/http://wiki.crypto.rub.de/Buch/sample_chapters.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130102203126/http://www.openssl.org/docs/fips/fipsnotes.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20120421103818/http://www.cnss.gov/Assets/pdf/nstissp_11_fs.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20160306104007/http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20100208155652/http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20061104080748/http://www.macfergus.com/pub/rdalgeq.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20070707105715/http://www.schneier.com/crypto-gram-0209.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5rocpRxhN?url=http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204|domain=webcitation.org|U=-1|L=-1|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=1661280925|lang=es|wikidomain=w|namespace=|pagename=Cifrado de flujo|username=InternetArchiveBot|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://es.wikipedia.org/w/index.php?diff=159057619&oldid=155714428|edit_id=-2|resolved=X|isIP=0|date=2024-03-27|time=07:06:16|wiki=es.wikipedia.org|revid=159057619|oldid=155714428|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups bot, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=-1|L=173|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.is|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1701190910|lang=en|wikidomain=w|namespace=|pagename=Cryptographic hash function|username=Mindmatrix|link=wiki.crypto.rub.de/Buch/movies.php|sortdomain=de.rub.crypto.wiki.|domain=wiki.crypto.rub.de|origdiff=https://en.wikipedia.org/w/index.php?diff=1260780200&oldid=1260766411|edit_id=-2|resolved=X|isIP=0|date=2024-12-02|time=16:09:51|wiki=en.wikipedia.org|revid=1260780200|oldid=1260766411|usercount=-1|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=ehash.iaik.tugraz.at/wiki/The_eHash_Main_Page|domain=ehash.iaik.tugraz.at|U=-1|L=121|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.crypto.rub.de/Buch/movies.php|domain=wiki.crypto.rub.de|U=-1|L=173|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20161227161240/http://cryptrec.go.jp/estimation/techrep_id2401.pdf|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cryptrec.go.jp/estimation/techrep_id2401.pdf|domain=cryptrec.go.jp|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20170428160757/http://eprint.iacr.org/2007/278|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=eprint.iacr.org/2007/278|domain=eprint.iacr.org|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130815164303/http://vnhacker.blogspot.com/2009/09/flickrs-api-signature-forgery.html|domain=web.archive.org|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=vnhacker.blogspot.com/2009/09/flickrs-api-signature-forgery.html|domain=vnhacker.blogspot.com|U=-1|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=github.com/CRPrinzler/HASH-verify|domain=github.com|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.guardtime.com/educational-series-on-hashes/|domain=guardtime.com|U=-1|L=73|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.today/20121206020054/http://www.guardtime.com/educational-series-on-hashes/|domain=archive.today|U=-1|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/Additionlist_bottom}}
- Displayed all 162 additions.