Search results
Jump to navigation
Jump to search
Page title matches
- 35 bytes (4 words) - 04:24, 19 October 2010
- 146 bytes (18 words) - 18:32, 9 August 2008
- Auto-populated based on [[Special:WhatLinksHere/History of cryptography]]. Needs checking by a human.654 bytes (85 words) - 17:13, 11 January 2010
Page text matches
- {{r|History of cryptography}}707 bytes (89 words) - 20:09, 29 July 2010
- {{r|History of cryptography}}605 bytes (77 words) - 14:41, 18 March 2024
- {{r|History of cryptography}}973 bytes (125 words) - 14:41, 18 March 2024
- {{r|History of cryptography}}547 bytes (70 words) - 11:35, 11 January 2010
- {{r|History of cryptography}}608 bytes (77 words) - 15:58, 11 January 2010
- {{r|History of cryptography}}724 bytes (100 words) - 14:31, 22 March 2024
- {{r|History of cryptography}}718 bytes (88 words) - 14:17, 28 March 2010
- Auto-populated based on [[Special:WhatLinksHere/History of cryptography]]. Needs checking by a human.654 bytes (85 words) - 17:13, 11 January 2010
- {{r|History of cryptography}}853 bytes (115 words) - 17:00, 12 August 2020
- ...or several millennia and in commerce at least since the Renaissance; see [[History of cryptography]] for details. With the spread of computers and electronic communication sy ...ly, [[cipher]]s worked at the level of letters or groups of letters; see [[history of cryptography]] for details. Attacks on them used techniques based largely on linguistic52 KB (8,332 words) - 05:49, 8 April 2024
- ...d can be done with pencil and paper; you don't even need a computer. See [[History of cryptography]] for details. Even with weaker knowledge of the input format, it is still24 KB (3,851 words) - 05:49, 8 April 2024