User:Davidgothberg/Test6

Purpose and usage
This template is a test of a "specialised crypto navigation box". It can be added to the bottom of cryptography articles.

This template also has some magic. It transcludes in the generic crypto navigation box which you see as the lower half of the box above.

You use this template like this:



Testing

 * Feel free to edit this page even though it is in my user space. But watch out for the magic in the code...
 * Don't forget to set the right URL for the edit button in the top right corner once this template is moved to its final URL!!!

{| border=0 class="toccolours"
 * style="background:#ccccff" align="center" |
 * style="background:#ccccff" align="center" |


 * align=center| Algorithms: A5/1 | A5/2 | FISH | Grain | HC-256 | ISAAC | MUGI | Panama | Phelix | Pike | Py | Rabbit | RC4 | Salsa20 | Scream | SEAL | SOBER | SOBER-128 | SOSEMANUK | Trivium | VEST | WAKE
 * align="center"| Theory: Shift register | LFSR | NLFSR | Shrinking generator  Misc: eSTREAM
 * style="background:#ccccff" align="center" |
 * align=center| History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
 * align=center| Symmetric key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | CSPRNG
 * }
 * style="background:#ccccff" align="center" |
 * align=center| History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
 * align=center| Symmetric key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | CSPRNG
 * }
 * align=center| History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
 * align=center| Symmetric key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | CSPRNG
 * }
 * align=center| Symmetric key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | CSPRNG
 * }

{| class="toccolours"
 * style="background:#ccccff" align="center" |
 * style="background:#ccccff" align="center" |


 * align=center| Algorithms: A5/1 | A5/2 | FISH | Grain | HC-256 | ISAAC | MUGI | Panama | Phelix | Pike | Py | Rabbit | RC4 | Salsa20 | Scream | SEAL | SOBER | SOBER-128 | SOSEMANUK | Trivium | VEST | WAKE
 * align="center"| Theory: Shift register | LFSR | NLFSR | Shrinking generator  Misc: eSTREAM
 * align=center|
 * align="center"| Theory: Shift register | LFSR | NLFSR | Shrinking generator  Misc: eSTREAM
 * align=center|
 * align=center|
 * align=center|
 * align=center|


 * align=center| Cryptography: History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography | Symmetric key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers
 * }
 * }