User:Matt Crypto/CryptoStats/ArticleHits

{| border='1' style='font-size:100%' !Rank !Article !Hits !Size (bytes) !Redirects !Images
 * 1 || Enigma machine  || 6535 || 32450 || Naval Engima -- Enigma code machine -- Enigma (machine) -- ENIGMA -- Enigma cryptography machine -- Enigma code -- Enigma cipher machine -- Enigma cypher machine -- Enigma cipher -- Enigma cypher -- Naval Enigma -- Enigma Machine  ||
 * 2 || Cryptanalysis of the Enigma  || 1993 || 22520 || ||
 * 3 || Cryptanalysis  || 1993 || 18187 || CryptanalysiS -- Cryptanalytic -- Cryptoanalysis -- Codebreaking -- Codebreaker -- Cryptanalyst -- Code-breaking -- Cryptanalysts  ||
 * 4 || Alan Turing  || 1579 || 15031 || Turing, A.M. -- Alan Mathison Turing  ||
 * 5 || History of cryptography  || 1450 || 20091 || ||
 * 6 || ECHELON  || 1322 || 13300 || EcheloN -- Eschelon  ||
 * 7 || Cryptography  || 1290 || 17810 || CryptologY -- CryptographY -- Cryptology -- CryptographY/Hashfunctions -- Cryptographic -- Codes and ciphers -- Decrypting -- Crypto -- Data encryption -- Cyptography  ||
 * 8 || Digital rights management  || 1255 || 24954 || Digital Rights Management -- Digital-rights management -- Digital restrictions management -- Digital Restrictions Management  ||
 * 9 || MD5  || 1059 || 7679 || Md5 -- MD5 - A Message Digest Algorithm -- Md5sum  ||
 * 10 || RSA  || 986 || 13207 || RSA Cryptosystem  ||
 * 11 || Bombe  || 786 || 6929 || ||
 * 12 || Steganography  || 766 || 11798 || Secret writing -- Stegonagraphy -- Stegotext  ||
 * 13 || Encryption  || 668 || 4549 || CipheR -- Cipher -- Cyphertext -- Ciphertext -- Cipher text -- Decryption -- Encryption key -- Encryption algorithm -- Codetext -- Encrypt -- Encrypted -- Encipher  ||
 * 14 || Ultra  || 580 || 26381 || UltrA -- Ultra secret -- ULTRA  ||
 * 15 || Bletchley Park  || 525 || 9696 || Bletchley Park Museum -- Station X  ||
 * 16 || Blowfish (cipher)  || 487 || 6891 || Blowfish encryption algorithm  ||
 * 17 || Colossus computer  || 480 || 9965 || Colossus (computer)  ||
 * 18 || National Security Agency  || 432 || 11249 || NSA -- Armed Forces Security Agency -- AFSA -- No such agency -- The Puzzle Palace  ||
 * 19 || Advanced Encryption Standard  || 431 || 10743 || AES -- Rijndael -- Rijndael encryption algorithm  ||
 * 20 || Data Encryption Standard  || 421 || 29907 || DataEncryptionStandard -- Data Encryption Algorithm -- DES  ||
 * 21 || Quantum cryptography  || 414 || 16077 || Quantum Cryptography  ||
 * 22 || Topics in cryptography  || 409 || 18271 || Topics in Cryptography  ||
 * 23 || Cryptographic hash function  || 403 || 9408 || Message digest -- Cryptographic hash -- Cryptographic message digest -- One-way hash -- Modification Detection Code  ||
 * 24 || Cryptonomicon  || 384 || 3079 || Neal Stephenson/Cryptonomicon  ||
 * 25 || Wi-Fi Protected Access  || 376 || 3319 || ||
 * 26 || Digital signature  || 357 || 11899 || Digital signatures -- Digitally Signed -- Cryptographic signature  ||
 * 27 || One-time pad  || 342 || 18815 || OneTimePads -- One time pads -- One time pad -- Vernam cipher  ||
 * 28 || Block cipher  || 328 || 4828 || Codebook algorithm  ||
 * 29 || Zimmermann Telegram  || 325 || 9474 || Zimmermann telegram -- Zimmerman telegram -- Zimmerman Note -- The Zimmermann Telegram  ||
 * 30 || Integer factorization  || 324 || 7283 || Prime factorization -- Prime factorisation -- Prime decomposition -- Integer factorization problem -- Integer factorisation  ||
 * 31 || HTTPS  || 324 || 2053 || Https  ||
 * 32 || Rotor machine  || 323 || 12564 || Rotor cypher machine  ||
 * 33 || X.509  || 320 || 4415 || ||
 * 34 || Brute force attack  || 319 || 3623 || Combinatorial explosion  ||
 * 35 || Triple DES  || 315 || 2454 || 3DES -- Triple-DES  ||
 * 36 || DeCSS  || 313 || 8286 || DeCSS source code -- Decss  ||
 * 37 || Birthday attack  || 312 || 3250 || ||
 * 38 || Public-key cryptography  || 298 || 7275 || Private key -- Public key -- Public key cryptography -- Asymmetric key cryptography -- Public key encyption -- Public key crytography -- Public key encryption -- Public-key encryption -- Public-key -- PKC -- Non-secret encryption  ||
 * 39 || Frequency analysis  || 286 || 7354 || ||
 * 40 || Substitution cipher  || 274 || 18038 || Substitution ciphers -- Substitution alphabet -- Letter-substitution cipher -- Simple substitution cipher -- Monoalphabetic substitution cipher  ||
 * 41 || Asymmetric key algorithm  || 267 || 7622 || Asymmetric Algorithms -- Asymmetric algorithm -- Public key algorithm -- Asymmetric key -- Asymmetric key encryption algorithm -- Asymmetric key encryption -- Asymmetric cryptography  ||
 * 42 || Authentication  || 264 || 4953 || Authenticate  ||
 * 43 || ROT13  || 262 || 14597 || Rot13 -- ROT-13 -- ROT-47 -- Rot47 -- Rot-13 -- Rot-47 -- ROT47 -- ROT 13 -- ROT26 -- Double ROT13 -- Ebg13 -- Memfrob -- Furrfu  ||
 * 44 || Kerberos (protocol)  || 247 || 4528 || ||
 * 45 || Elliptic curve cryptography  || 241 || 6894 || Elliptical Curve Cryptography  ||
 * 46 || Pseudorandom number generator  || 238 || 6097 || Pseudorandom number generators -- Pseudo-random number generator -- Pseudorandom sequence -- PRNG -- Pseudo Random -- Pseudo-random -- Pseudo-randomness  ||
 * 47 || Stream cipher  || 231 || 2999 || Key stream -- Combiner-type algorithm  ||
 * 48 || RC4  || 230 || 9179 || RC4 Cipher -- ARCFOUR -- RC4 cipher -- RC4 (cipher)  ||
 * 49 || Kryptos  || 219 || 3030 || ||
 * 50 || Symmetric key algorithm  || 216 || 1699 || Symmetric Algorithms -- Symmetric algorithm -- Symmetric key -- Symmetric encryption -- Symmetric key cryptography -- Symmetric cypher -- Shared key -- Symmetric cipher  ||
 * 51 || Claude E. Shannon  || 216 || 5503 || Claude Shannon -- Claude Elwood Shannon  ||
 * 52 || Transport Layer Security  || 207 || 5380 || Secure Sockets Layer -- Transport Layer Security Protocol -- Transport layer security -- Secure Socket Layer  ||
 * 53 || Bomba (cryptography)  || 202 || 3402 || ||
 * 54 || Electronic voting  || 198 || 16364 || E-voting -- EVoting -- E voting -- Computer voting -- Electronic Voting -- Online voting -- Paper trail  ||
 * 55 || List of cryptography topics  || 196 || 33375 || List of cryptology topics  ||
 * 56 || International Data Encryption Algorithm  || 194 || 4461 || IDEA encryption algorithm -- IDEA (cipher) -- Idea encryption  ||
 * 57 || Differential cryptanalysis  || 192 || 4864 || Differential attack  ||
 * 58 || Caesar cipher  || 188 || 7402 || Shift cipher -- Caesar shift cipher -- Caesar cypher  ||
 * 59 || Typex  || 186 || 4242 || Type X -- TypeX  ||
 * 60 || Marian Rejewski  || 185 || 4990 || ||
 * 61 || Hardware random number generator  || 180 || 21945 || True random number generator -- Random device -- Entropy pool -- TRNG -- True Random Number Generator  ||
 * 62 || Perforated sheets  || 179 || 1010 || Zygalski sheets -- Perforated sheet  ||
 * 63 || TEMPEST  || 178 || 4065 || Van Eck Phreaking -- Emission security -- Van Eck radiation -- Emissions security -- EMSEC  ||
 * 64 || Numbers station  || 171 || 3510 || Numbers stations -- Number station  ||
 * 65 || Crypto-anarchism  || 168 || 4574 || Crypto-anarchy  ||
 * 66 || Man in the middle attack  || 167 || 2950 || Man-in-the-middle attack -- Man in the middle -- MITM  ||
 * 67 || Block cipher modes of operation  || 165 || 5509 || Electronic codebook -- Cipher-block chaining -- Cipher feedback -- Output feedback -- Counter mode -- Modes of operation -- Block cipher mode of operation  ||
 * 68 || Password cracking  || 164 || 10256 || ||
 * 69 || Password  || 164 || 15629 || Passcode  ||
 * 70 || VENONA project  || 160 || 9320 || VENONA -- Venona -- VENONA Project -- Venona project -- Venona Project  ||
 * 71 || Twofish  || 156 || 1747 || Twofish encryption algorithm  ||
 * 72 || Information security  || 156 || 4644 || Information systems security -- Information assurance -- INFOSEC -- It security  ||
 * 73 || Atbash  || 156 || 911 || Atbash cipher -- Atbash cypher  ||
 * 74 || Digital Signature Algorithm  || 155 || 2167 || DSA  ||
 * 75 || Code talkers  || 152 || 5603 || Codetalker -- Navajo code -- Codetalkers  ||
 * 76 || Public key infrastructure  || 151 || 9476 || PKI -- Public Key Infrastructure -- Pki  ||
 * 77 || Codebook  || 145 || 950 || Code book  ||
 * 78 || Cryptographically secure pseudo-random number generator  || 144 || 5972 || CSPRNG  ||
 * 79 || Certificate authority  || 144 || 3173 || Certificate Authority  ||
 * 80 || Cypherpunk  || 143 || 1621 || Cypherpunks  ||
 * 81 || Polyalphabetic cipher  || 142 || 4159 || Polyalphabetic substitution  ||
 * 82 || Knapsack problem  || 139 || 2223 || 0/1 knapsack problem  ||
 * 83 || Adi Shamir  || 135 || 2830 || ||
 * 84 || Skipjack (cipher)  || 134 || 3692 || Skipjack encryption algorithm  ||
 * 85 || Secure shell  || 134 || 3626 || SSH -- Secure Shell -- Ssh  ||
 * 86 || Transposition cipher  || 133 || 7779 || Transposition (cryptography) -- Columnar disposition -- Transposition (cipher)  ||
 * 87 || Pretty Good Privacy  || 133 || 28570 || PrettyGoodPrivacy -- PGP -- Pgp  ||
 * 88 || Meet-in-the-middle attack  || 129 || 2170 || ||
 * 89 || Key (cryptography)  || 128 || 7368 || CryptographY/Keys -- Cryptography/Key -- Secret key -- Cryptographic keys -- Cryptographic key  ||
 * 90 || RIPEMD  || 126 || 2604 || RIPEMD-160  ||
 * 91 || Illegal prime  || 126 || 3745 || Illegal prime number  ||
 * 92 || Blum Blum Shub  || 126 || 2513 || Blum Blum Shub generator  ||
 * 93 || Fritz-chip  || 124 || 11332 || ||
 * 94 || Scytale  || 123 || 4652 || Skytale  ||
 * 95 || Invisible ink  || 123 || 3893 || ||
 * 96 || Advanced Encryption Standard process  || 121 || 2512 || AES process -- AES competition -- AES contest -- Advanced Encryption Standard competition -- AES candidate  ||
 * 97 || Deniable encryption  || 119 || 2060 || Deniable Encryption  ||
 * 98 || Voynich manuscript  || 117 || 38042 || Voynich Manuscript -- Voynich -- Voynich MS  ||
 * 99 || Rabin cryptosystem  || 117 || 10488 || ||
 * 100 || Plaintext  || 115 || 5249 || ||
 * 101 || National Cryptologic Museum  || 114 || 545 || National cryptologic museum  ||
 * 102 || Confidentiality  || 114 || 2056 || Data confidentiality  ||
 * 103 || Weak key  || 113 || 3961 || ||
 * 104 || Diffie-Hellman key exchange  || 113 || 9947 || Diffie-Hellman -- Diffie Hellman -- Diffie-Hellman-Merkle key exchange -- Diffie-Hellman-Merkle -- Diffie-Hellman key agreement  ||
 * 105 || Content-scrambling system  || 112 || 2426 || Content Scrambling System -- Content scrambling system  ||
 * 106 || RC2  || 110 || 3383 || ||
 * 107 || Geheimfernschreiber  || 110 || 3255 || STURGEON (cryptography)  ||
 * 108 || Security engineering  || 107 || 2579 || ||
 * 109 || SIGABA  || 106 || 9000 || Sigaba -- ECM Mark II  ||
 * 110 || Public key certificate  || 105 || 4773 || Digital certificate -- Digital Certificate -- Identity certificate -- Digital identity certificate  ||
 * 111 || XSL attack  || 103 || 9990 || ||
 * 112 || Security through obscurity  || 103 || 8332 || Security by obscurity  ||
 * 113 || Autokey cipher  || 103 || 3820 || ||
 * 114 || Magic (cryptography)  || 101 || 12477 || Magic cryptography  ||
 * 115 || ElGamal discrete log cryptosystem  || 101 || 2938 || Elgamal discrete logarithm cryptosystem -- El Gamal discrete log cryptosystem -- ElGamal -- El Gamal -- Elgamal -- Elgamal discrete log cryptosystem  ||
 * 116 || Dmitry Sklyarov  || 99 || 2832 || Dmitri Sklyarov -- Dimitri Sklyarov -- Dimitri Skylarov -- Sklyarov -- Dimitry Sklyarov -- Dimitry Sklyarov -- Dimitry Sklyarov  ||
 * 117 || SHA family  || 96 || 10977 || SHA -- SHA1 -- SHA-256 -- SHA-384 -- SHA-512 -- SHA-1 -- Secure Hash Algorithm family -- Secure Hash Algorithm -- SHA-0 -- SHA512  ||
 * 118 || EFF DES cracker  || 96 || 3960 || Deep Crack -- Deep crack -- DES cracker  ||
 * 119 || SIGINT  || 95 || 2944 || Signals intelligence -- Sigint -- Signals Intelligence -- Signal intelligence  ||
 * 120 || RSA number  || 93 || 13287 || RSA numbers  ||
 * 121 || Key size  || 93 || 8328 || Cryptography/key length -- Cryptographic key length -- Key length  ||
 * 122 || RC5  || 92 || 2767 || RC5 cipher -- RC5 encryption algorithm  ||
 * 123 || Collision attack  || 92 || 348 || ||
 * 124 || Alice and Bob  || 92 || 4303 || Characters in cryptography  ||
 * 125 || OpenSSL  || 91 || 970 || Openssl  ||
 * 126 || Web of trust  || 90 || 6797 || Web of Trust  ||
 * 127 || The Gold Bug  || 90 || 2121 || ||
 * 128 || Digital Fortress  || 90 || 1184 || ||
 * 129 || Crib  || 90 || 1334 || Cribbing  ||
 * 130 || SEED  || 89 || 419 || SEED (cipher)  ||
 * 131 || Beale ciphers  || 89 || 6121 || Beale Ciphers  ||
 * 132 || Linear cryptanalysis  || 88 || 1758 || ||
 * 133 || S/MIME  || 87 || 902 || Smime -- SMIME  ||
 * 134 || Pseudonymity  || 87 || 2790 || ||
 * 135 || SSH file transfer protocol  || 86 || 1672 || Secure file transfer program  ||
 * 136 || OpenSSH  || 85 || 3512 || Openssh  ||
 * 137 || 802.11i  || 85 || 1135 || IEEE 802.11i -- WEP2 -- WPA2  ||
 * 138 || MD4  || 84 || 1360 || ||
 * 139 || Electronic money  || 84 || 1651 || Digital cash -- EFT -- Electronic cash  ||
 * 140 || Cryptographic protocol  || 84 || 1514 || Cyptographic protocol -- Security protocol  ||
 * 141 || Code (cryptography)  || 84 || 7701 || Codetext  ||
 * 142 || Adversary  || 84 || 1877 || ||
 * 143 || XTEA  || 83 || 4138 || ||
 * 144 || Discrete logarithm  || 83 || 2293 || Discrete log problem -- Discrete logarithm problem -- Discrete logarithms -- Discrete log  ||
 * 145 || Anonymous remailer  || 83 || 14590 || Anonymous Remailer -- Remailer  ||
 * 146 || OpenPGP  || 82 || 688 || RFC 2440  ||
 * 147 || MD5CRK  || 82 || 2781 || ||
 * 148 || Traffic analysis  || 81 || 7292 || ||
 * 149 || Computer surveillance  || 80 || 7294 || ||
 * 150 || Communications Security Establishment  || 80 || 2100 || ||
 * 151 || Preimage attack  || 79 || 382 || ||
 * 152 || MI8  || 78 || 1266 || ||
 * 153 || Bruce Schneier  || 78 || 2342 || Schneier  ||
 * 154 || Decipherment  || 77 || 1480 || Decipher -- Decypher  ||
 * 155 || Ron Rivest  || 76 || 2132 || Rivest -- Ronald Rivest -- Ronald L. Rivest  ||
 * 156 || Linear feedback shift register  || 76 || 2242 || LFSR  ||
 * 157 || Secret sharing  || 75 || 10531 || Key splitting  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||
 * 80 || Cypherpunk  || 143 || 1621 || Cypherpunks  ||
 * 81 || Polyalphabetic cipher  || 142 || 4159 || Polyalphabetic substitution  ||
 * 82 || Knapsack problem  || 139 || 2223 || 0/1 knapsack problem  ||
 * 83 || Adi Shamir  || 135 || 2830 || ||
 * 84 || Skipjack (cipher)  || 134 || 3692 || Skipjack encryption algorithm  ||
 * 85 || Secure shell  || 134 || 3626 || SSH -- Secure Shell -- Ssh  ||
 * 86 || Transposition cipher  || 133 || 7779 || Transposition (cryptography) -- Columnar disposition -- Transposition (cipher)  ||
 * 87 || Pretty Good Privacy  || 133 || 28570 || PrettyGoodPrivacy -- PGP -- Pgp  ||
 * 88 || Meet-in-the-middle attack  || 129 || 2170 || ||
 * 89 || Key (cryptography)  || 128 || 7368 || CryptographY/Keys -- Cryptography/Key -- Secret key -- Cryptographic keys -- Cryptographic key  ||
 * 90 || RIPEMD  || 126 || 2604 || RIPEMD-160  ||
 * 91 || Illegal prime  || 126 || 3745 || Illegal prime number  ||
 * 92 || Blum Blum Shub  || 126 || 2513 || Blum Blum Shub generator  ||
 * 93 || Fritz-chip  || 124 || 11332 || ||
 * 94 || Scytale  || 123 || 4652 || Skytale  ||
 * 95 || Invisible ink  || 123 || 3893 || ||
 * 96 || Advanced Encryption Standard process  || 121 || 2512 || AES process -- AES competition -- AES contest -- Advanced Encryption Standard competition -- AES candidate  ||
 * 97 || Deniable encryption  || 119 || 2060 || Deniable Encryption  ||
 * 98 || Voynich manuscript  || 117 || 38042 || Voynich Manuscript -- Voynich -- Voynich MS  ||
 * 99 || Rabin cryptosystem  || 117 || 10488 || ||
 * 100 || Plaintext  || 115 || 5249 || ||
 * 101 || National Cryptologic Museum  || 114 || 545 || National cryptologic museum  ||
 * 102 || Confidentiality  || 114 || 2056 || Data confidentiality  ||
 * 103 || Weak key  || 113 || 3961 || ||
 * 104 || Diffie-Hellman key exchange  || 113 || 9947 || Diffie-Hellman -- Diffie Hellman -- Diffie-Hellman-Merkle key exchange -- Diffie-Hellman-Merkle -- Diffie-Hellman key agreement  ||
 * 105 || Content-scrambling system  || 112 || 2426 || Content Scrambling System -- Content scrambling system  ||
 * 106 || RC2  || 110 || 3383 || ||
 * 107 || Geheimfernschreiber  || 110 || 3255 || STURGEON (cryptography)  ||
 * 108 || Security engineering  || 107 || 2579 || ||
 * 109 || SIGABA  || 106 || 9000 || Sigaba -- ECM Mark II  ||
 * 110 || Public key certificate  || 105 || 4773 || Digital certificate -- Digital Certificate -- Identity certificate -- Digital identity certificate  ||
 * 111 || XSL attack  || 103 || 9990 || ||
 * 112 || Security through obscurity  || 103 || 8332 || Security by obscurity  ||
 * 113 || Autokey cipher  || 103 || 3820 || ||
 * 114 || Magic (cryptography)  || 101 || 12477 || Magic cryptography  ||
 * 115 || ElGamal discrete log cryptosystem  || 101 || 2938 || Elgamal discrete logarithm cryptosystem -- El Gamal discrete log cryptosystem -- ElGamal -- El Gamal -- Elgamal -- Elgamal discrete log cryptosystem  ||
 * 116 || Dmitry Sklyarov  || 99 || 2832 || Dmitri Sklyarov -- Dimitri Sklyarov -- Dimitri Skylarov -- Sklyarov -- Dimitry Sklyarov -- Dimitry Sklyarov -- Dimitry Sklyarov  ||
 * 117 || SHA family  || 96 || 10977 || SHA -- SHA1 -- SHA-256 -- SHA-384 -- SHA-512 -- SHA-1 -- Secure Hash Algorithm family -- Secure Hash Algorithm -- SHA-0 -- SHA512  ||
 * 118 || EFF DES cracker  || 96 || 3960 || Deep Crack -- Deep crack -- DES cracker  ||
 * 119 || SIGINT  || 95 || 2944 || Signals intelligence -- Sigint -- Signals Intelligence -- Signal intelligence  ||
 * 120 || RSA number  || 93 || 13287 || RSA numbers  ||
 * 121 || Key size  || 93 || 8328 || Cryptography/key length -- Cryptographic key length -- Key length  ||
 * 122 || RC5  || 92 || 2767 || RC5 cipher -- RC5 encryption algorithm  ||
 * 123 || Collision attack  || 92 || 348 || ||
 * 124 || Alice and Bob  || 92 || 4303 || Characters in cryptography  ||
 * 125 || OpenSSL  || 91 || 970 || Openssl  ||
 * 126 || Web of trust  || 90 || 6797 || Web of Trust  ||
 * 127 || The Gold Bug  || 90 || 2121 || ||
 * 128 || Digital Fortress  || 90 || 1184 || ||
 * 129 || Crib  || 90 || 1334 || Cribbing  ||
 * 130 || SEED  || 89 || 419 || SEED (cipher)  ||
 * 131 || Beale ciphers  || 89 || 6121 || Beale Ciphers  ||
 * 132 || Linear cryptanalysis  || 88 || 1758 || ||
 * 133 || S/MIME  || 87 || 902 || Smime -- SMIME  ||
 * 134 || Pseudonymity  || 87 || 2790 || ||
 * 135 || SSH file transfer protocol  || 86 || 1672 || Secure file transfer program  ||
 * 136 || OpenSSH  || 85 || 3512 || Openssh  ||
 * 137 || 802.11i  || 85 || 1135 || IEEE 802.11i -- WEP2 -- WPA2  ||
 * 138 || MD4  || 84 || 1360 || ||
 * 139 || Electronic money  || 84 || 1651 || Digital cash -- EFT -- Electronic cash  ||
 * 140 || Cryptographic protocol  || 84 || 1514 || Cyptographic protocol -- Security protocol  ||
 * 141 || Code (cryptography)  || 84 || 7701 || Codetext  ||
 * 142 || Adversary  || 84 || 1877 || ||
 * 143 || XTEA  || 83 || 4138 || ||
 * 144 || Discrete logarithm  || 83 || 2293 || Discrete log problem -- Discrete logarithm problem -- Discrete logarithms -- Discrete log  ||
 * 145 || Anonymous remailer  || 83 || 14590 || Anonymous Remailer -- Remailer  ||
 * 146 || OpenPGP  || 82 || 688 || RFC 2440  ||
 * 147 || MD5CRK  || 82 || 2781 || ||
 * 148 || Traffic analysis  || 81 || 7292 || ||
 * 149 || Computer surveillance  || 80 || 7294 || ||
 * 150 || Communications Security Establishment  || 80 || 2100 || ||
 * 151 || Preimage attack  || 79 || 382 || ||
 * 152 || MI8  || 78 || 1266 || ||
 * 153 || Bruce Schneier  || 78 || 2342 || Schneier  ||
 * 154 || Decipherment  || 77 || 1480 || Decipher -- Decypher  ||
 * 155 || Ron Rivest  || 76 || 2132 || Rivest -- Ronald Rivest -- Ronald L. Rivest  ||
 * 156 || Linear feedback shift register  || 76 || 2242 || LFSR  ||
 * 157 || Secret sharing  || 75 || 10531 || Key splitting  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||
 * 119 || SIGINT  || 95 || 2944 || Signals intelligence -- Sigint -- Signals Intelligence -- Signal intelligence  ||
 * 120 || RSA number  || 93 || 13287 || RSA numbers  ||
 * 121 || Key size  || 93 || 8328 || Cryptography/key length -- Cryptographic key length -- Key length  ||
 * 122 || RC5  || 92 || 2767 || RC5 cipher -- RC5 encryption algorithm  ||
 * 123 || Collision attack  || 92 || 348 || ||
 * 124 || Alice and Bob  || 92 || 4303 || Characters in cryptography  ||
 * 125 || OpenSSL  || 91 || 970 || Openssl  ||
 * 126 || Web of trust  || 90 || 6797 || Web of Trust  ||
 * 127 || The Gold Bug  || 90 || 2121 || ||
 * 128 || Digital Fortress  || 90 || 1184 || ||
 * 129 || Crib  || 90 || 1334 || Cribbing  ||
 * 130 || SEED  || 89 || 419 || SEED (cipher)  ||
 * 131 || Beale ciphers  || 89 || 6121 || Beale Ciphers  ||
 * 132 || Linear cryptanalysis  || 88 || 1758 || ||
 * 133 || S/MIME  || 87 || 902 || Smime -- SMIME  ||
 * 134 || Pseudonymity  || 87 || 2790 || ||
 * 135 || SSH file transfer protocol  || 86 || 1672 || Secure file transfer program  ||
 * 136 || OpenSSH  || 85 || 3512 || Openssh  ||
 * 137 || 802.11i  || 85 || 1135 || IEEE 802.11i -- WEP2 -- WPA2  ||
 * 138 || MD4  || 84 || 1360 || ||
 * 139 || Electronic money  || 84 || 1651 || Digital cash -- EFT -- Electronic cash  ||
 * 140 || Cryptographic protocol  || 84 || 1514 || Cyptographic protocol -- Security protocol  ||
 * 141 || Code (cryptography)  || 84 || 7701 || Codetext  ||
 * 142 || Adversary  || 84 || 1877 || ||
 * 143 || XTEA  || 83 || 4138 || ||
 * 144 || Discrete logarithm  || 83 || 2293 || Discrete log problem -- Discrete logarithm problem -- Discrete logarithms -- Discrete log  ||
 * 145 || Anonymous remailer  || 83 || 14590 || Anonymous Remailer -- Remailer  ||
 * 146 || OpenPGP  || 82 || 688 || RFC 2440  ||
 * 147 || MD5CRK  || 82 || 2781 || ||
 * 148 || Traffic analysis  || 81 || 7292 || ||
 * 149 || Computer surveillance  || 80 || 7294 || ||
 * 150 || Communications Security Establishment  || 80 || 2100 || ||
 * 151 || Preimage attack  || 79 || 382 || ||
 * 152 || MI8  || 78 || 1266 || ||
 * 153 || Bruce Schneier  || 78 || 2342 || Schneier  ||
 * 154 || Decipherment  || 77 || 1480 || Decipher -- Decypher  ||
 * 155 || Ron Rivest  || 76 || 2132 || Rivest -- Ronald Rivest -- Ronald L. Rivest  ||
 * 156 || Linear feedback shift register  || 76 || 2242 || LFSR  ||
 * 157 || Secret sharing  || 75 || 10531 || Key splitting  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||
 * 139 || Electronic money  || 84 || 1651 || Digital cash -- EFT -- Electronic cash  ||
 * 140 || Cryptographic protocol  || 84 || 1514 || Cyptographic protocol -- Security protocol  ||
 * 141 || Code (cryptography)  || 84 || 7701 || Codetext  ||
 * 142 || Adversary  || 84 || 1877 || ||
 * 143 || XTEA  || 83 || 4138 || ||
 * 144 || Discrete logarithm  || 83 || 2293 || Discrete log problem -- Discrete logarithm problem -- Discrete logarithms -- Discrete log  ||
 * 145 || Anonymous remailer  || 83 || 14590 || Anonymous Remailer -- Remailer  ||
 * 146 || OpenPGP  || 82 || 688 || RFC 2440  ||
 * 147 || MD5CRK  || 82 || 2781 || ||
 * 148 || Traffic analysis  || 81 || 7292 || ||
 * 149 || Computer surveillance  || 80 || 7294 || ||
 * 150 || Communications Security Establishment  || 80 || 2100 || ||
 * 151 || Preimage attack  || 79 || 382 || ||
 * 152 || MI8  || 78 || 1266 || ||
 * 153 || Bruce Schneier  || 78 || 2342 || Schneier  ||
 * 154 || Decipherment  || 77 || 1480 || Decipher -- Decypher  ||
 * 155 || Ron Rivest  || 76 || 2132 || Rivest -- Ronald Rivest -- Ronald L. Rivest  ||
 * 156 || Linear feedback shift register  || 76 || 2242 || LFSR  ||
 * 157 || Secret sharing  || 75 || 10531 || Key splitting  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||
 * 149 || Computer surveillance  || 80 || 7294 || ||
 * 150 || Communications Security Establishment  || 80 || 2100 || ||
 * 151 || Preimage attack  || 79 || 382 || ||
 * 152 || MI8  || 78 || 1266 || ||
 * 153 || Bruce Schneier  || 78 || 2342 || Schneier  ||
 * 154 || Decipherment  || 77 || 1480 || Decipher -- Decypher  ||
 * 155 || Ron Rivest  || 76 || 2132 || Rivest -- Ronald Rivest -- Ronald L. Rivest  ||
 * 156 || Linear feedback shift register  || 76 || 2242 || LFSR  ||
 * 157 || Secret sharing  || 75 || 10531 || Key splitting  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||
 * 154 || Decipherment  || 77 || 1480 || Decipher -- Decypher  ||
 * 155 || Ron Rivest  || 76 || 2132 || Rivest -- Ronald Rivest -- Ronald L. Rivest  ||
 * 156 || Linear feedback shift register  || 76 || 2242 || LFSR  ||
 * 157 || Secret sharing  || 75 || 10531 || Key splitting  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||
 * 157 || Secret sharing  || 75 || 10531 || Key splitting  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||
 * 158 || GNU Privacy Guard  || 75 || 6251 || Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG  ||


 * 159 || Confusion and diffusion  || 75 || 1716 || Diffusion (cryptography) -- Confusion (cryptography) -- Diffusion and confusion  ||
 * 160 || Avalanche effect  || 75 || 1879 || Avalanche (cryptography)  ||
 * 161 || The Magic Words are Squeamish Ossifrage  || 73 || 2685 || Squeamish ossifrage  ||
 * 162 || TKIP  || 71 || 1195 || ||
 * 163 || Defence Signals Directorate  || 71 || 943 || ||
 * 164 || WikiProject Cryptography  || 70 || 12011 || User:Matt Crypto/prop -- WikiProject Cryptology  ||
 * 165 || TICOM  || 70 || 1185 || ||
 * 166 || RC6  || 70 || 1421 || RC6 cipher -- RC6 encryption algorithm  ||
 * 167 || List of famous ciphertexts  || 70 || 548 || Famous ciphertexts  ||
 * 168 || Cryptogram  || 70 || 1215 || ||
 * 169 || KL-7  || 69 || 3814 || ||
 * 170 || IPsec  || 69 || 8845 || RFC 2401 -- IPSEC -- Authentication Header -- Encapsulating Security Payload -- IPSec -- IPsec implementations  ||
 * 171 || William F. Friedman  || 68 || 11954 || William Friedman -- William Frederick Friedman -- Wolfe Frederick Friedman  ||
 * 172 || Khufu and Khafre  || 68 || 4898 || Khafre (cipher) -- Khufu (cipher)  ||
 * 173 || Replay attack  || 67 || 1595 || ||
 * 174 || Initialization vector  || 67 || 1874 || Initialisation vector  ||
 * 175 || FISH (cryptography)  || 67 || 1311 || ||
 * 176 || Dictionary attack  || 67 || 2734 || ||
 * 177 || Computer insecurity  || 67 || 13931 || ||
 * 178 || Polybius square  || 66 || 3213 || ||
 * 179 || Lucifer (cipher)  || 65 || 3954 || Lucifer cipher  ||
 * 180 || Export of cryptography  || 65 || 11772 || ||
 * 181 || Feistel cipher  || 64 || 3491 || Feistel network -- Feistel scheme -- Feistel  ||
 * 182 || Classical cipher  || 64 || 800 || Classical cryptography  ||
 * 183 || Block size (cryptography)  || 64 || 2183 || ||
 * 184 || A5/1  || 64 || 7257 || A5 (cryptography)  ||
 * 185 || Substitution-permutation network  || 63 || 1087 || SP-network -- SPN -- Substitution-Permutation network  ||
 * 186 || Hebern rotor machine  || 63 || 6767 || Hebern Rotor Machine  ||
 * 187 || Quadratic sieve  || 62 || 11164 || Multiple Polynomial Quadratic Sieve  ||
 * 188 || Johannes Trithemius  || 62 || 4041 || ||
 * 189 || Leone Battista Alberti  || 61 || 5229 || Leone Battista Alrerti -- Leon Battista Alberti -- Alberti, Leone Battista -- Leone Alberti  ||
 * 190 || Chosen plaintext attack  || 61 || 2016 || Chosen plaintext -- Chosen-text attack -- Chosen-plaintext attack -- Chosen-plaintext -- Adaptive chosen-plaintext attack -- Adaptive chosen plaintext attack  ||
 * 191 || Zero-knowledge proof  || 60 || 6332 || Zero knowledge proof -- Zero-knowledge  ||
 * 192 || Chaffing and winnowing  || 60 || 716 || ||
 * 193 || Dorabella Cipher  || 59 || 490 || ||
 * 194 || Tiger (hash)  || 58 || 731 || Tiger hash function -- Tiger (cryptography)  ||
 * 195 || Government Communications Headquarters  || 58 || 4047 || GCHQ -- GC&CS -- Government Code and Cypher School -- Government Code and Cipher School -- Communications-Electronics Security Group -- CESG  ||
 * 196 || CAST-128  || 58 || 2790 || CAST5 -- CAST -- CAST-5  ||
 * 197 || Books on cryptography  || 58 || 16355 || ||
 * 178 || Polybius square  || 66 || 3213 || ||
 * 179 || Lucifer (cipher)  || 65 || 3954 || Lucifer cipher  ||
 * 180 || Export of cryptography  || 65 || 11772 || ||
 * 181 || Feistel cipher  || 64 || 3491 || Feistel network -- Feistel scheme -- Feistel  ||
 * 182 || Classical cipher  || 64 || 800 || Classical cryptography  ||
 * 183 || Block size (cryptography)  || 64 || 2183 || ||
 * 184 || A5/1  || 64 || 7257 || A5 (cryptography)  ||
 * 185 || Substitution-permutation network  || 63 || 1087 || SP-network -- SPN -- Substitution-Permutation network  ||
 * 186 || Hebern rotor machine  || 63 || 6767 || Hebern Rotor Machine  ||
 * 187 || Quadratic sieve  || 62 || 11164 || Multiple Polynomial Quadratic Sieve  ||
 * 188 || Johannes Trithemius  || 62 || 4041 || ||
 * 189 || Leone Battista Alberti  || 61 || 5229 || Leone Battista Alrerti -- Leon Battista Alberti -- Alberti, Leone Battista -- Leone Alberti  ||
 * 190 || Chosen plaintext attack  || 61 || 2016 || Chosen plaintext -- Chosen-text attack -- Chosen-plaintext attack -- Chosen-plaintext -- Adaptive chosen-plaintext attack -- Adaptive chosen plaintext attack  ||
 * 191 || Zero-knowledge proof  || 60 || 6332 || Zero knowledge proof -- Zero-knowledge  ||
 * 192 || Chaffing and winnowing  || 60 || 716 || ||
 * 193 || Dorabella Cipher  || 59 || 490 || ||
 * 194 || Tiger (hash)  || 58 || 731 || Tiger hash function -- Tiger (cryptography)  ||
 * 195 || Government Communications Headquarters  || 58 || 4047 || GCHQ -- GC&CS -- Government Code and Cypher School -- Government Code and Cipher School -- Communications-Electronics Security Group -- CESG  ||
 * 196 || CAST-128  || 58 || 2790 || CAST5 -- CAST -- CAST-5  ||
 * 197 || Books on cryptography  || 58 || 16355 || ||
 * 188 || Johannes Trithemius  || 62 || 4041 || ||
 * 189 || Leone Battista Alberti  || 61 || 5229 || Leone Battista Alrerti -- Leon Battista Alberti -- Alberti, Leone Battista -- Leone Alberti  ||
 * 190 || Chosen plaintext attack  || 61 || 2016 || Chosen plaintext -- Chosen-text attack -- Chosen-plaintext attack -- Chosen-plaintext -- Adaptive chosen-plaintext attack -- Adaptive chosen plaintext attack  ||
 * 191 || Zero-knowledge proof  || 60 || 6332 || Zero knowledge proof -- Zero-knowledge  ||
 * 192 || Chaffing and winnowing  || 60 || 716 || ||
 * 193 || Dorabella Cipher  || 59 || 490 || ||
 * 194 || Tiger (hash)  || 58 || 731 || Tiger hash function -- Tiger (cryptography)  ||
 * 195 || Government Communications Headquarters  || 58 || 4047 || GCHQ -- GC&CS -- Government Code and Cypher School -- Government Code and Cipher School -- Communications-Electronics Security Group -- CESG  ||
 * 196 || CAST-128  || 58 || 2790 || CAST5 -- CAST -- CAST-5  ||
 * 197 || Books on cryptography  || 58 || 16355 || ||
 * 193 || Dorabella Cipher  || 59 || 490 || ||
 * 194 || Tiger (hash)  || 58 || 731 || Tiger hash function -- Tiger (cryptography)  ||
 * 195 || Government Communications Headquarters  || 58 || 4047 || GCHQ -- GC&CS -- Government Code and Cypher School -- Government Code and Cipher School -- Communications-Electronics Security Group -- CESG  ||
 * 196 || CAST-128  || 58 || 2790 || CAST5 -- CAST -- CAST-5  ||
 * 197 || Books on cryptography  || 58 || 16355 || ||
 * 196 || CAST-128  || 58 || 2790 || CAST5 -- CAST -- CAST-5  ||
 * 197 || Books on cryptography  || 58 || 16355 || ||
 * 197 || Books on cryptography  || 58 || 16355 || ||
 * 197 || Books on cryptography  || 58 || 16355 || ||


 * 198 || Rubber-hose cryptanalysis  || 57 || 2543 || Rubber hose cryptanalysis  ||
 * 199 || Ross Anderson  || 57 || 1709 || Ross J. Anderson  ||
 * 200 || Distributed.net  || 57 || 1137 || ||
 * 201 || Wired Equivalent Privacy  || 56 || 3326 || WEP  ||
 * 202 || Null cipher  || 56 || 1124 || Null cypher  ||
 * 203 || Max Newman  || 56 || 1516 || Maxwell Newman  ||
 * 204 || Hashcash  || 55 || 3076 || ||
 * 205 || Fortezza  || 55 || 1280 || KOV-8  ||
 * 206 || Gardening (cryptanalysis)  || 54 || 1048 || ||
 * 207 || Clifford Cocks  || 54 || 1942 || ||
 * 208 || Clipper chip  || 53 || 4545 || Clipper Chip  ||
 * 209 || Playfair cipher  || 52 || 5154 || Playfair -- Playfair square  ||
 * 210 || Message Authentication Code  || 52 || 1309 || Message authentication code  ||
 * 211 || Substitution box  || 50 || 6284 || S-box -- Cryptography/s-box -- Substitution boxes  ||
 * 212 || Snake oil (cryptography)  || 50 || 9433 || Snake oil cryptography  ||
 * 213 || Physical security  || 50 || 1596 || Physical Security  ||
 * 214 || Lorenz cypher  || 50 || 2646 || Tunny (cryptography) -- Lorenz cipher -- Fish cyphers -- TUNNY -- Fish ciphers -- Lorentz Cipher -- Lorentz Cypher -- Lorenz Machine -- Lorentz Machine  ||
 * 215 || JN-25  || 50 || 2478 || ||
 * 216 || Secure cryptoprocessor  || 49 || 2889 || ||
 * 217 || Kasiski examination  || 48 || 2760 || Kasiski test  ||
 * 218 || Steganalysis  || 47 || 4527 || ||
 * 219 || STU-III  || 47 || 4236 || ||
 * 220 || Leonard Adleman  || 47 || 2595 || Len Adleman -- Adleman -- Leonard M. Adleman -- Adleman, Leonard  ||
 * 221 || KASUMI  || 47 || 1494 || Kasumi (cipher)  ||
 * 222 || Daniel J. Bernstein  || 47 || 919 || Dan Bernstein -- D. J. Bernstein -- Daniel Bernstein -- Djb  ||
 * 223 || Secret decoder ring  || 45 || 897 || ||
 * 224 || RSA Factoring Challenge  || 44 || 1530 || ||
 * 225 || NSA encryption systems  || 44 || 15126 || ||
 * 226 || Chosen ciphertext attack  || 44 || 1013 || ||
 * 227 || Affine cipher  || 44 || 1486 || ||
 * 228 || Serpent (cipher)  || 43 || 1364 || Serpent encryption algorithm  ||
 * 229 || Permutation cipher  || 43 || 2076 || ||
 * 230 || MARS  || 43 || 996 || Mars (cipher)  ||
 * 231 || List of cryptographers  || 43 || 11426 || Cryptographer -- Cryptographers -- Cryptologist -- List of cryptologists  ||
 * 232 || Enigmail  || 43 || 914 || ||
 * 233 || S-1  || 42 || 882 || S-1 block cipher  ||
 * 234 || Merkle-Hellman  || 42 || 2370 || ||
 * 235 || Key schedule  || 42 || 1316 || Key scheduling -- Subkey  ||
 * 236 || HAVAL  || 42 || 2183 || ||
 * 237 || New Zealand Government Communications Security Bureau  || 41 || 1262 || Government Communications Security Bureau  ||
 * 238 || Index of coincidence  || 41 || 2858 || Coincidence counting  ||
 * 239 || Cipherspace  || 41 || 923 || ||
 * 240 || Adaptive chosen ciphertext attack  || 41 || 2203 || Adaptive chosen-ciphertext attack  ||
 * 241 || GOST  || 40 || 3123 || ||
 * 242 || FEAL  || 40 || 4829 || ||
 * 243 || Diplomatic bag  || 40 || 1456 || Diplomatic pouch  ||
 * 244 || Challenge–response authentication  || 40 || 2274 || ||
 * 245 || Book cipher  || 40 || 831 || ||
 * 246 || Arthur Scherbius  || 40 || 1865 || ||
 * 247 || Square (cipher)  || 39 || 1181 || ||
 * 248 || MD2  || 39 || 1149 || Message Digest Algorithm 2  ||
 * 249 || Covert channel  || 39 || 1439 || ||
 * 250 || The Codebreakers  || 38 || 1110 || ||
 * 251 || SAFER  || 38 || 5605 || SAFER-K -- SAFER (cipher) -- SAFER SK -- SAFER plus -- SAFER plus plus  ||
 * 252 || RSA Security  || 38 || 777 || RSA Data Security -- RSA Laboratories  ||
 * 253 || MacGuffin (cipher)  || 38 || 3265 || ||
 * 254 || KW-26  || 38 || 4250 || ||
 * 255 || Cipher Block Chaining  || 38 || 1548 || ||
 * 256 || Cardan grille  || 38 || 494 || ||
 * 257 || CRYPTREC  || 38 || 9428 || ||
 * 258 || Tabula recta  || 37 || 1685 || ||
 * 259 || Red Pike  || 37 || 1489 || Red pike  ||
 * 260 || NESSIE  || 37 || 3611 || ||
 * 261 || Key exchange  || 37 || 4058 || ||
 * 262 || ADFGVX cipher  || 37 || 3542 || ADFGVX  ||
 * 263 || Shugborough House inscription  || 36 || 1557 || ||
 * 264 || Room 40  || 36 || 2720 || ||
 * 265 || PC Bruno  || 36 || 1809 || ||
 * 266 || One way function  || 36 || 2565 || One-way -- One way  ||
 * 267 || Microdot  || 36 || 1685 || ||
 * 268 || Security protocol notation  || 35 || 973 || ||
 * 269 || Secure channel  || 35 || 3599 || ||
 * 270 || Secure FTP  || 35 || 1315 || ||
 * 271 || SIGSALY  || 35 || 6480 || ||
 * 272 || Product cipher  || 35 || 921 || ||
 * 273 || Padding (cryptography)  || 35 || 2881 || ||
 * 274 || Key management  || 35 || 1579 || Key management protocol  ||
 * 275 || Iraqi block cipher  || 35 || 580 || Iraqi Block Cipher  ||
 * 276 || EKMS  || 35 || 5662 || Electronic Key Management System  ||
 * 277 || Decrypt  || 35 || 731 || ||
 * 278 || Cryptography standards  || 35 || 4621 || ||
 * 279 || A5/2  || 35 || 601 || ||
 * 280 || Whitfield Diffie  || 34 || 2304 || Diffie  ||
 * 281 || Unicity distance  || 34 || 2667 || Spurious key  ||
 * 282 || Tiny Encryption Algorithm  || 34 || 4516 || TEA  ||
 * 283 || Russian copulation  || 34 || 1445 || ||
 * 284 || PKCS  || 34 || 3734 || ||
 * 285 || KY-57  || 34 || 999 || VINSON device  ||
 * 286 || CAST-256  || 34 || 1469 || ||
 * 287 || Arne Beurling  || 34 || 1412 || ||
 * 288 || 40-bit encryption  || 34 || 2334 || 40 bit encryption  ||
 * 289 || Side channel attack  || 33 || 6001 || ||
 * 290 || Running key cipher  || 33 || 7964 || ||
 * 291 || NewDES  || 33 || 3291 || ||
 * 292 || NTLM  || 33 || 1975 || ||
 * 293 || Mod n cryptanalysis  || 33 || 2531 || Mod-n cryptanalysis  ||
 * 294 || Key authentication  || 33 || 2643 || ||
 * 295 || GnuTLS  || 33 || 743 || ||
 * 296 || Cleartext  || 33 || 1477 || Clear message -- In clear -- In the clear  ||
 * 297 || Auguste Kerckhoffs  || 33 || 2927 || ||
 * 298 || Yarrow algorithm  || 32 || 1117 || ||
 * 299 || Salt (cryptography)  || 32 || 759 || ||
 * 300 || Key escrow  || 32 || 1779 || ||
 * 301 || GMR  || 32 || 1135 || ||
 * 302 || Camellia (cipher)  || 32 || 1704 || ||
 * 303 || Bernstein v. United States  || 32 || 1489 || Bernstein v. U.S. Dept. of State  ||
 * 304 || Trusted third party  || 31 || 3564 || Trusted Third Party  ||
 * 305 || Taher ElGamal  || 31 || 1824 || Taher El-Gamal -- Taher Elgamal  ||
 * 306 || Snuffle  || 31 || 1107 || ||
 * 307 || Cryptographic engineering  || 31 || 7785 || ||
 * 308 || Ciphertext-only attack  || 31 || 1019 || Ciphertext only attack -- Ciphertext-only  ||
 * 309 || Kerckhoffs' law  || 30 || 4087 || Kerckhoff's principle -- Kerckhoffs' principle -- Shannon's maxim -- Kerkhoffs' law -- Kerkhoffs law -- Kerckhoffs law -- Kirckhoffs law -- Kerkchoffs law -- Kerchoffs law -- Kerchoff's law -- Kerchoff's Law -- Shannon's Maxim -- Kerchoffs' Law -- Kerckhoffs' Law -- Kerchkoffs' Law -- Kerkhoffs' Law  ||
 * 310 || 3-Way  || 30 || 1777 || 3-WAY  ||
 * 311 || Tommy Flowers  || 29 || 1962 || Tommy flowers -- Thomas Flowers -- Thomas Harold Flowers  ||
 * 312 || Straddling checkerboard  || 29 || 5879 || ||
 * 313 || RSA-2048  || 29 || 2509 || ||
 * 314 || Needham-Schroeder  || 29 || 1892 || ||
 * 315 || Wide Mouth Frog  || 28 || 1002 || ||
 * 316 || Ralph Merkle  || 28 || 1792 || ||
 * 317 || Piling-up lemma  || 28 || 4106 || Piling up lemma  ||
 * 318 || Phil Zimmermann  || 28 || 2321 || PhilZimmermann -- Philip Zimmermann  ||
 * 319 || PURPLE  || 28 || 4151 || Purple code -- Purple (cryptography)  ||
 * 320 || Hushmail  || 28 || 1489 || ||
 * 321 || Friedrich Kasiski  || 28 || 2803 || Kasiski -- Friedrich Wilhelm Kasiski  ||
 * 322 || David Kahn  || 28 || 1931 || ||
 * 323 || Type 1 encryption  || 27 || 980 || Type 1 algorithm -- Type 1 product -- High-grade encryption -- Type I encryption  ||
 * 324 || RSA-100  || 27 || 522 || ||
 * 325 || Malleability  || 27 || 633 || Malleable -- Maellability  ||
 * 326 || Hans Thilo-Schmidt  || 27 || 1850 || Asch -- Hans Thilo Schmidt  ||
 * 327 || Financial cryptography  || 27 || 347 || ||
 * 328 || Communication Theory of Secrecy Systems  || 27 || 662 || ||
 * 329 || Secure Terminal Equipment  || 26 || 1721 || STE  ||
 * 330 || Passphrase  || 26 || 5716 || Pass-phrase -- Pass phrase  ||
 * 331 || OMAC  || 26 || 637 || ||
 * 332 || Josef Pieprzyk  || 26 || 176 || ||
 * 333 || Horst Feistel  || 26 || 2462 || ||
 * 334 || FNBDT  || 26 || 5772 || ||
 * 335 || SEAL (cipher)  || 25 || 436 || SEAL (cryptography)  ||
 * 336 || MISTY1  || 25 || 1644 || MISTY-1 -- MISTY  ||
 * 337 || Known-plaintext attack  || 25 || 767 || Known plaintext attack -- Known plaintext  ||
 * 338 || Elliptic Curve DSA  || 25 || 759 || ECDSA  ||
 * 339 || DigiCipher 2  || 25 || 1545 || ||
 * 340 || David Chaum  || 25 || 339 || ||
 * 341 || The Alphabet Cipher  || 24 || 3442 || ||
 * 342 || Tamper resistance  || 24 || 1959 || Tamper-resistant -- Tamper resistant -- Tamper-resistance  ||
 * 343 || Secure multiparty computation  || 24 || 3172 || Millionaire problem  ||
 * 344 || RSA-640  || 24 || 735 || ||
 * 345 || RSA-129  || 24 || 1222 || ||
 * 346 || Madryga  || 24 || 4492 || ||
 * 347 || Keyed-hash message authentication code  || 24 || 1171 || HMAC -- Keyed-Hashing Message Authentication -- Hmac  ||
 * 348 || Key generation  || 24 || 1562 || ||
 * 349 || DES-X  || 24 || 1683 || DESX  ||
 * 350 || RSA-140  || 23 || 1230 || ||
 * 351 || RSA-1024  || 23 || 872 || ||
 * 352 || Martin Hellman  || 23 || 1329 || ||
 * 353 || ISAAC (cipher)  || 23 || 1698 || ISAAC -- ISAAC (cryptography)  ||
 * 354 || Helix (cipher)  || 23 || 1765 || ||
 * 355 || Elizebeth Friedman  || 23 || 11786 || Elizabeth Friedman  ||
 * 356 || David Wagner  || 23 || 1933 || ||
 * 357 || Cryptome  || 23 || 1173 || Cryptome.org  ||
 * 358 || Cryptologia  || 23 || 451 || ||
 * 359 || Common Scrambling Algorithm  || 23 || 1971 || ||
 * 360 || Blind signature  || 23 || 3755 || ||
 * 361 || Al Bhed  || 23 || 2510 || ||
 * 362 || VIC cipher  || 22 || 1121 || ||
 * 363 || Session key  || 22 || 1592 || ||
 * 364 || SHARK  || 22 || 1468 || Shark (cipher) -- SHARK (cipher)  ||
 * 365 || Poem code  || 22 || 1570 || ||
 * 366 || Leo Marks  || 22 || 7538 || Leopold Samuel Marks  ||
 * 367 || KHAZAD  || 22 || 1480 || Khazad (cipher) -- KHAZAD (cipher)  ||
 * 368 || Henryk Zygalski  || 22 || 627 || ||
 * 369 || Central Security Service  || 22 || 947 || ||
 * 370 || TWIRL  || 21 || 1770 || ||
 * 371 || SHACAL  || 21 || 2710 || SHACAL-1 -- Shacal-2  ||
 * 372 || RSA-576  || 21 || 1119 || ||
 * 373 || KW-37  || 21 || 3688 || KWR-37 -- KWT-37  ||
 * 374 || John Tiltman  || 21 || 3149 || ||
 * 375 || Jerzy Rozycki  || 21 || 1088 || Jerzy RóÅ¼ycki  ||
 * 376 || EFS  || 21 || 1523 || ||
 * 377 || David Wheeler  || 21 || 814 || ||
 * 378 || DES supplementary material  || 21 || 7677 || ||
 * 379 || Agnes Meyer Driscoll  || 21 || 3301 || ||
 * 380 || TrueCrypt  || 20 || 1478 || Truecrypt  ||
 * 381 || Shrinking generator  || 20 || 1152 || ||
 * 382 || Electronic signature  || 20 || 1367 || ||
 * 383 || DEAL  || 20 || 1447 || ||
 * 384 || CAcert  || 20 || 392 || ||
 * 385 || Baby-step giant-step  || 20 || 1142 || BSGS  ||
 * 386 || Arlington Hall  || 20 || 1590 || ||
 * 387 || Visual cryptography  || 19 || 986 || ||
 * 388 || Snefru  || 19 || 1116 || Snefru (cryptography)  ||
 * 389 || RSA-130  || 19 || 1351 || ||
 * 390 || Lars Knudsen  || 19 || 1668 || Lars R. Knudsen  ||
 * 391 || Great Cypher  || 19 || 829 || Great Cipher  ||
 * 392 || CRYPTO  || 19 || 756 || ||
 * 393 || CCMP  || 19 || 286 || ||
 * 394 || Semantic security  || 18 || 1643 || ||
 * 395 || Scrambler  || 18 || 2458 || Descrambler  ||
 * 396 || Pike (cipher)  || 18 || 637 || Pike (cryptography)  ||
 * 397 || Oblivious transfer  || 18 || 899 || ||
 * 398 || M-209  || 18 || 16425 || ||
 * 399 || Internet Security Association and Key Management Protocol  || 18 || 486 || ISAKMP  ||
 * 400 || Frank Rowlett  || 18 || 2867 || ||
 * 401 || Don Coppersmith  || 18 || 829 || Donald Coppersmith  ||
 * 402 || Burrows-Abadi-Needham logic  || 18 || 9097 || BAN logic -- BAN Logic  ||
 * 403 || Bifid cipher  || 18 || 1536 || ||
 * 404 || WAKE  || 17 || 650 || ||
 * 405 || Vincent Rijmen  || 17 || 1325 || ||
 * 406 || Secure copy  || 17 || 1690 || SCP -- Scp -- Secure Copy Protocol -- Secure Copy  ||
 * 407 || Online Certificate Status Protocol  || 17 || 495 || Ocsp -- OCSP  ||
 * 408 || M-94  || 17 || 3032 || M-94 (cypher)  ||
 * 409 || Internet key exchange  || 17 || 807 || IKE -- Internet Key Exchange  ||
 * 410 || Herbert Yardley  || 17 || 6638 || Herbert O. Yardley  ||
 * 411 || Digital timestamping  || 17 || 2011 || ||
 * 412 || Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age  || 17 || 525 || ||
 * 413 || Certificate revocation list  || 17 || 3553 || CRL -- Certificate Revocation List -- Compromised key list  ||
 * 414 || W. T. Tutte  || 16 || 1698 || Bill Tutte  ||
 * 415 || Trapdoor function  || 16 || 1463 || Trapdoor one way function -- Trapdoor permutation  ||
 * 416 || Secure Communication based on Quantum Cryptography  || 16 || 978 || SECOQC  ||
 * 417 || RED/BLACK concept  || 16 || 806 || RED signal  ||
 * 418 || Merkle's Puzzles  || 16 || 1684 || Merkle's puzzles -- Ralph Merkle puzzle cryptographic system  ||
 * 419 || MAGENTA  || 16 || 1736 || MAGENTA (cipher)  ||
 * 420 || LOKI  || 16 || 2934 || LOKI91 -- LOKI89  ||
 * 421 || Key signing party  || 16 || 1514 || Keysigning party  ||
 * 422 || Key distribution center  || 16 || 2297 || KDC  ||
 * 423 || Eli Biham  || 16 || 725 || ||
 * 424 || AxCrypt  || 16 || 299 || ||
 * 425 || Zeroise  || 15 || 2504 || Zeroization  ||
 * 426 || Type 4 encryption  || 15 || 627 || Type 4 algorithm  ||
 * 427 || Timing attack  || 15 || 1795 || ||
 * 428 || TWINKLE  || 15 || 2690 || ||
 * 429 || Stunnel  || 15 || 564 || ||
 * 430 || SYSKEY  || 15 || 1055 || ||
 * 431 || Root certificate  || 15 || 1548 || ||
 * 432 || RSA-768  || 15 || 767 || ||
 * 433 || RSA-160  || 15 || 1212 || ||
 * 434 || PMAC  || 15 || 706 || ||
 * 435 || Louis W. Tordella  || 15 || 3060 || ||
 * 436 || LOKI97  || 15 || 1553 || ||
 * 437 || Key-agreement protocol  || 15 || 1529 || ||
 * 438 || Babington Plot  || 15 || 1437 || Babington plot -- Anthony Babington's plot  ||
 * 439 || Type 2 encryption  || 14 || 1060 || Type 2 product  ||
 * 440 || Simple public key infrastructure  || 14 || 462 || Simple Public Key Infrastructure -- SPKI  ||
 * 441 || RSA-1536  || 14 || 1046 || ||
 * 442 || RSA-150  || 14 || 880 || ||
 * 443 || RSA-120  || 14 || 561 || ||
 * 444 || Privacy-enhanced Electronic Mail  || 14 || 308 || Privacy-enhanced electronic mail -- Privacy Enhanced Mail  ||
 * 445 || NTRUEncrypt  || 14 || 1404 || NTRU  ||
 * 446 || Key server  || 14 || 1197 || ||
 * 447 || Joan Daemen  || 14 || 512 || ||
 * 448 || James H. Ellis  || 14 || 2321 || ||
 * 449 || ID-based cryptography  || 14 || 2316 || ID Based Cryptography  ||
 * 450 || Hugo Hadwiger  || 14 || 859 || ||
 * 451 || Ciphony  || 14 || 811 || ||
 * 452 || The Code Book  || 13 || 2658 || ||
 * 453 || RSA-170  || 13 || 491 || ||
 * 454 || Niels Ferguson  || 13 || 659 || ||
 * 455 || Mitsuru Matsui  || 13 || 758 || ||
 * 456 || McEliece  || 13 || 1155 || ||
 * 457 || Communications security  || 13 || 2069 || COMSEC  ||
 * 458 || BATON  || 13 || 1708 || ||
 * 459 || Yuliang Zheng  || 12 || 373 || ||
 * 460 || World War II cryptography  || 12 || 1944 || ||
 * 461 || RSA-110  || 12 || 542 || ||
 * 462 || Paillier cryptosystem  || 12 || 1005 || Paillier  ||
 * 463 || N-Hash  || 12 || 1076 || N-hash  ||
 * 464 || MMB  || 12 || 1170 || ||
 * 465 || Joseph Mauborgne  || 12 || 352 || ||
 * 466 || Gilbert Vernam  || 12 || 1441 || ||
 * 467 || Dining cryptographers protocol  || 12 || 973 || Dining cryptographers -- Dining cryptographer -- Dining Cryptographers Protocol -- Dining cryptographer protocol -- Dining cryptographer's protocol  ||
 * 468 || Cryptographic Message Syntax  || 12 || 843 || ||
 * 469 || Crypto system  || 12 || 1975 || Cryptosystem  ||
 * 470 || Boris Hagelin  || 12 || 1360 || ||
 * 471 || Blind credential  || 12 || 992 || ||
 * 472 || Attacker  || 12 || 285 || ||
 * 473 || Strict avalanche criterion  || 11 || 681 || Strict Avalanche Criterion  ||
 * 474 || Shafi Goldwasser  || 11 || 1774 || Shafrira Goldwasser  ||
 * 475 || Secrets and Lies  || 11 || 198 || ||
 * 476 || SAVILLE  || 11 || 1267 || Saville (cipher)  ||
 * 477 || RSA-896  || 11 || 805 || ||
 * 478 || RSA-704  || 11 || 735 || ||
 * 479 || RSA-480  || 11 || 849 || ||
 * 480 || RSA-310  || 11 || 655 || ||
 * 481 || KOV-14  || 11 || 668 || Fortezza Plus  ||
 * 482 || KCDSA  || 11 || 858 || EC-KCDSA  ||
 * 483 || Edward Hebern  || 11 || 1838 || Edward Hugh Hebern  ||
 * 484 || Challenge–response test  || 11 || 825 || Challenge–response system  ||
 * 485 || Certification path validation algorithm  || 11 || 306 || ||
 * 486 || Certicom  || 11 || 717 || ||
 * 487 || COMSEC equipment  || 11 || 340 || ||
 * 488 || AN/CYZ-10  || 11 || 1214 || AN/CYZ-10 DTD  ||
 * 489 || Superencryption  || 10 || 202 || ||
 * 490 || Schnorr signature  || 10 || 1205 || ||
 * 491 || Random oracle  || 10 || 1139 || Random oracle model  ||
 * 492 || RSA-410  || 10 || 767 || ||
 * 493 || RSA-250  || 10 || 571 || ||
 * 494 || RSA-155  || 10 || 1406 || ||
 * 495 || Probabilistic encryption  || 10 || 1442 || Probabilistic Encryption  ||
 * 496 || Message forgery  || 10 || 240 || ||
 * 497 || Information-theoretically secure  || 10 || 946 || ||
 * 498 || FreeLIP  || 10 || 134 || ||
 * 499 || Direct anonymous attestation  || 10 || 285 || ||
 * 500 || Dilly Knox  || 10 || 720 || Dilwyn Knox  ||
 * 501 || Cellular Message Encryption Algorithm  || 10 || 1222 || CMEA (cipher)  ||
 * 502 || VINSON  || 9 || 626 || ||
 * 503 || SecurID  || 9 || 1457 || ||
 * 504 || RSA-617  || 9 || 1022 || ||
 * 505 || RSA-500  || 9 || 869 || ||
 * 506 || RSA-440  || 9 || 797 || ||
 * 507 || RSA-330  || 9 || 675 || ||
 * 508 || RSA-230  || 9 || 563 || ||
 * 509 || RSA-200  || 9 || 521 || ||
 * 510 || Power analysis  || 9 || 3461 || ||
 * 511 || Otway-Rees  || 9 || 1274 || ||
 * 512 || NSA encryption algorithms  || 9 || 4758 || ||
 * 513 || I. J. Good  || 9 || 1665 || I.J. Good -- Irving Good  ||
 * 514 || Crypto-society  || 9 || 1048 || Crypto-societies  ||
 * 515 || Blinding (cryptography)  || 9 || 1631 || Blinding  ||
 * 516 || Bazeries cylinder  || 9 || 12555 || Bazeries Cylinder  ||
 * 517 || Abraham Sinkov  || 9 || 6920 || ||
 * 518 || Type 3 encryption  || 8 || 500 || Type 3 algorithm  ||
 * 519 || Trench code  || 8 || 4412 || ||
 * 520 || Torus based cryptography  || 8 || 677 || ||
 * 521 || Solomon Kullback  || 8 || 368 || ||
 * 522 || RSA-450  || 8 || 807 || ||
 * 523 || RSA-370  || 8 || 715 || ||
 * 524 || RSA-350  || 8 || 695 || ||
 * 525 || RSA-300  || 8 || 633 || ||
 * 526 || RSA-270  || 8 || 603 || ||
 * 527 || RSA-210  || 8 || 531 || ||
 * 528 || Peter Gutmann  || 8 || 1128 || ||
 * 529 || Paul Kocher  || 8 || 1185 || ||
 * 530 || Passive attack  || 8 || 667 || ||
 * 531 || CrossCrypt  || 8 || 1560 || ||
 * 532 || S/KEY  || 7 || 514 || S/Key  ||
 * 533 || RSA-470  || 7 || 839 || ||
 * 534 || RSA-460  || 7 || 829 || ||
 * 535 || RSA-400  || 7 || 757 || ||
 * 536 || RSA-360  || 7 || 705 || ||
 * 537 || RSA-280  || 7 || 613 || ||
 * 538 || RSA-260  || 7 || 593 || ||
 * 539 || RSA-240  || 7 || 573 || ||
 * 540 || RSA-232  || 7 || 565 || ||
 * 541 || RSA-190  || 7 || 511 || ||
 * 542 || Jefferson disk  || 7 || 1440 || ||
 * 543 || George Scovell  || 7 || 842 || ||
 * 544 || Cryptology ePrint Archive  || 7 || 425 || EPrint  ||
 * 545 || Crypto AG  || 7 || 921 || ||
 * 546 || CipherSaber  || 7 || 804 || ||
 * 547 || Certificate-based encryption  || 7 || 1471 || ||
 * 548 || Cayley-Purser algorithm  || 7 || 997 || ||
 * 549 || Bit-flipping attack  || 7 || 1225 || ||
 * 550 || Self-signed certificate  || 6 || 2570 || Self signed certificate  ||
 * 551 || RSA-490  || 6 || 859 || ||
 * 552 || RSA-420  || 6 || 777 || ||
 * 553 || RSA-390  || 6 || 747 || ||
 * 554 || RSA-340  || 6 || 685 || ||
 * 555 || RSA-320  || 6 || 665 || ||
 * 556 || RSA-309  || 6 || 654 || ||
 * 557 || RSA-220  || 6 || 541 || ||
 * 558 || RSA-180  || 6 || 501 || ||
 * 559 || List of cryptographic key types  || 6 || 5044 || Transmission security key  ||
 * 560 || Link encryption  || 6 || 928 || End-to-end encryption -- Bulk encryption  ||
 * 561 || Key derivation function  || 6 || 2370 || ||
 * 562 || Journal of Cryptology  || 6 || 320 || Journal of cryptology  ||
 * 563 || Joseph Rochefort  || 6 || 5292 || John Joseph Rochefort  ||
 * 564 || Hyperelliptic curve cryptography  || 6 || 1355 || ||
 * 565 || HAS-160  || 6 || 395 || ||
 * 566 || Garble  || 6 || 929 || ||
 * 567 || Cryptomathic  || 6 || 367 || ||
 * 568 || CryptoStick  || 6 || 505 || ||
 * 569 || Cryptanalytic computer  || 6 || 341 || ||
 * 570 || Anonymous publication  || 6 || 1617 || ||
 * 571 || WHIRLPOOL  || 5 || 610 || Whirlpool (hash) -- Whirlpool (algorithm)  ||
 * 572 || Undeniable signature  || 5 || 1055 || ||
 * 573 || RSA-380  || 5 || 725 || ||
 * 574 || RSA-290  || 5 || 623 || ||
 * 575 || OTFE  || 5 || 188 || ||
 * 576 || Frank A. Stevenson  || 5 || 268 || ||
 * 577 || CryptoBuddy  || 5 || 516 || ||
 * 578 || Commitment scheme  || 5 || 1875 || Bit commitment  ||
 * 579 || Codress message  || 5 || 206 || ||
 * 580 || Self-certifying key  || 4 || 1148 || Self-Certifying Keys  ||
 * 581 || RSA-430  || 4 || 786 || ||
 * 582 || LibTom Project  || 4 || 1860 || LibTomNet -- LibTomCrypt -- LibTomPoly -- LibTomMath  ||
 * 583 || Laurence Safford  || 4 || 3148 || ||
 * 584 || Harold Keen  || 4 || 1533 || ||
 * 585 || H.235  || 4 || 648 || ||
 * 586 || FIREFLY  || 4 || 340 || ||
 * 587 || DRYAD  || 4 || 2595 || DRYAD (Cryptography)  ||
 * 588 || Cryptographically strong  || 4 || 1263 || ||
 * 589 || Cover (telecommunications)  || 4 || 545 || ||
 * 590 || Adaptive chosen plaintext and chosen ciphertext attack  || 4 || 809 || ||
 * 591 || Scott Vanstone  || 3 || 213 || ||
 * 592 || International Association for Cryptologic Research  || 3 || 512 || IACR  ||
 * 593 || Harvest (computer)  || 3 || 2270 || Harvest computer  ||
 * 594 || Cryptography newsgroups  || 3 || 1966 || Sci.crypt  ||
 * 595 || Certificateless cryptography  || 3 || 1144 || Certificateless Cryptography  ||
 * 596 || ABA digital signature guidelines  || 3 || 909 || ||
 * 597 || Template:Block ciphers  || 2 || 2018 || MediaWiki:Block ciphers  ||
 * 598 || Cryptochannel  || 2 || 693 || ||
 * 599 || Secure key issuing cryptography  || 1 || 1183 || Secure Key Issuing Cryptography  ||
 * 600 || Derek Taunt  || 1 || 862 || ||
 * 601 || Zimmermann-Sassaman key-signing protocol  || 0 || 479 || Zimmmermann-Sassaman key signing protocol -- Zimmerman-Sassaman protocol -- Zimmerman-Sassaman key-signing protocol  ||
 * 602 || Vigenère cipher  || 0 || 8533 || Vigenère Cipher -- Vigenère cypher -- Vigenere cipher  ||
 * 603 || Transmission security  || 0 || 922 || TRANSEC  ||
 * 604 || Template:Classical cryptography  || 0 || 1116 || MediaWiki:Classical cryptography  ||
 * 605 || Ståle Schumacher Ytteborg  || 0 || 877 || Ståle Schumacher -- Stale Schumacher  ||
 * 606 || Simple XOR cipher  || 0 || 1683 || Simple XOR Cipher  ||
 * 607 || SOBER-128  || 0 || 950 || ||
 * 608 || Robert Tappan Morris, Sr.  || 0 || 568 || ||
 * 609 || NEMA (machine)  || 0 || 1682 || ||
 * 610 || Malcolm J. Williamson  || 0 || 551 || Malcolm Williamson (cryptographer)  ||
 * 611 || List of telecommunications encryption terms  || 0 || 1607 || Glossary of telecommunications encryption terms  ||
 * 612 || Le chiffre indéchiffrable  || 0 || 2606 || The unbreakable cypher -- Le chifffre indechiffrable  ||
 * 613 || Hill cipher  || 0 || 7707 || ||
 * 614 || Cryptographie indéchiffrable  || 0 || 663 || ||
 * 615 || Blaise de Vigenère  || 0 || 1386 || ||
 * 616 || Biuro Szyfrów  || 0 || 2266 || Biuro Szyfrow  ||
 * 617 || Akelarre  || 0 || 1241 || ||
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * 409 || Internet key exchange  || 17 || 807 || IKE -- Internet Key Exchange  ||
 * 410 || Herbert Yardley  || 17 || 6638 || Herbert O. Yardley  ||
 * 411 || Digital timestamping  || 17 || 2011 || ||
 * 412 || Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age  || 17 || 525 || ||
 * 413 || Certificate revocation list  || 17 || 3553 || CRL -- Certificate Revocation List -- Compromised key list  ||
 * 414 || W. T. Tutte  || 16 || 1698 || Bill Tutte  ||
 * 415 || Trapdoor function  || 16 || 1463 || Trapdoor one way function -- Trapdoor permutation  ||
 * 416 || Secure Communication based on Quantum Cryptography  || 16 || 978 || SECOQC  ||
 * 417 || RED/BLACK concept  || 16 || 806 || RED signal  ||
 * 418 || Merkle's Puzzles  || 16 || 1684 || Merkle's puzzles -- Ralph Merkle puzzle cryptographic system  ||
 * 419 || MAGENTA  || 16 || 1736 || MAGENTA (cipher)  ||
 * 420 || LOKI  || 16 || 2934 || LOKI91 -- LOKI89  ||
 * 421 || Key signing party  || 16 || 1514 || Keysigning party  ||
 * 422 || Key distribution center  || 16 || 2297 || KDC  ||
 * 423 || Eli Biham  || 16 || 725 || ||
 * 424 || AxCrypt  || 16 || 299 || ||
 * 425 || Zeroise  || 15 || 2504 || Zeroization  ||
 * 426 || Type 4 encryption  || 15 || 627 || Type 4 algorithm  ||
 * 427 || Timing attack  || 15 || 1795 || ||
 * 428 || TWINKLE  || 15 || 2690 || ||
 * 429 || Stunnel  || 15 || 564 || ||
 * 430 || SYSKEY  || 15 || 1055 || ||
 * 431 || Root certificate  || 15 || 1548 || ||
 * 432 || RSA-768  || 15 || 767 || ||
 * 433 || RSA-160  || 15 || 1212 || ||
 * 434 || PMAC  || 15 || 706 || ||
 * 435 || Louis W. Tordella  || 15 || 3060 || ||
 * 436 || LOKI97  || 15 || 1553 || ||
 * 437 || Key-agreement protocol  || 15 || 1529 || ||
 * 438 || Babington Plot  || 15 || 1437 || Babington plot -- Anthony Babington's plot  ||
 * 439 || Type 2 encryption  || 14 || 1060 || Type 2 product  ||
 * 440 || Simple public key infrastructure  || 14 || 462 || Simple Public Key Infrastructure -- SPKI  ||
 * 441 || RSA-1536  || 14 || 1046 || ||
 * 442 || RSA-150  || 14 || 880 || ||
 * 443 || RSA-120  || 14 || 561 || ||
 * 444 || Privacy-enhanced Electronic Mail  || 14 || 308 || Privacy-enhanced electronic mail -- Privacy Enhanced Mail  ||
 * 445 || NTRUEncrypt  || 14 || 1404 || NTRU  ||
 * 446 || Key server  || 14 || 1197 || ||
 * 447 || Joan Daemen  || 14 || 512 || ||
 * 448 || James H. Ellis  || 14 || 2321 || ||
 * 449 || ID-based cryptography  || 14 || 2316 || ID Based Cryptography  ||
 * 450 || Hugo Hadwiger  || 14 || 859 || ||
 * 451 || Ciphony  || 14 || 811 || ||
 * 452 || The Code Book  || 13 || 2658 || ||
 * 453 || RSA-170  || 13 || 491 || ||
 * 454 || Niels Ferguson  || 13 || 659 || ||
 * 455 || Mitsuru Matsui  || 13 || 758 || ||
 * 456 || McEliece  || 13 || 1155 || ||
 * 457 || Communications security  || 13 || 2069 || COMSEC  ||
 * 458 || BATON  || 13 || 1708 || ||
 * 459 || Yuliang Zheng  || 12 || 373 || ||
 * 460 || World War II cryptography  || 12 || 1944 || ||
 * 461 || RSA-110  || 12 || 542 || ||
 * 462 || Paillier cryptosystem  || 12 || 1005 || Paillier  ||
 * 463 || N-Hash  || 12 || 1076 || N-hash  ||
 * 464 || MMB  || 12 || 1170 || ||
 * 465 || Joseph Mauborgne  || 12 || 352 || ||
 * 466 || Gilbert Vernam  || 12 || 1441 || ||
 * 467 || Dining cryptographers protocol  || 12 || 973 || Dining cryptographers -- Dining cryptographer -- Dining Cryptographers Protocol -- Dining cryptographer protocol -- Dining cryptographer's protocol  ||
 * 468 || Cryptographic Message Syntax  || 12 || 843 || ||
 * 469 || Crypto system  || 12 || 1975 || Cryptosystem  ||
 * 470 || Boris Hagelin  || 12 || 1360 || ||
 * 471 || Blind credential  || 12 || 992 || ||
 * 472 || Attacker  || 12 || 285 || ||
 * 473 || Strict avalanche criterion  || 11 || 681 || Strict Avalanche Criterion  ||
 * 474 || Shafi Goldwasser  || 11 || 1774 || Shafrira Goldwasser  ||
 * 475 || Secrets and Lies  || 11 || 198 || ||
 * 476 || SAVILLE  || 11 || 1267 || Saville (cipher)  ||
 * 477 || RSA-896  || 11 || 805 || ||
 * 478 || RSA-704  || 11 || 735 || ||
 * 479 || RSA-480  || 11 || 849 || ||
 * 480 || RSA-310  || 11 || 655 || ||
 * 481 || KOV-14  || 11 || 668 || Fortezza Plus  ||
 * 482 || KCDSA  || 11 || 858 || EC-KCDSA  ||
 * 483 || Edward Hebern  || 11 || 1838 || Edward Hugh Hebern  ||
 * 484 || Challenge–response test  || 11 || 825 || Challenge–response system  ||
 * 485 || Certification path validation algorithm  || 11 || 306 || ||
 * 486 || Certicom  || 11 || 717 || ||
 * 487 || COMSEC equipment  || 11 || 340 || ||
 * 488 || AN/CYZ-10  || 11 || 1214 || AN/CYZ-10 DTD  ||
 * 489 || Superencryption  || 10 || 202 || ||
 * 490 || Schnorr signature  || 10 || 1205 || ||
 * 491 || Random oracle  || 10 || 1139 || Random oracle model  ||
 * 492 || RSA-410  || 10 || 767 || ||
 * 493 || RSA-250  || 10 || 571 || ||
 * 494 || RSA-155  || 10 || 1406 || ||
 * 495 || Probabilistic encryption  || 10 || 1442 || Probabilistic Encryption  ||
 * 496 || Message forgery  || 10 || 240 || ||
 * 497 || Information-theoretically secure  || 10 || 946 || ||
 * 498 || FreeLIP  || 10 || 134 || ||
 * 499 || Direct anonymous attestation  || 10 || 285 || ||
 * 500 || Dilly Knox  || 10 || 720 || Dilwyn Knox  ||
 * 501 || Cellular Message Encryption Algorithm  || 10 || 1222 || CMEA (cipher)  ||
 * 502 || VINSON  || 9 || 626 || ||
 * 503 || SecurID  || 9 || 1457 || ||
 * 504 || RSA-617  || 9 || 1022 || ||
 * 505 || RSA-500  || 9 || 869 || ||
 * 506 || RSA-440  || 9 || 797 || ||
 * 507 || RSA-330  || 9 || 675 || ||
 * 508 || RSA-230  || 9 || 563 || ||
 * 509 || RSA-200  || 9 || 521 || ||
 * 510 || Power analysis  || 9 || 3461 || ||
 * 511 || Otway-Rees  || 9 || 1274 || ||
 * 512 || NSA encryption algorithms  || 9 || 4758 || ||
 * 513 || I. J. Good  || 9 || 1665 || I.J. Good -- Irving Good  ||
 * 514 || Crypto-society  || 9 || 1048 || Crypto-societies  ||
 * 515 || Blinding (cryptography)  || 9 || 1631 || Blinding  ||
 * 516 || Bazeries cylinder  || 9 || 12555 || Bazeries Cylinder  ||
 * 517 || Abraham Sinkov  || 9 || 6920 || ||
 * 518 || Type 3 encryption  || 8 || 500 || Type 3 algorithm  ||
 * 519 || Trench code  || 8 || 4412 || ||
 * 520 || Torus based cryptography  || 8 || 677 || ||
 * 521 || Solomon Kullback  || 8 || 368 || ||
 * 522 || RSA-450  || 8 || 807 || ||
 * 523 || RSA-370  || 8 || 715 || ||
 * 524 || RSA-350  || 8 || 695 || ||
 * 525 || RSA-300  || 8 || 633 || ||
 * 526 || RSA-270  || 8 || 603 || ||
 * 527 || RSA-210  || 8 || 531 || ||
 * 528 || Peter Gutmann  || 8 || 1128 || ||
 * 529 || Paul Kocher  || 8 || 1185 || ||
 * 530 || Passive attack  || 8 || 667 || ||
 * 531 || CrossCrypt  || 8 || 1560 || ||
 * 532 || S/KEY  || 7 || 514 || S/Key  ||
 * 533 || RSA-470  || 7 || 839 || ||
 * 534 || RSA-460  || 7 || 829 || ||
 * 535 || RSA-400  || 7 || 757 || ||
 * 536 || RSA-360  || 7 || 705 || ||
 * 537 || RSA-280  || 7 || 613 || ||
 * 538 || RSA-260  || 7 || 593 || ||
 * 539 || RSA-240  || 7 || 573 || ||
 * 540 || RSA-232  || 7 || 565 || ||
 * 541 || RSA-190  || 7 || 511 || ||
 * 542 || Jefferson disk  || 7 || 1440 || ||
 * 543 || George Scovell  || 7 || 842 || ||
 * 544 || Cryptology ePrint Archive  || 7 || 425 || EPrint  ||
 * 545 || Crypto AG  || 7 || 921 || ||
 * 546 || CipherSaber  || 7 || 804 || ||
 * 547 || Certificate-based encryption  || 7 || 1471 || ||
 * 548 || Cayley-Purser algorithm  || 7 || 997 || ||
 * 549 || Bit-flipping attack  || 7 || 1225 || ||
 * 550 || Self-signed certificate  || 6 || 2570 || Self signed certificate  ||
 * 551 || RSA-490  || 6 || 859 || ||
 * 552 || RSA-420  || 6 || 777 || ||
 * 553 || RSA-390  || 6 || 747 || ||
 * 554 || RSA-340  || 6 || 685 || ||
 * 555 || RSA-320  || 6 || 665 || ||
 * 556 || RSA-309  || 6 || 654 || ||
 * 557 || RSA-220  || 6 || 541 || ||
 * 558 || RSA-180  || 6 || 501 || ||
 * 559 || List of cryptographic key types  || 6 || 5044 || Transmission security key  ||
 * 560 || Link encryption  || 6 || 928 || End-to-end encryption -- Bulk encryption  ||
 * 561 || Key derivation function  || 6 || 2370 || ||
 * 562 || Journal of Cryptology  || 6 || 320 || Journal of cryptology  ||
 * 563 || Joseph Rochefort  || 6 || 5292 || John Joseph Rochefort  ||
 * 564 || Hyperelliptic curve cryptography  || 6 || 1355 || ||
 * 565 || HAS-160  || 6 || 395 || ||
 * 566 || Garble  || 6 || 929 || ||
 * 567 || Cryptomathic  || 6 || 367 || ||
 * 568 || CryptoStick  || 6 || 505 || ||
 * 569 || Cryptanalytic computer  || 6 || 341 || ||
 * 570 || Anonymous publication  || 6 || 1617 || ||
 * 571 || WHIRLPOOL  || 5 || 610 || Whirlpool (hash) -- Whirlpool (algorithm)  ||
 * 572 || Undeniable signature  || 5 || 1055 || ||
 * 573 || RSA-380  || 5 || 725 || ||
 * 574 || RSA-290  || 5 || 623 || ||
 * 575 || OTFE  || 5 || 188 || ||
 * 576 || Frank A. Stevenson  || 5 || 268 || ||
 * 577 || CryptoBuddy  || 5 || 516 || ||
 * 578 || Commitment scheme  || 5 || 1875 || Bit commitment  ||
 * 579 || Codress message  || 5 || 206 || ||
 * 580 || Self-certifying key  || 4 || 1148 || Self-Certifying Keys  ||
 * 581 || RSA-430  || 4 || 786 || ||
 * 582 || LibTom Project  || 4 || 1860 || LibTomNet -- LibTomCrypt -- LibTomPoly -- LibTomMath  ||
 * 583 || Laurence Safford  || 4 || 3148 || ||
 * 584 || Harold Keen  || 4 || 1533 || ||
 * 585 || H.235  || 4 || 648 || ||
 * 586 || FIREFLY  || 4 || 340 || ||
 * 587 || DRYAD  || 4 || 2595 || DRYAD (Cryptography)  ||
 * 588 || Cryptographically strong  || 4 || 1263 || ||
 * 589 || Cover (telecommunications)  || 4 || 545 || ||
 * 590 || Adaptive chosen plaintext and chosen ciphertext attack  || 4 || 809 || ||
 * 591 || Scott Vanstone  || 3 || 213 || ||
 * 592 || International Association for Cryptologic Research  || 3 || 512 || IACR  ||
 * 593 || Harvest (computer)  || 3 || 2270 || Harvest computer  ||
 * 594 || Cryptography newsgroups  || 3 || 1966 || Sci.crypt  ||
 * 595 || Certificateless cryptography  || 3 || 1144 || Certificateless Cryptography  ||
 * 596 || ABA digital signature guidelines  || 3 || 909 || ||
 * 597 || Template:Block ciphers  || 2 || 2018 || MediaWiki:Block ciphers  ||
 * 598 || Cryptochannel  || 2 || 693 || ||
 * 599 || Secure key issuing cryptography  || 1 || 1183 || Secure Key Issuing Cryptography  ||
 * 600 || Derek Taunt  || 1 || 862 || ||
 * 601 || Zimmermann-Sassaman key-signing protocol  || 0 || 479 || Zimmmermann-Sassaman key signing protocol -- Zimmerman-Sassaman protocol -- Zimmerman-Sassaman key-signing protocol  ||
 * 602 || Vigenère cipher  || 0 || 8533 || Vigenère Cipher -- Vigenère cypher -- Vigenere cipher  ||
 * 603 || Transmission security  || 0 || 922 || TRANSEC  ||
 * 604 || Template:Classical cryptography  || 0 || 1116 || MediaWiki:Classical cryptography  ||
 * 605 || Ståle Schumacher Ytteborg  || 0 || 877 || Ståle Schumacher -- Stale Schumacher  ||
 * 606 || Simple XOR cipher  || 0 || 1683 || Simple XOR Cipher  ||
 * 607 || SOBER-128  || 0 || 950 || ||
 * 608 || Robert Tappan Morris, Sr.  || 0 || 568 || ||
 * 609 || NEMA (machine)  || 0 || 1682 || ||
 * 610 || Malcolm J. Williamson  || 0 || 551 || Malcolm Williamson (cryptographer)  ||
 * 611 || List of telecommunications encryption terms  || 0 || 1607 || Glossary of telecommunications encryption terms  ||
 * 612 || Le chiffre indéchiffrable  || 0 || 2606 || The unbreakable cypher -- Le chifffre indechiffrable  ||
 * 613 || Hill cipher  || 0 || 7707 || ||
 * 614 || Cryptographie indéchiffrable  || 0 || 663 || ||
 * 615 || Blaise de Vigenère  || 0 || 1386 || ||
 * 616 || Biuro Szyfrów  || 0 || 2266 || Biuro Szyfrow  ||
 * 617 || Akelarre  || 0 || 1241 || ||
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * 514 || Crypto-society  || 9 || 1048 || Crypto-societies  ||
 * 515 || Blinding (cryptography)  || 9 || 1631 || Blinding  ||
 * 516 || Bazeries cylinder  || 9 || 12555 || Bazeries Cylinder  ||
 * 517 || Abraham Sinkov  || 9 || 6920 || ||
 * 518 || Type 3 encryption  || 8 || 500 || Type 3 algorithm  ||
 * 519 || Trench code  || 8 || 4412 || ||
 * 520 || Torus based cryptography  || 8 || 677 || ||
 * 521 || Solomon Kullback  || 8 || 368 || ||
 * 522 || RSA-450  || 8 || 807 || ||
 * 523 || RSA-370  || 8 || 715 || ||
 * 524 || RSA-350  || 8 || 695 || ||
 * 525 || RSA-300  || 8 || 633 || ||
 * 526 || RSA-270  || 8 || 603 || ||
 * 527 || RSA-210  || 8 || 531 || ||
 * 528 || Peter Gutmann  || 8 || 1128 || ||
 * 529 || Paul Kocher  || 8 || 1185 || ||
 * 530 || Passive attack  || 8 || 667 || ||
 * 531 || CrossCrypt  || 8 || 1560 || ||
 * 532 || S/KEY  || 7 || 514 || S/Key  ||
 * 533 || RSA-470  || 7 || 839 || ||
 * 534 || RSA-460  || 7 || 829 || ||
 * 535 || RSA-400  || 7 || 757 || ||
 * 536 || RSA-360  || 7 || 705 || ||
 * 537 || RSA-280  || 7 || 613 || ||
 * 538 || RSA-260  || 7 || 593 || ||
 * 539 || RSA-240  || 7 || 573 || ||
 * 540 || RSA-232  || 7 || 565 || ||
 * 541 || RSA-190  || 7 || 511 || ||
 * 542 || Jefferson disk  || 7 || 1440 || ||
 * 543 || George Scovell  || 7 || 842 || ||
 * 544 || Cryptology ePrint Archive  || 7 || 425 || EPrint  ||
 * 545 || Crypto AG  || 7 || 921 || ||
 * 546 || CipherSaber  || 7 || 804 || ||
 * 547 || Certificate-based encryption  || 7 || 1471 || ||
 * 548 || Cayley-Purser algorithm  || 7 || 997 || ||
 * 549 || Bit-flipping attack  || 7 || 1225 || ||
 * 550 || Self-signed certificate  || 6 || 2570 || Self signed certificate  ||
 * 551 || RSA-490  || 6 || 859 || ||
 * 552 || RSA-420  || 6 || 777 || ||
 * 553 || RSA-390  || 6 || 747 || ||
 * 554 || RSA-340  || 6 || 685 || ||
 * 555 || RSA-320  || 6 || 665 || ||
 * 556 || RSA-309  || 6 || 654 || ||
 * 557 || RSA-220  || 6 || 541 || ||
 * 558 || RSA-180  || 6 || 501 || ||
 * 559 || List of cryptographic key types  || 6 || 5044 || Transmission security key  ||
 * 560 || Link encryption  || 6 || 928 || End-to-end encryption -- Bulk encryption  ||
 * 561 || Key derivation function  || 6 || 2370 || ||
 * 562 || Journal of Cryptology  || 6 || 320 || Journal of cryptology  ||
 * 563 || Joseph Rochefort  || 6 || 5292 || John Joseph Rochefort  ||
 * 564 || Hyperelliptic curve cryptography  || 6 || 1355 || ||
 * 565 || HAS-160  || 6 || 395 || ||
 * 566 || Garble  || 6 || 929 || ||
 * 567 || Cryptomathic  || 6 || 367 || ||
 * 568 || CryptoStick  || 6 || 505 || ||
 * 569 || Cryptanalytic computer  || 6 || 341 || ||
 * 570 || Anonymous publication  || 6 || 1617 || ||
 * 571 || WHIRLPOOL  || 5 || 610 || Whirlpool (hash) -- Whirlpool (algorithm)  ||
 * 572 || Undeniable signature  || 5 || 1055 || ||
 * 573 || RSA-380  || 5 || 725 || ||
 * 574 || RSA-290  || 5 || 623 || ||
 * 575 || OTFE  || 5 || 188 || ||
 * 576 || Frank A. Stevenson  || 5 || 268 || ||
 * 577 || CryptoBuddy  || 5 || 516 || ||
 * 578 || Commitment scheme  || 5 || 1875 || Bit commitment  ||
 * 579 || Codress message  || 5 || 206 || ||
 * 580 || Self-certifying key  || 4 || 1148 || Self-Certifying Keys  ||
 * 581 || RSA-430  || 4 || 786 || ||
 * 582 || LibTom Project  || 4 || 1860 || LibTomNet -- LibTomCrypt -- LibTomPoly -- LibTomMath  ||
 * 583 || Laurence Safford  || 4 || 3148 || ||
 * 584 || Harold Keen  || 4 || 1533 || ||
 * 585 || H.235  || 4 || 648 || ||
 * 586 || FIREFLY  || 4 || 340 || ||
 * 587 || DRYAD  || 4 || 2595 || DRYAD (Cryptography)  ||
 * 588 || Cryptographically strong  || 4 || 1263 || ||
 * 589 || Cover (telecommunications)  || 4 || 545 || ||
 * 590 || Adaptive chosen plaintext and chosen ciphertext attack  || 4 || 809 || ||
 * 591 || Scott Vanstone  || 3 || 213 || ||
 * 592 || International Association for Cryptologic Research  || 3 || 512 || IACR  ||
 * 593 || Harvest (computer)  || 3 || 2270 || Harvest computer  ||
 * 594 || Cryptography newsgroups  || 3 || 1966 || Sci.crypt  ||
 * 595 || Certificateless cryptography  || 3 || 1144 || Certificateless Cryptography  ||
 * 596 || ABA digital signature guidelines  || 3 || 909 || ||
 * 597 || Template:Block ciphers  || 2 || 2018 || MediaWiki:Block ciphers  ||
 * 598 || Cryptochannel  || 2 || 693 || ||
 * 599 || Secure key issuing cryptography  || 1 || 1183 || Secure Key Issuing Cryptography  ||
 * 600 || Derek Taunt  || 1 || 862 || ||
 * 601 || Zimmermann-Sassaman key-signing protocol  || 0 || 479 || Zimmmermann-Sassaman key signing protocol -- Zimmerman-Sassaman protocol -- Zimmerman-Sassaman key-signing protocol  ||
 * 602 || Vigenère cipher  || 0 || 8533 || Vigenère Cipher -- Vigenère cypher -- Vigenere cipher  ||
 * 603 || Transmission security  || 0 || 922 || TRANSEC  ||
 * 604 || Template:Classical cryptography  || 0 || 1116 || MediaWiki:Classical cryptography  ||
 * 605 || Ståle Schumacher Ytteborg  || 0 || 877 || Ståle Schumacher -- Stale Schumacher  ||
 * 606 || Simple XOR cipher  || 0 || 1683 || Simple XOR Cipher  ||
 * 607 || SOBER-128  || 0 || 950 || ||
 * 608 || Robert Tappan Morris, Sr.  || 0 || 568 || ||
 * 609 || NEMA (machine)  || 0 || 1682 || ||
 * 610 || Malcolm J. Williamson  || 0 || 551 || Malcolm Williamson (cryptographer)  ||
 * 611 || List of telecommunications encryption terms  || 0 || 1607 || Glossary of telecommunications encryption terms  ||
 * 612 || Le chiffre indéchiffrable  || 0 || 2606 || The unbreakable cypher -- Le chifffre indechiffrable  ||
 * 613 || Hill cipher  || 0 || 7707 || ||
 * 614 || Cryptographie indéchiffrable  || 0 || 663 || ||
 * 615 || Blaise de Vigenère  || 0 || 1386 || ||
 * 616 || Biuro Szyfrów  || 0 || 2266 || Biuro Szyfrow  ||
 * 617 || Akelarre  || 0 || 1241 || ||
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * 567 || Cryptomathic  || 6 || 367 || ||
 * 568 || CryptoStick  || 6 || 505 || ||
 * 569 || Cryptanalytic computer  || 6 || 341 || ||
 * 570 || Anonymous publication  || 6 || 1617 || ||
 * 571 || WHIRLPOOL  || 5 || 610 || Whirlpool (hash) -- Whirlpool (algorithm)  ||
 * 572 || Undeniable signature  || 5 || 1055 || ||
 * 573 || RSA-380  || 5 || 725 || ||
 * 574 || RSA-290  || 5 || 623 || ||
 * 575 || OTFE  || 5 || 188 || ||
 * 576 || Frank A. Stevenson  || 5 || 268 || ||
 * 577 || CryptoBuddy  || 5 || 516 || ||
 * 578 || Commitment scheme  || 5 || 1875 || Bit commitment  ||
 * 579 || Codress message  || 5 || 206 || ||
 * 580 || Self-certifying key  || 4 || 1148 || Self-Certifying Keys  ||
 * 581 || RSA-430  || 4 || 786 || ||
 * 582 || LibTom Project  || 4 || 1860 || LibTomNet -- LibTomCrypt -- LibTomPoly -- LibTomMath  ||
 * 583 || Laurence Safford  || 4 || 3148 || ||
 * 584 || Harold Keen  || 4 || 1533 || ||
 * 585 || H.235  || 4 || 648 || ||
 * 586 || FIREFLY  || 4 || 340 || ||
 * 587 || DRYAD  || 4 || 2595 || DRYAD (Cryptography)  ||
 * 588 || Cryptographically strong  || 4 || 1263 || ||
 * 589 || Cover (telecommunications)  || 4 || 545 || ||
 * 590 || Adaptive chosen plaintext and chosen ciphertext attack  || 4 || 809 || ||
 * 591 || Scott Vanstone  || 3 || 213 || ||
 * 592 || International Association for Cryptologic Research  || 3 || 512 || IACR  ||
 * 593 || Harvest (computer)  || 3 || 2270 || Harvest computer  ||
 * 594 || Cryptography newsgroups  || 3 || 1966 || Sci.crypt  ||
 * 595 || Certificateless cryptography  || 3 || 1144 || Certificateless Cryptography  ||
 * 596 || ABA digital signature guidelines  || 3 || 909 || ||
 * 597 || Template:Block ciphers  || 2 || 2018 || MediaWiki:Block ciphers  ||
 * 598 || Cryptochannel  || 2 || 693 || ||
 * 599 || Secure key issuing cryptography  || 1 || 1183 || Secure Key Issuing Cryptography  ||
 * 600 || Derek Taunt  || 1 || 862 || ||
 * 601 || Zimmermann-Sassaman key-signing protocol  || 0 || 479 || Zimmmermann-Sassaman key signing protocol -- Zimmerman-Sassaman protocol -- Zimmerman-Sassaman key-signing protocol  ||
 * 602 || Vigenère cipher  || 0 || 8533 || Vigenère Cipher -- Vigenère cypher -- Vigenere cipher  ||
 * 603 || Transmission security  || 0 || 922 || TRANSEC  ||
 * 604 || Template:Classical cryptography  || 0 || 1116 || MediaWiki:Classical cryptography  ||
 * 605 || Ståle Schumacher Ytteborg  || 0 || 877 || Ståle Schumacher -- Stale Schumacher  ||
 * 606 || Simple XOR cipher  || 0 || 1683 || Simple XOR Cipher  ||
 * 607 || SOBER-128  || 0 || 950 || ||
 * 608 || Robert Tappan Morris, Sr.  || 0 || 568 || ||
 * 609 || NEMA (machine)  || 0 || 1682 || ||
 * 610 || Malcolm J. Williamson  || 0 || 551 || Malcolm Williamson (cryptographer)  ||
 * 611 || List of telecommunications encryption terms  || 0 || 1607 || Glossary of telecommunications encryption terms  ||
 * 612 || Le chiffre indéchiffrable  || 0 || 2606 || The unbreakable cypher -- Le chifffre indechiffrable  ||
 * 613 || Hill cipher  || 0 || 7707 || ||
 * 614 || Cryptographie indéchiffrable  || 0 || 663 || ||
 * 615 || Blaise de Vigenère  || 0 || 1386 || ||
 * 616 || Biuro Szyfrów  || 0 || 2266 || Biuro Szyfrow  ||
 * 617 || Akelarre  || 0 || 1241 || ||
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * 594 || Cryptography newsgroups  || 3 || 1966 || Sci.crypt  ||
 * 595 || Certificateless cryptography  || 3 || 1144 || Certificateless Cryptography  ||
 * 596 || ABA digital signature guidelines  || 3 || 909 || ||
 * 597 || Template:Block ciphers  || 2 || 2018 || MediaWiki:Block ciphers  ||
 * 598 || Cryptochannel  || 2 || 693 || ||
 * 599 || Secure key issuing cryptography  || 1 || 1183 || Secure Key Issuing Cryptography  ||
 * 600 || Derek Taunt  || 1 || 862 || ||
 * 601 || Zimmermann-Sassaman key-signing protocol  || 0 || 479 || Zimmmermann-Sassaman key signing protocol -- Zimmerman-Sassaman protocol -- Zimmerman-Sassaman key-signing protocol  ||
 * 602 || Vigenère cipher  || 0 || 8533 || Vigenère Cipher -- Vigenère cypher -- Vigenere cipher  ||
 * 603 || Transmission security  || 0 || 922 || TRANSEC  ||
 * 604 || Template:Classical cryptography  || 0 || 1116 || MediaWiki:Classical cryptography  ||
 * 605 || Ståle Schumacher Ytteborg  || 0 || 877 || Ståle Schumacher -- Stale Schumacher  ||
 * 606 || Simple XOR cipher  || 0 || 1683 || Simple XOR Cipher  ||
 * 607 || SOBER-128  || 0 || 950 || ||
 * 608 || Robert Tappan Morris, Sr.  || 0 || 568 || ||
 * 609 || NEMA (machine)  || 0 || 1682 || ||
 * 610 || Malcolm J. Williamson  || 0 || 551 || Malcolm Williamson (cryptographer)  ||
 * 611 || List of telecommunications encryption terms  || 0 || 1607 || Glossary of telecommunications encryption terms  ||
 * 612 || Le chiffre indéchiffrable  || 0 || 2606 || The unbreakable cypher -- Le chifffre indechiffrable  ||
 * 613 || Hill cipher  || 0 || 7707 || ||
 * 614 || Cryptographie indéchiffrable  || 0 || 663 || ||
 * 615 || Blaise de Vigenère  || 0 || 1386 || ||
 * 616 || Biuro Szyfrów  || 0 || 2266 || Biuro Szyfrow  ||
 * 617 || Akelarre  || 0 || 1241 || ||
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * 607 || SOBER-128  || 0 || 950 || ||
 * 608 || Robert Tappan Morris, Sr.  || 0 || 568 || ||
 * 609 || NEMA (machine)  || 0 || 1682 || ||
 * 610 || Malcolm J. Williamson  || 0 || 551 || Malcolm Williamson (cryptographer)  ||
 * 611 || List of telecommunications encryption terms  || 0 || 1607 || Glossary of telecommunications encryption terms  ||
 * 612 || Le chiffre indéchiffrable  || 0 || 2606 || The unbreakable cypher -- Le chifffre indechiffrable  ||
 * 613 || Hill cipher  || 0 || 7707 || ||
 * 614 || Cryptographie indéchiffrable  || 0 || 663 || ||
 * 615 || Blaise de Vigenère  || 0 || 1386 || ||
 * 616 || Biuro Szyfrów  || 0 || 2266 || Biuro Szyfrow  ||
 * 617 || Akelarre  || 0 || 1241 || ||
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * 613 || Hill cipher  || 0 || 7707 || ||
 * 614 || Cryptographie indéchiffrable  || 0 || 663 || ||
 * 615 || Blaise de Vigenère  || 0 || 1386 || ||
 * 616 || Biuro Szyfrów  || 0 || 2266 || Biuro Szyfrow  ||
 * 617 || Akelarre  || 0 || 1241 || ||
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * 617 || Akelarre  || 0 || 1241 || ||
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * 618 || Étienne Bazeries  || 0 || 2633 || Bazeries -- Etienne Bazeries  ||
 * }
 * }