File:Emoji u1f510.svg
From Infogalactic: the planetary knowledge core
Size of this PNG preview of this SVG file: 128 × 128 pixels. Other resolution: 240 × 240 pixels.
Original file (SVG file, nominally 128 × 128 pixels, file size: 2 KB)
Summary
A colored <a href="https://en.wikipedia.org/wiki/Emoji" class="extiw" title="en:Emoji">Emoji</a> from <a rel="nofollow" class="external text" href="https://code.google.com/p/noto/">Noto project</a>, released under <a rel="nofollow" class="external text" href="https://code.google.com/p/noto/source/browse/LICENSE">Apache license</a>
Unicode name: Closed lock with key
Annotations: Closed, Key, Lock, Object, Secure
Licensing
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 08:26, 3 January 2017 | 128 × 128 (2 KB) | 127.0.0.1 (talk) | A colored <a href="https://en.wikipedia.org/wiki/Emoji" class="extiw" title="en:Emoji">Emoji</a> from <a rel="nofollow" class="external text" href="https://code.google.com/p/noto/">Noto project</a>, released under <a rel="nofollow" class="external text" href="https://code.google.com/p/noto/source/browse/LICENSE">Apache license</a> <p><b>Unicode name:</b> Closed lock with key </p> <b>Annotations:</b> Closed, Key, Lock, Object, Secure |
- You cannot overwrite this file.
File usage
More than 100 pages link to this file. The following list shows the first 100 page links to this file only. A full list is available.
- A5/2
- ABC (stream cipher)
- Access structure
- Adversary (cryptography)
- BEAR and LION ciphers
- Balanced boolean function
- Bilateral key exchange
- Blind credential
- Brute Force: Cracking the Data Encryption Standard
- CAST-256
- CJCSG
- Certification on demand
- Ciphertext expansion
- Codes, Ciphers and Other Cryptic and Clandestine Communication
- Confusion and diffusion
- Cover-coding
- Cover (telecommunications)
- CryptMT
- Crypto API (Linux)
- Cryptographic Module Validation Program
- Cryptographie indéchiffrable
- Cryptography newsgroups
- Cryptologia
- Cryptology ePrint Archive
- Cryptoloop
- Cryptosystem
- DECIM
- DICING
- Data Authentication Algorithm
- Distributed key generation
- Edon80
- F-FCSR
- Fiat–Shamir heuristic
- Floradora
- Forward anonymity
- Frogbit (cipher)
- Full Domain Hash
- GMR (cryptography)
- Gardening (cryptanalysis)
- Hengzhi chip
- Hermes8
- Horton Principle
- Hyper-encryption
- IBM 4764
- Initiative For Open Authentication
- International Association for Cryptologic Research
- Iraqi block cipher
- Journal of Cryptology
- KY-57
- KY-58
- Keyring (cryptography)
- Keysigning
- Linux Unified Key Setup
- MAG (cryptography)
- MDC-2
- MMB
- MOSQUITO
- Mcrypt
- Message forgery
- Mir-1
- MultiSwap
- NLS (cipher)
- NSA Suite A Cryptography
- NSA product types
- Nonlinear feedback shift register
- Null cipher
- OMNI (SCIP)
- Pike (cipher)
- Pre-shared key
- Product cipher
- Random function
- Russian copulation
- SEAL (cipher)
- SFINKS
- SHARK
- SPKAC
- SSS (cipher)
- Scramdisk
- Secure Communication based on Quantum Cryptography
- Secure Hash Standard
- Secure access module
- Secure two-party computation
- Security Protocols Open Repository
- Security association
- Security protocol notation
- Soundness (interactive proof)
- Square (cipher)
- Statistically close
- Sub-group hiding
- TSC-3
- Threshold cryptosystem
- Torus-based cryptography
- Trigram
- Verifiable random function
- WAKE (cipher)
- WG (cipher)
- Wireless Experimental Centre
- Yahalom (protocol)
- Yamb
- Yarrow algorithm