Index of cryptography articles

Articles related to cryptography include:

A

A5/1A5/2ABA digital signature guidelinesABC (stream cipher)Abraham SinkovAcoustic cryptanalysisAdaptive chosen-ciphertext attack • Adaptive chosen plaintext and chosen ciphertext attack Advantage (cryptography)ADFGVX cipherAdi ShamirAdvanced Access Content SystemAdvanced Encryption StandardAdvanced Encryption Standard processAdversary • AEAD block cipher modes of operation • Affine cipherAgnes Meyer Driscoll • AKA (security) • Akelarre (cipher)Alan TuringAlastair Denniston • Al Bhed language • Alex BiryukovAlfred MenezesAlgebraic EraserAlgorithmically random sequenceAlice and BobAll-or-nothing transformAlphabetum KaldeorumAlternating step generatorAmerican Cryptogram AssociationAN/CYZ-10 • Anonymous publication • Anonymous remailerAntoni PalluthAnubis (cipher)Argon2ARIA (cipher)Arlington HallArne BeurlingArnold CipherArray controller based encryptionArthur ScherbiusArvid Gerhard DammAsiacryptAtbashAttack modelAuguste KerckhoffsAuthenticated encryptionAuthenticationAuthorization certificateAutokey cipherAvalanche effect

B

B-DienstBabington PlotBaby-step giant-stepBacon's cipherBanburismusBart PreneelBaseKingBassOmaticBATONBB84Beale ciphersBEAR and LION ciphersBeaufort cipherBeaumanor HallBent functionBerlekamp–Massey algorithmBernstein v. United StatesBestCryptBiclique attackBID/60BID 770Bifid cipherBill WeisbandBinary Goppa code • Biometric word list • Birthday attackBit-flipping attackBitTorrent protocol encryptionBiuro SzyfrówBlack ChamberBlaise de VigenèreBletchley Park • Blind credential Blinding (cryptography)Blind signatureBlock cipherBlock cipher mode of operationBlock size (cryptography)Blowfish (cipher)Blum Blum ShubBlum–Goldwasser cryptosystemBomba (cryptography)BombeBook cipherBooks on cryptographyBoomerang attackBoris HagelinBouncy Castle (cryptography)Broadcast encryptionBruce SchneierBrute-force attackBrute Force: Cracking the Data Encryption StandardBurrows–Abadi–Needham logicBurt Kaliski

C

C2NetC-36 (cipher machine)C-52 (cipher machine)CAcert.orgCaesar cipherCamellia (cipher)CAPICOMCapstone (cryptography)Cardan grilleCard catalog (cryptology)Carlisle AdamsCAST-128CAST-256Cayley–Purser algorithmCBC-MACCCM modeCCMPCD-57CDMFCellular Message Encryption AlgorithmCentiban Central Security ServiceCentre for Applied Cryptographic ResearchCentral BureauCerticomCertificate authorityCertificate-based encryptionCertificateless cryptographyCertificate revocation listCertificate signing requestCertification path validation algorithmChaffing and winnowingChallenge-Handshake Authentication ProtocolChallenge–response authenticationChosen-ciphertext attackChosen-plaintext attackCIKS-1Cipher diskCipher runesCipher security summaryCipherSaberCiphertext expansionCiphertext indistinguishabilityCiphertext-only attackCiphertext stealingCIPHERUNICORN-ACIPHERUNICORN-EClassical cipherClaude ShannonClaw-free permutationCleartextCLEFIAClifford CocksClipper chipClock (cryptography)Clock driftCMVP COCONUT98CodebookCode (cryptography)Code talkerCodress messageCold boot attackCollision attackCollision resistanceColossus computerCombined Cipher MachineCommitment schemeCommon Scrambling AlgorithmCommunications securityCommunications Security EstablishmentCommunication Theory of Secrecy SystemsComparison of disk encryption softwareComparison of SSH clientsCompleteness (cryptography) • Complexity trap Computational Diffie–Hellman assumptionComputational hardness assumption • Computer insecurity • Computer and network surveillance • COMSEC equipment • Conch (SSH)Concrete securityConel Hugh O'Donel AlexanderConfidentialityConfusion and diffusion • Content-scrambling system Controlled Cryptographic ItemCorkscrew (program)Correlation immunityCOSICCovert channelCover (telecommunications)Crab (cipher)Cramer–Shoup cryptosystemCRAM-MD5CRHF • Crib (cryptanalysis) • CrossCryptCrowds (anonymity network)Crypt (C)CryptanalysisCryptanalysis of the EnigmaCryptanalysis of the Lorenz cipherCryptanalytic computerCryptexCrypticoCrypto AGCrypto-anarchismCrypto API (Linux)Microsoft CryptoAPICryptoBuddyCryptochannel • CRYPTO (conference) • CryptogramCryptographically Generated AddressCryptographically secure pseudorandom number generator • Cryptographically strong • Cryptographic Application Programming Interface Cryptographic hash functionCryptographic key typesCryptographic Message SyntaxCryptographic primitiveCryptographic protocolCryptographic Service ProviderCryptographie indéchiffrableCryptography • Cryptography in Japan • Cryptography newsgroupsCryptography standards • Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age • CryptologiaCryptology ePrint ArchiveCryptology Research Society of IndiaCryptomathicCryptomeCryptomeria cipherCryptonomiconCrypToolCrypto phoneCrypto-society CryptosystemCryptovirologyCRYPTRECCS-CipherCurve25519Curve448Custom hardware attack • Cycles per byte • CyclometerCypherpunkCyrillic Projector

D

D'Agapeyeff cipherDaniel J. BernsteinData Authentication AlgorithmData Encryption StandardDatagram Transport Layer SecurityDavid ChaumDavid KahnDavid NaccacheDavid WagnerDavid Wheeler (computer scientist)Davies attack • Davies–Meyer hash DEALDeciphermentDecisional Diffie–Hellman assumptionDecorrelation theoryDecrypt DeCSS • Defence Signals Directorate • Degree of anonymityDelegated Path DiscoveryDelegated Path ValidationDeniable encryptionDerek TauntDerived unique key per transactionDES ChallengesDES supplementary materialDES-XDeterministic encryptionDFC (cipher)Dictionary attackDifferential cryptanalysisDifferential-linear attack • Differential power analysis Diffie–Hellman key exchangeDiffie–Hellman problemDigiCipher 2Digital FortressDigital rights managementDigital signatureDigital Signature AlgorithmDigital signature forgery • Digital timestamping • Digital watermarkingDilly KnoxDining cryptographers problemDiplomatic bagDirect Anonymous AttestationDiscrete logarithmDisk encryption • Disk encryption hardware • Disk encryption softwareDistance-bounding protocolDistinguishing attackDistributed.netDMA attackdm-crypt • Dmitry Sklyarov • DomainKeysDon CoppersmithDorabella CipherDouble Ratchet AlgorithmDoug StinsonDragon (cipher)DRYADDual_EC_DRBG

E

E0 (cipher)E2 (cipher)E4MEAP-AKAEAP-SIMEAX modeECC patentsECHELONECRYPTEdouard Fleissner von WostrowitzEdward HebernEdward ScheidtEdward TravisEFF DES crackerEfficient Probabilistic Public-Key Encryption SchemeEKMS Electronic Communications Act 2000 • Electronic money • Electronic signatureElectronic votingElGamal encryptionElGamal signature schemeEli Biham • Elizebeth Friedman • Elliptic-curve cryptographyElliptic-curve Diffie–Hellman • Elliptic Curve DSA • EdDSAElliptic curve only hashElonka DuninEncrypted functionEncrypted key exchangeEncrypting File SystemEncryptionEncryption softwareEnigmailEnigma machineEnigma rotor detailsEntrustErnst FetterleineSTREAMÉtienne BazeriesEurocryptEuroCryptExport of cryptographyExtensible Authentication Protocol

F

Fast Software Encryption • Fast syndrome-based hashFEA-MFEALFeige–Fiat–Shamir identification schemeFeistel cipherFélix DelastelleFialkaFilesystem-level encryptionFileVaultFill deviceFinancial cryptographyFIPS 140FIPS 140-2Firefly (key exchange protocol)FISH (cipher)Fish (cryptography)FloradoraFluhrer, Mantin and Shamir attackFormat-preserving encryptionFortezzaFort George G. MeadeFortuna (PRNG)Four-square cipherFranciszek PokornyFrank A. StevensonFrank RowlettFreenetFreeOTFEFreeS/WANFrequency analysisFriedrich KasiskiFritz-chipFROGFROSTBURG • FTP over SSH • Full disk encryption • Full Domain HashF. W. Winterbotham

G

Galois/Counter ModeGardening (cryptanalysis)GCHQ Bude • GCHQ CSO Morwenstow • GDESGeneric Security Services Application Program InterfaceGeorge BlakleyGeorge ScovellGGH encryption schemeGGH signature schemeGilbert VernamGMR (cryptography)GNU Privacy GuardGnuTLSGoldwasser–Micali cryptosystemGordon WelchmanGOST (block cipher)GOST (hash function) • Government Communications Headquarters Government Communications Security BureauGrain (cipher)Grand Cru (cipher)Great CipherGrill (cryptology)Grille (cryptography)Group-based cryptographyGroup signatureGrover's algorithmGustave BertrandGwido Langer

H

H.235HAIFA constructionHAIPEHans DobbertinHans-Thilo SchmidtHard-core predicateHardware random number generatorHardware security moduleHarold KeenHarry Hinsley • Harvest (computer) HAS-160Hash-based cryptographyHashcashHash chain Hash function security summaryHash listHasty Pudding cipherHAVALHC-256HC-9Heath Robinson (codebreaking machine)Hebern rotor machineHenri BraqueniéHenryk ZygalskiHerbert YardleyHidden Field EquationsHideki ImaiHierocryptHigh-bandwidth Digital Content ProtectionHigher-order differential cryptanalysisHill cipherHistory of cryptographyHMACHMAC-based One-time Password algorithm (HOTP) • Horst FeistelHoward HeysHttpsHugo HadwigerHugo KochHushmailHut 6Hut 8HX-63Hybrid cryptosystemHyperelliptic curve cryptographyHyper-encryption

I

Ian GoldbergIBM 4758ICE (cipher)ID-based cryptographyIDEA NXTIdentification friend or foe • IEEE 802.11i IEEE P1363I. J. GoodIllegal primeImpossible differential cryptanalysisIndex of coincidence • Indifferent chosen-ciphertext attack • Indistinguishability obfuscationIndocrypt Information leakageInformation Security GroupInformation-theoretic securityInitialization vectorInteger factorizationIntegral cryptanalysisIntegrated Encryption SchemeIntegrated Windows AuthenticationInterlock protocol • Intermediate certificate authorities • International Association for Cryptologic ResearchInternational Data Encryption AlgorithmInternet Key ExchangeInternet Security Association and Key Management ProtocolInterpolation attackInvisible inkIPsecIraqi block cipherISAAC (cipher)ISO 19092-2 • ISO/IEC 9797 Ivan Damgård

J

Jacques Stern • JADE (cypher machine) • James GilloglyJames H. EllisJames MasseyJan GralińskiJan KowalewskiJapanese naval codesJava Cryptography ArchitectureJefferson diskJennifer SeberryJerzy RóżyckiJoan DaemenJohannes TrithemiusJohn HerivelJohn Kelsey (cryptanalyst) • John R. F. Jeffreys John TiltmanJon Lech JohansenJosef PieprzykJoseph DeschJoseph Finnegan (cryptographer)Joseph MauborgneJoseph RochefortJournal of CryptologyJunger v. Daley

K

Kaisa NybergKalyna (cipher) Kasiski examinationKASUMIKCDSAKeePassKerberos (protocol)Kerckhoffs's principleKevin McCurley (cryptographer)Key-agreement protocolKey authenticationKey clusteringKey (cryptography)Key derivation functionKey distribution centerKey escrowKey exchangeKeyfile Key generationKey generatorKey managementKey-recovery attackKey scheduleKey server (cryptographic)Key signature (cryptography)KeysigningKey signing partyKey sizeKey space (cryptography)KeystreamKey stretchingKey whiteningKG-84KHAZADKhufu and KhafreKiss (cryptanalysis)KL-43KL-51KL-7KleptographyKN-CipherKnapsack problemKnown-key distinguishing attackKnown-plaintext attackKnownSafe KOI-18KOV-14KryhaKryptosKSD-64KupynaKuznyechikKW-26KW-37 KY-3KY-57KY-58KY-68KYK-13

L

LacidaLadder-DESLamport signature • Lars Knudsen • Lattice-based cryptographyLaurance SaffordLawrie BrownLCS35Leo MarksLeonard AdlemanLeon Battista AlbertiLeo RosenLeslie YoxallLEVIATHAN (cipher)LEX (cipher)Libelle (cipher)Linear cryptanalysisLinear-feedback shift registerLink encryptionList of ciphertextsList of cryptographersList of cryptographic file systems • List of cryptographic key types • List of cryptology conferences • List of telecommunications encryption termsList of people associated with Bletchley Park • List of SFTP clients • List of SFTP server software • LOKILOKI97Lorenz cipherLouis W. TordellaLshLucifer (cipher)Lyra2

M

M6 (cipher)M8 (cipher)M-209M-325M-94MacGuffin (cipher)MadrygaMAGENTAMagic (cryptography)Maksymilian CiężkiMalcolm J. WilliamsonMalleability (cryptography)Man-in-the-middle attackMarian Rejewski • MARS (cryptography) Martin HellmanMaruTukku • Massey–Omura cryptosystem Matt BlazeMatt RobshawMax NewmanMcEliece cryptosystemmcrypt • MD2 (cryptography) • MD4MD5MD5CRKMDC-2MDS matrix • Mean shortest distance Meet-in-the-middle attackMental pokerMercury (cipher machine)Mercy (cipher)Meredith GardnerMerkle signature schemeMerkle–Damgård constructionMerkle–Hellman knapsack cryptosystemMerkle's PuzzlesMerkle treeMESH (cipher)Message authenticationMessage authentication codeMessage forgeryMI8Michael LubyMICKEYMicrodot • Military Cryptanalysis (book) (William F. Friedman) Military CryptanalyticsMimic functionMirror writingMISTY1Mitsuru MatsuiMMB (cipher)Mod n cryptanalysisMQVMS-CHAPMUGIMULTI-S01 MultiSwapMultivariate cryptography

N

National Communications CentreNational Cryptologic MuseumNational Security AgencyNational Cipher ChallengeNavajo INeal KoblitzNeedham–Schroeder protocolNegligible functionNEMA (machine)NESSIENetwork Security ServicesNeural cryptographyNew Data SealNewDESN-Hash Nicolas CourtoisNiederreiter cryptosystemNiels FergusonNigel de GreyNihilist cipherNikita BorisovNimbus (cipher)NIST hash function competitionNonlinear-feedback shift registerNOEKEON • Non-malleable codes Noreen • Nothing up my sleeve number • NSA cryptographyNSA encryption systems • NSA in fiction • NSAKEYNSA Suite A CryptographyNSA Suite B CryptographyNT LAN ManagerNTLMSSPNTRUEncryptNTRUSignNull cipherNumbers stationNUSHNTRU

O

Oblivious transferOCB modeOded GoldreichOff-the-Record MessagingOkamoto–Uchiyama cryptosystemOMI cryptograph OMNI (SCIP)One-key MACOne-time padOne-time passwordOne-way compression functionOne-way functionOnion routingOnline Certificate Status ProtocolOP-20-GOpenPGP cardOpenSSHOpenSSLOpenswanOpenVPNOperation RuthlessOptimal asymmetric encryption padding • Over the Air Rekeying (OTAR) • OTFE Otway–Rees protocol

P

Padding (cryptography)Padding oracle attackPaillier cryptosystemPairing-based cryptographyPanama (cryptography)Partitioning cryptanalysisPassive attackPassphrasePasswordPassword-authenticated key agreementPassword crackingPassword Hashing CompetitionPaul KocherPaulo PancatuccioPaulo S. L. M. BarretoPaul van OorschotPBKDF2PC BrunoPepper (cryptography) • Perfect forward secrecy • Perforated sheets • Permutation cipher Peter Gutmann (computer scientist)Peter JungerPeter TwinnPGP CorporationPGPDiskPGPfonePhelixPhil ZimmermannPhoturis (protocol)Physical securityPhysical unclonable functionPig LatinPigpen cipherPike (cipher)Piling-up lemmaPinwheel (cryptography)Piotr SmoleńskiPirate decryption • PKC (conference) • PKCSPKCS 11PKCS 12PKIXPlaintextPlaintext-aware encryptionPlayfair cipherPlugboardPMAC (cryptography)Poem codePohlig–Hellman algorithmPoint-to-Point Tunneling ProtocolPointcheval–Stern signature algorithmPoly1305Polyalphabetic cipherPolybius squarePortexPost-quantum cryptographyPost-Quantum Cryptography StandardizationPower analysisPreimage attackPre-shared keyPretty Good Privacy • Printer steganography • Privacy-enhanced Electronic Mail • Private Communications TechnologyPrivate information retrievalProbabilistic encryptionProduct cipher • Proof-of-work system • Protected Extensible Authentication ProtocolProvable security • Provably secure cryptographic hash function • Proxy re-encryptionPseudo-Hadamard transformPseudonymity • Pseudorandom function Pseudorandom number generatorPseudorandom permutationPublic key certificatePublic-key cryptographyPublic key fingerprintPublic key infrastructurePURPLE PuTTYPy (cipher)

Q

Q (cipher)QrpffQUAD (cipher)Quadratic sieveQuantum coin flippingQuantum cryptographyQuantum digital signatureQuantum fingerprintingQuantum key distribution

R

Rabbit (cipher)Rabin cryptosystem • Rabin–Williams encryption RadioGatúnRail fence cipherRainbow tableRalph MerkleRambutan (cryptography) • Random function • Randomness testsRandom number generator attackRandom oracleRC2RC4RC5RC6Rebound attack • Reciprocal cipher • Red/black conceptREDOCRed Pike (cipher)Reflector (cipher machine)Regulation of Investigatory Powers Act 2000ReihenschieberRekeying (cryptography)Related-key attackReplay attackReservehandverfahrenResidual block termination • Rijndael key schedule • Rijndael S-boxRing signatureRIPEMDRip van Winkle cipherRobert Morris (cryptographer) • Robot certificate authority RockexRolf NoskwithRon RivestRoom 40Root certificateRoss J. AndersonRossignolsROT13Rotor machineRSA RSA • RSA-100 RSA-1024 RSA-110 RSA-120 RSA-129 RSA-130 RSA-140 RSA-150 RSA-1536 RSA-155 RSA-160 RSA-170 RSA-180 RSA-190 RSA-200RSA-2048 RSA-210 RSA-220 RSA-230 RSA-232 RSA-240 RSA-250RSA-260 RSA-270 RSA-280 RSA-290 RSA-300 RSA-309 RSA-310 RSA-320 RSA-330 RSA-340 RSA-350 RSA-360 RSA-370 RSA-380 RSA-390 RSA-400 RSA-410 RSA-420 RSA-430 RSA-440 RSA-450 RSA-460 RSA-470 RSA-480 RSA-490 RSA-500 RSA-576 RSA-617 RSA-640 RSA-704RSA-768 RSA-896 RSA-PSS RSA Factoring ChallengeRSA problemRSA Secret-Key ChallengeRSA SecurityRubber-hose cryptanalysisRunning key cipherRussian copulation

S

S-1 block cipher SAFERSalsa20Salt (cryptography) • SAM card Security Support Provider InterfaceSAMLSAVILLESC2000Schnorr groupSchnorr signatureSchoof–Elkies–Atkin algorithmSCIPScott VanstoneScramblerScramdiskScream (cipher)ScryptScytaleSeahorse (software)SEAL (cipher)Sean Murphy (cryptographer)SECGSecret broadcastSecret decoder ring • Secrets and Lies (Schneier) • Secret sharingSectéra Secure ModuleSecure access moduleSecure channelSecure Communication based on Quantum CryptographySecure copySecure cryptoprocessorSecure Electronic TransactionSecure Hash AlgorithmsSecure Hypertext Transfer ProtocolSecure key issuing cryptography Secure multi-party computationSecure Neighbor DiscoverySecure Real-time Transport Protocol • Secure remote password protocol • Secure ShellSecure telephoneSecure Terminal EquipmentSecure voiceSecurIDSecurity associationSecurity engineeringSecurity levelSecurity parameterSecurity protocol notationSecurity through obscuritySecurity tokenSEEDSelected Areas in CryptographySelf-certifying File SystemSelf-shrinking generatorSelf-signed certificateSemantic securitySerge VaudenaySerpent (cipher)Session keySHACALShafi GoldwasserSHA-1SHA-2SHA-3Shared secretSHARKShaun WylieShor's algorithmShrinking generatorShugborough inscriptionSide-channel attackSiemens and Halske T52SIGABASIGCUMSIGINTSignal ProtocolSignal Intelligence ServiceSigncryption SIGSALYSILC (protocol)Silvio MicaliSimple Authentication and Security LayerSimple public-key infrastructure • Simple XOR cipher S/KEYSkein (hash function)Skipjack (cipher)Slide attackSlidexSmall subgroup confinement attackS/MIME • SM4 algorithm (formerly SMS4) • Snake oil (cryptography)SnefruSNOWSnuffle SOBER-128Solitaire (cipher)Solomon KullbackSOSEMANUKSpecial Collection ServiceSpectr-H64 • SPEKE (cryptography) • Sponge functionSPNEGOSquare (cipher)Ssh-agentSsh-keygenSSH File Transfer ProtocolSSLeayStafford TavaresStandard model (cryptography)Station CASTStation HYPOStation-to-Station protocol • Statistical cryptanalysis Stefan LucksSteganalysisSteganographyStraddling checkerboardStream cipherStream cipher attacksStrong cryptographyStrong RSA assumptionStuart Milner-BarrySTU-IISTU-IIIStunnel • Substitution box • Substitution cipherSubstitution–permutation networkSuperencryptionSupersingular isogeny key exchange • Swedish National Defence Radio Establishment • SWIFFTSXAL/MBALSymmetric-key algorithmSYSKEY

T

Tabula rectaTaher Elgamal • Tamper resistance • TcpcryptTelevision encryptionTEMPEST • Template:Cryptographic software Temporal Key Integrity ProtocolTesteryThawteThe Alphabet CipherThe Code BookThe CodebreakersThe Gold-BugThe Magic Words are Squeamish Ossifrage • Theory of Cryptography Conference • The world wondersThomas JakobsenThree-pass protocol • Threshold shadow scheme TICOM • Tiger (cryptography) • Timeline of cryptographyTime/memory/data tradeoff attackTime-based One-time Password algorithm (TOTP) • Timing attackTiny Encryption AlgorithmTom BersonTommy Flowers • Topics in cryptography • Tor (anonymity network)Torus-based cryptographyTraffic analysis • Traffic-flow security Traitor tracingTransmission securityTransport Layer SecurityTransposition cipherTrapdoor functionTrench codeTreyferTrifid cipherTriple DESTrivium (cipher)TrueCryptTruncated differential cryptanalysisTrusted third partyTuring (cipher)TWINKLETWIRLTwofishTwo-square cipher • Type 1 encryption • Type 2 encryption • Type 3 encryption • Type 4 encryption Typex

U

UES (cipher)UltraUMAC • Unbalanced Oil and Vinegar • Undeniable signatureUnicity distanceUniversal composabilityUniversal one-way hash function (UOWHF)

V

Venona projectVerifiable secret sharingVerisignVery smooth hashVESTVIC cipherVideoCryptVigenère cipherVincent RijmenVINSONVirtual private networkVisual cryptographyVoynich manuscript

W

Wadsworth's cipherWAKEWLAN Authentication and Privacy InfrastructureWatermark (data file)Watermarking attackWeak keyWeb of trustWhirlpool (hash function)Whitfield DiffieWide Mouth Frog protocolWi-Fi Protected AccessWilliam F. FriedmanWilliam Montgomery (cryptographer)WinSCPWired Equivalent PrivacyWireless Transport Layer SecurityWitness-indistinguishable proof • Workshop on Cryptographic Hardware and Embedded Systems • World War I cryptographyWorld War II cryptographyW. T. Tutte

X

X.509XDH assumption • Xiaoyun Wang • XML EncryptionXML SignaturexmxXSL attackXTEAXTRXuejia LaiXXTEA 10-00-00-00-00

Y

Yarrow algorithmY-stationsYuliang Zheng

Z

ZeroisationZero-knowledge password proofZero-knowledge proofZfoneZodiac (cipher)ZRTPZimmermann–Sassaman key-signing protocolZimmermann Telegram

gollark: Xenowyrms are listed as rare, so...
gollark: Yes, well.
gollark: Aeons are probably rare due to overhunting.
gollark: And "oh, tj09 will magically fix it all".
gollark: And meanwhile people say "nooo, sickness is *fun* somehow".

See also

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.