Index by gegouzhen12

VIEWS: 0 PAGES: 154

									Encyclopedia of Cryptography and Security Index
Index item
A5/1
AAA
AAC
AAR
AB
ABA digital signature guidelines
Abelian
Abreast Davies-Meyer
absence of communication attack
absolute indicator
abundance of communication attack
abuse-free protocol
Abwehr
access control
access control list
access control model
access control policy
access management
access matrix model
access structure
ACEKEM
accumulator
ACH
ACL
A-code
A-distance
acquirer
acrostics
active
active penetration test
ActiveX
adaptive
adaptive chosen ciphertext attack
adaptive chosen plaintext attack
adaptive chosen plaintext and chosen ciphertext attack
addition chain
addition problem
addition sequence
addition-subtraction chain
additive inverse
additive knapsack
additonal decryption key
address spoofing
Adleman-Pomerance-Rumely primality proving algorithm
admissable change of variables
Advanced Encryption Standard (AES)
advantage
adversary
adversary structure
advisory simulator
AE
AEAD
AES
affine equivalent
affine functions
affine invariant
affine scheme
AG-code
AGM method
aggressive mode
AH
Alberti encryption
Alberti matrix
alert message
algebraic attack
algebraic degree
algebraic-geometry codes
algebraic normal from
algebraic number field
all-or-nothing encryption
allowed
almost bent function
almost perfect nonlinear function
almost perfect zero-knowledge
alphabet
alternating step generator
American Bar Association
amplified boomerang attack
ANF
anomalous binary curves
anomaly
anonimity set
anonym
anonymity
anonymous network
anonymous remailers
ANSI
AP
APN function
APPEL
appendix
application cryptogram
ARQC
AS
ASN1
associated data
associativity
asymmetric cryptosystem
asymmetric proxy encryption
asymmetric proxy signature scheme
asymmetric watermarking
asymptotic security
asynchronous
ATM
attribute
attribute certificate
attributes management
auctioneer role
auditing
authenticated encryption (OCB, IAPM, XCBC)
authenticated encryption with associated data
authenticated key exchange
authentication
authentication authority
authentication code
authentication header
authentication provider
authentication scheme
authentication token
authentication server
authenticator
authenticity
Authenticode
authorization
authorization algebra
authorization architecture
authorization management
authorization policy
authorizer
auto-correlation
autokey
automated teller machine
automatic clearing house
automatic template analysis
availability
avalanche
baby-step giant-step method
backward security
backwards mixing
balanced
balance property
base
base key
basis
basic constraints extension
basic Merkle-Hellman scheme
Bass-O-Matic
BCH code
BDH
Beaufort encryption
Beaufort table
bent function
Berlekamp- Massey algorithm
Berlekamp Q matrix
Bézout
BGMW method
bigram
bigram substitution
bilinear Diffie-Hellman problem
bill of lading
binary alphabet
binary Euclidean algorithm
binary exponentiation
binary field
binary gcd algorithm
binder
binomial distribution
biometric identification
biometrics
bipartite substitution
birthday attack
birthday paradox
bit
bitslice
bit tracing
B/L
black-box attack
black-box tracing
black list
blinding factor
blinding techniques
blind signature
blind watermarking
block
block cipher
block code
Block Korkine-Zolotarev reduction
Blowfish
BLS short digital signatures
Bluetooth
Blum integer
Blum-Blum-Shub pseudorandom bit generator
Blum-Goldwasser public key encryption system
Blum prime
Bolero.net
bombs
Boneh-Franklin identity based cryptosystems
Boneh-Durfee attack
Boolean functions
boomerang attack
boundary
BPP
braid group
branch number
Brickell Merkle-Hellman attack
Brickell low density attack
bridge certification authority
broadcast encryption
brute force attack
Burmester-Desmedt protocol
butterfly algorithm
buyer role
byte
CA
Caesar cipher
Camellia
Canadian Trusted Computer Product Evaluation Criteria
canonical S-expressions
capabilities
capability list
Capstone
CAP theorem
captured agent trust
cardholder CA
card issuer
Carmichael number
cascade cipher
cascading revocation
CAST
CBC
CBCN
CBC-MAC and variants
CC
CCA2
CCIT-2
CCM
CCR
CDA
CDH
CDMA
centralized system
CEPS-standard
certificate
certificate authority
certificate extension
certificate management
certificate of primality
certificate policy
certificate policy statement
Certificate Practice Statement
certificate revocation
certificate revocation list
certification
certification authority
certified mail
CFB
CFRAC
CGI
chaffing and winnowing
chaining attack
chaining variable
chair
challenge covertext
challenge-response protocol
channel
characteristic
characteristic polynomial
Chaum blind signature scheme
Chaum-van Antwerpen undeniable signature scheme
Chinese Remainder Theorem
chord-and-tangent rule
Chor-Rivest cryptosystem
chosen ciphertext attack
chosen message attack
chosen one-out-of-two
chosen plaintext attack
chosen plaintext and chosen ciphertext attack
chosen related key
Cipher Block Chaining
Cipher FeedBack
cipher suite
cipher system
ciphertext
ciphertext ciphertext compromise
ciphertext only attack
ciphertext stealing
claimant
classical cryptosystem
claw-free
claw-resistant
clearance level
client hello
Clipper
CLIP-scheme
clock-controlled generator
closest vector problem
closure
closure alert
closure attack
CMA
CMAC
CMP
CMS
CMVP
coalition
Cock's identity based cryptosystem
code
code book attack
code-division-multiple-access
codeword
Cohen-Lenstra-Bosma algorithm
collision
collision attack
collision freeness
collision intractable
collision resistance
Collision-Resistant Hash Function (CRHF)
collusion attack
combination generator
combined data authentication
combined modes
combiner
commitment
commit phase
Common Criteria
Common Electronic Purse Specifications
common reference string
communication channel anonymity
communication complexity
commutative
COMP128
complementary circulating register
complementary slide
complementation property
complete mediation property
completeness
complexity class
complexity spectrum
composite
composite residuosity assumption
compression function
compromise
compromizing emanations
Compton effect
computable
computational complexity
computational Diffie Hellman
computational security
computational soundness
computationally secure steganography
computationally sound proof system
computational zero-knowledge
computer virus
concealment
concrete security
concurrent zero-knowledge
conditional correlation attack
conditional entropy
conference keying
confidentiality
confirmer signature
confirming operation
confusion
conjugate
congruence class
connection polynomial
consistency
consumable credentials
containing
Content Protecion for Recordable Media
content scrambling system
continued fraction method
contract signing
contrast
control vector
conventional cryptosystem
conversation
convertible undeniable signature
cookies
copy generation control
copy marking
copy protection
copy right protection
Core Messaging Platform
core rounds
Corporate Message Recovery
correcting-block attack
correlation attack for stream ciphers
correlation-immune and resilient Boolean functions
correlation immunity order
Counter Mode
counterfeiting
cover signal
covert channel
covertext
CRHF
CPRM
CPS, Certificate Practice Statement
CR
credentials
CRHF
CRL
cribs
Critical Security Parameters
CRL (CRLS)
cross-correlation
cross-certification
crossing step
crowds
CRT
cryptanalysis
cryptographic boundary
cryptographic message syntax
cryptographic module
cryptographic module validation program
cryptographic protocol
cryptography
cryptology
crypto machines
cryptosystem
CRYPTREC
CSEXP
CS-lite
CSP
CSS
CTCPEC
CTR
cue
customer acquirer
cut-and-choose protocol
CVP
CWC
cyclic
cyclic codes
cyclic codes with two zeros
cyclic Reed-Muller code
cycling attacks against RSA
cyclotomic coset
cyclotomy method
Cyrillic alphabet
data authentication
data encapsulation mechanism
Data Encryption Standard (DES)
data key
data masking
data origin authentication
data remanence
Data Seal
Davies attack
Davies-Meyer
DC Network
DCR
DDA
DDH
DEAL
deBruijn graph
de Bruijn sequence
de Viaris attack
deception
decimation
deciphering
decision function
decisional composite residuosity assumption
decisional Diffie-Hellmann problem
decision-making module
decorrelation
decryption
decryption algorithm
decryption exponent
decryption steps
DECT
Deep Crack
definitely composite
degree
delegated path discovery
delegated path validation
delegation
Della Porta's maxim
DEM
DEMA
denary alphabet
deniable encryption
denial-of-service
density
depth
derivative
derived key
Derived Test Requirements
designated combiner
designated confirmer signature
designed minimum distance
DES
Desmedt-Vandewalle-Govaerts knapsack
DES-X
DFA
DHP
dictionary
dictionary attack (1)
dictionary attack (2)
difference set
difference distribution table
differential
differential characteristic
differential cryptanalysis
differential electromagnetic analysis
differential fault analysis
differential-linear attack
differential membership test
differential power analysis
Diffie-Hellman key agreement
Diffie-Hellman problem
diffusion
digital identity
digital millenium copyright act
digital rights management system
digital signature
digital signature algorithm
digital signature guidelines
digital signature schemes
Digital Signature Standard
digital steganography
digital versatile disk
digital video disk
digraphic substitution
direct cross-certification
direct inversion
direct payment scheme
discrete Fourier transform
discrete logarithm
discrete logarithm problem
discretionary access control
discriminant
Disquisitiones Arithmeticae
distance
distinguished points
distinguisher
distinguishing algorithm
distinguishing attack
distributed DoS attack
distributed key generation
distributivity
divide-and-conquer attack
division intractable
Dixon's random squares methods
DLP
DMCA
DMZ
domain parameters
DoS
double-and-add
double key
double-DES
DP
DPA
DPD
DPV
DRM
DRMS
DAAA
DSA
DSG
DSS
DTR
dual code
DVD
dynamic adversary
dynamic attribute
dynamic authentication
dynamic data authentication
dynamic group signature scheme
dynamic traitor tracing
E&M
E0 (Bluetooth)
EAL
easy
eavesdropper
EAX
Ebay
ECB
ECC
ECC challenges
ECDLP
ECDSA
ECIES
ECMS
ECPP
ECSTR
ED
EE
efficiency
efficiency
egress filtering
electromagnetic attack
electromagnetic pulse
electronic cash
electronic cheque
electronic codebook mode (ECB)
electronic coin
electronic commerce
electronic copyright management system
Electronic Frontier Foundation
electronic funds transfer
electronic negotiable instruments
electronic noise source
electronic payment
electronic postage
electronic purse
electronic voting schemes
electronic wallet
Elements
ElGamal digital signature scheme
ElGamal public key encryption
elliptic curve cryptography
elliptic curve discrete logarithm problem
elliptic curve integrated encryption scheme
elliptic curve key agreement schemes
elliptic curve keys
elliptic curve method
elliptic curve point multiplication using halving
elliptic curve primailty proving algortihm
elliptic curve public-key encryption schemes
elliptic curves
elliptic curves for primality proving
elliptic eurve signature schemes
EMA
EMAC
EMP
EMV
encapsulating security payload
enciphering
Encrypt-and-MAC
encrypt copyrighted content
encryption
encryption algorithm
encryption exponent
encryption key
encryption step
Encrypt-then-MAC
end entity
endomorphic cryptosystem
enforcement
Enigma
entitlement
entitlements management
entity authentication
entropy
envelope
envelope MAC
environmental analysis
EPC
ephemeral
equivalent
equivocation
erasure-free
error-correcting code
ESP
EtM
Euclidean algorithm
EU-CMA
Euler liar
Euler's phi function
Euler pseudoprime
Euler's totient function
Euler's theorem
evaluation assurance level
evaluation of policy
Even-Mansour
exact identification
excluded subtrees
exculpability scheme
exhaustive key search
existential forgery
expansion
explicit policy indicator
exponential security
exponential time
exponentiation
exponentiation algorithms
extended Euclidean algorithm
extended MD4
extension degree
extension field
extension field operations
external collision
factor base
factoring
factoring circuits
FACTORING problem
fail-stop signature
fair blind signature
fair exchange
fairness
false accept error
false positive
false reject error
fast correlation attack
fast data encryption algorithm
fault attacks
fault generation
FCG
FDH
FEAL
feature extraction module
Federal Information Processing Standard
federation
feedback bit
feedback coefficients
feedback function/polynomial
feedback shift register
Feige-Fiat-Shamir signature scheme
Feistel cipher
Fermat liar
Fermat primality test
Fermat prime
Fermat's little theorem
FIB
Fiat-Naor construction
Fiat-Shamir identification protocol and Fiat-Shamir signature scheme
field
field polynomial
filter generator
filtering (packets)
fingerprinting
fingerprinting code
finite field
FIPS
firewall
Fischlin scheme
fixed-base comb method
fixed-base Euclidean method
fixed-base exponentiation
fixed-base windowing method
fixed-exponent exponentiation
fixed point attack
flat namespace
flexible RSA assumption
flip-flop metastability source
flooding DoS attack
flow
focused ion beam
forgery
forgery attack
Fortezza
forward mixing
forward secrecy
forward security
fragmentation
frame
frame counter
frame number
frequency matching
freshness
Frobenius map
Frobenius-Grantham primality test
FSR
Fujiwara-Okamoto transformation
full-domain hash method
full-knowledge prenetration test
full positive difference set
function field
fundamental theorem of arithmetic
Galois field
gap
gap Diffie-Hellman assumption+A604
gap Diffie-Hellman group
Gaussian integer method
gcd
GCDH assumption
G-DES
Geffe generator
generalized inversion attack
generalized Mersenne number
generalized Mersenne prime
general NFS
general purpose primality test
general exponentiation
general knapsack scheme
generalized Feistel
generator
generator matrix
generator polynomial
generic
Gennaro-Halevi-Rabin scheme
geometry of numbers
GHS attack
Givierge's maxim
GKE
global deduction
glue logic design
GMR signature
GNFS
GNU Privacy Guard
GOC PKI
Golay code
Gold sequence
Goldwasser-Micali encryption scheme
Golomb ruler
Golomb's randomness postulates
Goppa codes
GOST
GPS
Graham-Shamir scheme
greatest common divisor
grille
Groebner basis
group
group axioms
Group Computational Diffie-Hellman assumption
group key agreement
group key distribution
group manager
group names
group of units
group session key
group signature
GSM
Guillou-Quisquater signature scheme
Hadamard transform
Hagelin
halving
half-trace
Hamiltonian graph
Hamming distance
Hamming weight
handshake
hard core bit
Hardware Security Module
hash127
hash-and-sign
hash function
hash rate
Hasse's theorem
HAVAL
Helix
Hellmann's time-memory trade-off
HEMP
Hermite-Korkine-Zolotarev lattice reduction
hidden fields
hider
hierarchical namespace
high order DPA
history variable
HMAC
holocryptic
homomorphic secret sharing
homomorphism
homophone
honest-but-curious
host security
HSM
HTTP
HTTPS, secure HTTP
hyperelliptic cryptosystems
hypertext transfer protocol
IACBC
IAPM
IBE
IBIP
IBS
ICC
ICE-CAR
ID
IDEA
ideal
ideally secure
identifiable parent property
identification
identifier
identity
identity based
identity based cryptosystems
identity based encryption
identity based signature
identity escrow scheme
identity management
identity provider
identity theft
identity uniqueness
identity verification protocol
IDS
ideal
IEEE P802
IEEE P1363
IETF
IEMP
IETF
IKE
imbalance
impersonation attack
impossible cryptanalysis
impossible differential attack
improved Davies attack
incidence of coincidence
incremental
IND
IND-CCA2
independent key
independent subkeys
index-calculus method
index of coincidence
indirect payment system
indistinguishability of encryptions
individual conversion operation
individual key
inferential power analysis
Information Based Indicia Program
information hiding
information integrity
information leakage
information symbols
Information Technology Security Evaluation Criteria
information theoretic security
information theory
Ingemarsson-Tang-Wong protocol
ingress filtering
inhibit any policy extension
inhibit any policy indicator
initial policy set
initial state
initial value
in-line TTP
inner CBC
inner modes
inside out attack
insider secure
integer factoring
integral attack
integrity
integrity-aware cipher block chaining
integrity-aware parallelizable mode
interactive
interactive argument
interactive proof
interleaved modes
interleaved sliding window exponentiation
internal collision attack
International Telecommunication Union
internet engineering task force
internet key exchange
internet protocol
internet security association and key management protocol
interpolation attack
intrusion detection
intrusion detection system
invariance under decimation
invasive attack
inverse
inverse Fourier relation
inversion attack
inversion in finite fields
invisibilty
involution
IP
IPA
IPES
IPsec
irreducible polynomial
ISAKMP
ISO
isologs
isomorphs
issuer
ITA
iterated attack
iterated cipher
iterated hash function
iterated Merkle-Hellman scheme
iterative cipher
Itoh-Tsujii inversion algorithm
ITSEC
ITU
IV (initial value)
Jacobi Sum Test
Jacobi symbol
Java
JavaScript
JCP
Jenning generator
KA
Kahn's maxim
Kappa test
Karatsuba algorithm
Kasiski's method
KASUMI
KASUMI/MISTY1
KCDSA
KDC
KEM
Kerberos authentication protocol
Kerckhoff’s maxim
key
key agreement
key alphabet
key authentication
key confirmation
key-dependent S-boxes
key directive
key distribution center
key encapsulation mechanism
key encryption key
key escrow
key establishment protocol
key exchange protocol
key generation algorithm
key graph
key group
key management
key mixing
key negotiation
KeyNote system
key phrase
key ranking
key recovery
key revocation
key recovery attack
key schedule algorithm
key space
key stream
key symmetric cryptosystem
key text
key token
key translation
key transport
Khufu
kleptography
KN cipher
knapsack cryptographic schemes
knapsack problem
knowledge extractor
known plaintext attack
known related key
Knuth-Schroeppel function
Koblitz curve
L3 lattice reduction
label
Lagarias and Odlyzko attack
Lagrange interpolation theorem
Lagrange's theorem
lambda representation
language
latin alphabet
Latin square
lattice
lattice reduction
lattice sieving
lattice-based cryptography
Layered Subset Difference
law of quadratic reciprosity
lchop
lcm
LDAP
least common multiple
left-to-right exponentiation
legal structures
Legendre symbol
Lehmer's Euclidean algorithm
length
Lenstra-Lenstra-Lovász lattice reduction
lexicographical knapsacks
LFSR
license
licensee
linear approximations
linear characteristic
linear code
linear complexity
linear complexity profile
linear congruential generator
linear consistency attack
linear cryptanalysis for block ciphers
linear cryptanalysis for stream ciphers
linear equivalence
linear feedback shift register
linear hull
linear probability
linear sieve
linear SSS
linear structure
linear substitution
linear syndrome attack
linking
list decoding
LKH
LLL latice reduction algorithm
L-notation
local deduction
local DoS attack
local policy
Local Registration Authority
logical tree hierarchy scheme
logic DoS attack
longevity
long-lived broadcast encryption
low density knapsack
LRA
LSD
Luby-Rackoff cipher
LUC
Lucas-Lehmer primality test
Lucas probable prime test
Lucifer
MAA
MAC
MAC algorithms
MacDES
MAC guessing attack
MAC-then-Encrypt
MAC-verification attack
main mode
malicious
malleable
mandatory access control
man-in-the-middle attack
manipulation
Manipulation Detection Code (MDC)
mark copyrighted content
marking assumption
MARS
MASH functions (Modular Arithmetic Secure Hash)
master copy control
master key
matching ciphertext attack
matching module
Matsui
Mattson-Solomon polynomial
Maurer's method
Maurer's universal statistical test
Maxim Number One
maxims
maximum correlation
maximum-distance-separable
maximum-length linear sequence
maximum order complexity
May attack
McEliece public key cryptosystem
McGrew-Sherman OFT protocol
MD2
MD4-MD5
MD5 hash function
MDC
MDS code
MDx-family
MDx-MAC
media access control
meet-in-the-middle attack
member pseudonym
membership test
memory size
merchant CA
Merkle-Damgard strengthening
Merkle-Hellman dominance
Merkle-Hellman transformation
Merkle-Hellman trapdoor
Merkle's meta-method
Merkle tree
Mersenne number
Mersenne prime
message authenticaton algorithm
message authentication code
message-encrypting key
message length attack
message recovery
METI
Meyer-Schilling hash functions
microprobing
Miller-Rabin probabilistic primality test
million message attack
MIME
minimal polynomial
minimal polynomial
minimum distance
Minkowski
Minkowski's first theorem
MIPS-year
miss-in-the-middle attack
misuse
MISTY1
mixed alphabet
mix networks
Miyaguchi-Preneel
mobile code
modes
modes of operation of a block cipher
modification
modular addition
modular arithmetic
modular exponentiation
modular inverse
modular multiplication
modular root
modulus
MONDEX-scheme
monitoring
monomial
monotone
monotone signature
Montgomery arithmetic
Montgomery exponentiation
Montgomery product
Montgomery reduction
Montgomery representation
Montgomery squaring
monographic substitution
MonPro algorithm
Moore's law
Morrison-Brillhart method
MPHPT
MPQS
MQV key agreement scheme
m-resilient
m-sequence
MtE
multicast encryption
multi-exponentiation
multigram property
multipartite substitution
multiparty computation
multiple anagramming
multiple bits DPA
multiple encryption
multiple polynomial quadratic sieve
multiplication problem
multiplicative group
multiplicative inverse
multiplicative knapsack
multiplicative secret sharing
multi-precision multiplication
multi-precision squaring
multi-set attack
multi-signature
mutual
NAF
name
name constraints extension
naming authority
Naor-Yung double encryption paradigm
narrow-sense envelop
National Bureau of Standards
NBS
nearest vector problem
near prime
Needham-Schroeder protocols
need-to-know principle
NEMA
NESSIE project
network partitions
New European Schemes for Signature, Integrity and Encryption
NFS
Niederreiter encryption scheme
NIST
NIZK
NL
NLFSR
non-adjavent form
non-blind watermarking
nonce
non-coincidence exhaustion
non-commutative
non-cyclic
non-interactive proofs
non-interactive zero-knowledge proofs
non-invasive attack
non-linear feedback shift register
non-linearity of Boolean functions
non-linearity order
non-malleability
non-multiplicativity
non-repudiation
non-secret key encryption
non-singular Boolean function
non-singular LFSR
non-transferable
normal base
normal-legacy
normal profile
NP
NP-complete
n-residue
NTRU
null
null cipher
number field
number field sieve
number theory
Nyberg-Rueppel signature scheme
OAEP: Optimal Asymmetric Encryption Padding
oblivious transfer
observer
OCB
OCSP
odd-characteristic extension
OEF
OFB
off-line
off-line authenication method
off-line CAM
offset codebook
OFT protocol
OMA
OMAC
Omega-notation
omega-notation
one-more forgery
one-time blind signature
one-time key
one-time pad
one-time password
one-to-one
one-way accumulator
one-way function
one-way function tree protocol
One-Way Hash Function (OWHF)
one-way permutation
onion routing
on-line
on-line authentication method
on-line CAM
on-line certificate status protocol
on-line mutual authentication
O-notation
o-notation
opaque
open code
Open PGP
optimal authentication scheme
Optimal asymmetric Encryption Padding
optimal extension fields
optimistic contract signing
orange book
oracle
order
OT
OTP
outer modes
out-of-phase autocorrelation
output feedback
output transformation
outsider secure
overspender detection
overspending prevention
OWHF
P
P3P
packet
padding
Pallier assumption
Paillier encryption and signature schemes
pairings over elliptic curves
PAG
PAP
parallel composition
parallelized collision search
parity check matrix
parity check polynomial
parity check symbols
Parseval's relation
partial-domain one-wayness
partial preimage resistance
partial signature
partitions
partitioning cryptanalysis
partition number
passive
passive penetration test
password
pastry dough mixing
pattern finding
pay later
pay now
payment authorization
payment card
payment card
PC
PCR
PDP
PEM, Privacy Enhanced Mail
penetration
PEP
penetration testing
perfect forward secrecy / PFS
perfect
perfectly secure steganography
perfect zero knowledge
periodic key
period of a polynomial
period of a sequence
permission
permitted subtrees
permutation
permutation matrix
personal agent trust
personalization
person pseudonym
personal identification number (PIN)
PES
PFS
PGP
phase noise source
physical attacks
physical security
piling-up lemma
PIN
PIN verification
PKCS
PKG
PKI
PKI Assessment Guidelines
PKIX - Public Key Infrastructure (X.509)
plaintext
plainetext awareness
plaintext-ciphertext compromise
plaintext-plaintext compromise
platform for privacy preferences project
playback control
Playfair cipher
plug-ins
PMAC
PN-sequence
Pohlig-Hellman algorithm
point addition
point at infinity
point doubling
point multiplication
point of sale
policy
Policy Administration Point
policy constraint
policy control
Policy Decision Point
Policy Enforcement Point
policy mapping
policy mapping inhibit indicator
Pollard's kangaroo method
Pollard's lambda method
Pollard's p-1 method
Pollard's rho method
polyalphabetic encryption
polyalphabetic substitution
Polybios square encryption
polygraphic substitution
polynomial basis representation
polynomial complexity
polynomial function
polynomial security
polynomial time
polyphony
Pontifex
Porta encryption
Porta table
POS
postal security device
power analysis
power trace
PP
pre-charged dual rail logic
predecessor attack
predictable
preimage resistance
prepay
preperiod
Pretty Good Privacy
PRIMALITY problem
primality proving algorithm
primality test
prime certificate
prime field
prime field anomalous curve
prime generation
prime number
prime number theorem
prime-order field
priming key character
primitive cyclic code
primitive element
primitive polynomial
primitive root
principal ideal
principal ideal ring
privacy
Privacy Enhanced Mail
privacy enhancing technologies
private key cryptosystem
private key generator
private watermarking
privilege
privilege management
PRNG
proactive
probabilistic algorithm
probabilistic primality test
probabilistic public-key encryption
probabilistic SSS
Probabilistic Signature-Encryption Padding
probabilistic signature scheme
probable prime
product cipher, superencryption
proof of knowledge vs proof of membership
proofs of membership
propagation characteristics of Boolean functions
propagation criterion
proposed encryption standard
protection
protection profile
protocol
Proton
provable prime
provable security
prover
provisioning
proxy encryption
proxy signatures
PSAM
PSD
PSEC-KEM
PSEP
pseudo Mersenne prime
pseudo-collision (Preneel)
pseudo-Hadamard transform
pseudo-noise sequence
pseudonymity
pseudonym
pseudoprime
pseudo-random function
pseudo-random number generator
pseudo-random permutation
pseudo-random sequence
PSS
PSS-R
public key based
public key cerificate
public key cryptography
public key cryptography standards
Public Key Infrastructure
public key proxy encryption
public key proxy signatures
public key steganosystem
public key watermarking
publicly verifiable secret sharing
public watermarking
purchase secure application module
pure cryptosystem
pure circulating register
purse
Q-matrix
QRP
QS
quadratic Frobenius test
quadratic non-residue
quadratic residue
quadratic reciprosity law
Quadratic Residuosity Problem
Quadratic Sieve
quartet
quaternary alphabet
quantum cryptography
quick mode
RA
Rabin cryptosystem
Rabin digital signature scheme
Rabin's primality test
Rabin-Miller test
RACE project
radio frequency attacks
rainbow tables
ramp scheme
random bit generation (hardware)
random key
randomness source
random oracle model
random preimage attack
random squares method
randomized algortihm
randomness postulates of Golomb
random sequence
rank metric
rational points
RC2
RC4
RC5
RC6
rchop
reactive defense
receipt-free problem
receiver deniable
recipient anonymity
recipient unobservability
record layer
rectangle attack
reduced
reducible polynomial
reduction
reductionist
redundancy
Reed-Muller codes
Reed-Solomon code
Registration Authority
re-keying
related key attack
relationship anonymity
relationship pseudonym
relatively prime
relay attack
reliability
relying party
remote DoS attack
repeated key
replay attack
repository
representation (lambda)
request for comment
resettable zero-knowledge
residue class
resiliency order
resilient
response
resynchronization attack
retail MAC (Preneel)
reversed alphabet
revocable credentials
revocation scheme
RF attack
RfC
right
rights management
right-to-left exponentiation
Rijndael
ring
ring homomorphism
RIPE
RIPEMD family
risk
risk management
RMAC
robust
Rohrbach's maxim
role hierarchy
root CA
rotor
round
round function
rounds complexity
RP
RS code
RSA assumption
RSA-CRT
RSA cryptosystem
RSA digital signature scheme
RSA factoring challenge
RDA-KEM
RSA number
RSA problem
RSA-PSS
RSA public-key encryption
Rule Book
run
running-key
running time
run property
SA
SAC
SAD
SAEP+
safeguard selection
safe prime
SAFER
sally
salt
SAML
SASAS
Satoh's algorithm
saturation attack
SBEMP
scalable
scalar multiplication
scanning electron microscope
Schnorr digital signature scheme
Schnorr Identification
Schoof's algorithm
SDA
SDMI
SDSI
SDSI names
SEAL
second preimage resistance
secrecy
secret key cryptosystem
secret sharing scheme
secretive defense
secure channel
secure digital music initiative
Secure ElectronicTransactions
Secure Hash Algorithm
secure HTTP
SecureID
Secure Shell
secure sigantures from the "strong RSA" assumption
secure shell
Secure Socket Layer (SSL)
security
Security Architecture
security association
security association database
security assertion markup language
security boundary
Security Evaluation Criteria
security gateways
security label
security level
security module
security parameter
security parameter index
security policy
security policy database
security standards activities
security target
seed
selective forgery
self-initializing quadratic sieve
self-reciprocal permutation
self-reducibility
self-shrinking generator
self-synchronizing stream cipher
seller
SEM
SEMA
semagram
semantic security
semi-honest
semi-weak key
sender anonymity
sender deniable
sensitivity level
sensor
sensor module
sequences
sequential composition
Serpent
ServerHello
session key
session pseudonym
SET
S-expression
SFLASH
SGEMP
SHACAL
SHA family (Secure Hash Algorithm)
Shamir’s threshold scheme
Shamir's ultimate knapsack scheme
Shamir-Zippel scheme
Shank's baby-step giant-step method
Shannon’s maxim
Shannon’s model
Shannon's main theorem
Shannon theory
share
sharing rules
SHARK
Shawe-Taylor's algorithm
shift-and-add property
shifted alphabet
shift register sequence
Shönhage and Strasse method
short digital signatures
shortest vector problem
shrinking generator
shuffling procedures
side-channel analysis
side-channel attacks
Siegenthaler
sieve of Eratosthenes
sieving
sieving in function fields
sieving technique
SIGABA
SIGMYC
signature
signcryption
signed digit exponentiation
signer's security
sign function
signing algorithm
silo
simple distributed security infrastructure
simple electromagnetic analysis
simple power analysis
simple public key infrastructure
simple substitution
simple mail transport protocol
simple power analysis
Simplified Asymmetric Encryption Padding
simultaneous exponentiation
simultaneous security
simultaneous sliding window exponentiation
single sign-on
Singleton bound
size
Skipjack
Sky Videocrypt system
slid pair
slide attack
slide-with a twist
sliding window exponentiation
slow key-schedule
small polynomial
smartcard tamper resistance
S/MIME
smooth number
smooth polynomial
smoothness
smoothness probability
SMTP
Snefru
SNFS
sniffing
SNORT
SOBER-128
software attack
Solovay & Strassen's primality test
solitaire
Sophie Germain prime
soundness
SPA
SPD
special NFS
special purpose primality test
SPKI/SDSI
SPN
SP network
spoofing
square-and-multiply algorithm
square attack
square-root bound
SQUFOF algorithm
SSH
SSL-protocol
stage
standard alphabet
state
stateful
stateless
static
static adversary
Static Data Authentication
static off-line CAM
station-to-station protocol
statistical cryptanalysis
statistically secure steganography
statistical test
statistical zero knowledge
steganography
stegosystem
stegotext
Steiner's algorithm
stop-and-go generator
straddling cipher
straddling encryption
stream cipher
strict avalance criterium
strong liar
strongly unforgeable
strong prime
strong pseudoprime
strong pseudoprime test
strong RSA assumption
structural crypptanalysis
structures
STS protocol
sub-exponential time
subfield
subfield inversion
subfield operations
subgroup
subgroup cryptosystems
subject
subliminal channel
subpolynomial time
subscriber registration model
subset difference
subset sum problem
substitution
substitution attack
substitution cipher
substitution-permutation (SP) network
substitution-permutation sandwich
succesive minima
summation generator
sum-of-squares indicator
superelliptic curves
superencryption
superimposition
superincreasing
super pseudorandom permutation
supersingular curve
support
SVP
S.W.I.F.T.
symmetric cryptosystem
symmetric proxy encryption
symmetric proxy signature scheme
symmetry of position
synchronous stream cipher
systematic
table attack
tag
tamper detection
tamper resistance
tamper response
Tandem Davies-Meyer
tapping sequence
target collision resistant
target LFSR
Target of Evaluation
Tate pairing
TC
TCP
TCPA
TCR
TCSEC
TDEA
TEA
TED
teardrop
teletype alphabet
Telepass
tempest
ternary alphabet
TGS
theta-notation
three-GPP-MAC
threshold authentication
threshold cryptography
threshold decryption
threshold pseudorandomness
threshold security
threshold signature
threshold scheme
threshold subject
threshold tracing
threshold authentication codes
Through Transport Club
ticket
ticket granting server
t-identifiable parent property
time stamping
time-memory tradeoff
time-memory tradeoff attack
timing attack
title registry
TLS
T method
TM system
TOE
token
Toom-Cook multiplication
TOS
total break
totient function
TR
trace function
traceability
trace function
tracing for watermarking
tracing mechanism
traffic normalization
traitor
traitor tracing
transaction pseudonym
transform
transform mode
transient electromagnetic device
transitive signature
translucent
transmission control protocol
transparent
Transport Layer Security (TLS)
transposition
transposition cipher
trapdoor one-way function
trapdoor permutation
treble key
trial division
Triple DES
triple encryption
Trojan horses, computer viruses and worms
TS
truncated differentials
Trust Management system
trusted
trusted authority
trusted center
trusted computer system evaluation criteria
trusted computing platform alliance
trusted group authority
trusted path
trusted third party
trust model
trust model business controls
trust relationship
truth-table
TTP
tunnel mode
tweakable blockcipher
TWINKLE
TWIRL
twisted construction
two-factor authentication
Twofish
two-key triple encryption
two-tier hierarchy
two-to-the-k-ary exponentiation
Two-Track-MAC
type of service bits
TYPEX
UDP
UMAC
unauthorized decryption
unconditional authentication
unconditional blindness
unconditional security
undeniable signature
undercover agent trust
UDP
unforgeability
unicity distance
unilateral
unipartite substitution
unique SVP
unit
universal break
universal conversion operation
universal nonlinearity bound
Universal One-Way Hash Functions (UOWHF)
universal padding schemes
universal statistical test
universal stegosystem
universal verifiability
unlinkability
unlinkable credential
unobtrusiveness
untraceability
unveil phase
UOWHF
user authentication
user datagram protocol
user data protocol
U.S. FPKI
uSVP
validation
validity
validity of conversion
vcc glitch
vector-addition chain
verifiable encryption
verifiable forgery
verifiable MIX protocol
verifiable secret sharing
verification algorithm
verification scheme
verifier
Vernam cipher
Vernam type
Vernam table
veronym
Vigenère encryption
Vigenère table
Vircator
virtual private network
virus
virus protection
virus scanner
visual secret sharing scheme
vocabulary
VPN
VSS
VSSS
WAKE-ROFB
walled garden
wallet
wallet database
Walsh transform
watermarking
weak collision resistant
weak keys
weak plaintext awareness
web browser security
web of trust
web security
webserver security
wedge device
Wegman-Carter construction
Weierstrass equation
weight
Weil descent
Weil pairing
Weil's theorem
WEP
whirlpool
whitening
wide-sense
wide trail strategy
width-w NAF
WI-FI
Wiener, Boneh-Durfee and May attacks on the RSA public key cryptosystem
winnowing
wired equivalent privacy protocol
wireless
witness
witness hiding
witness indistinguishability
worm
X.509
xedni calculus
XACML
XCBC
XECB
XML
XOR-MAC
XTR
yoyo-game
zero-divisor
zero-knowledge
zero-knowledge interactive proof
zero-knowledge penetration test
zig-zag exhaustion
zombies
y and Security Index
               Entry                               Entry

               security standards activities
               EMV
               EMV
               nonlinearity of Boolean functions   cyclic codes

               group
               hash function
               MIX networks
               Boolean functions
               MIX networks
               fair exchange
               crypto machines

               access control                      SPKI/SDSI
               access control                      policy
               access control                      policy
               identity management
               access control
               threshold signature                 secret sharing scheme
               NESSIE project
               time stamping
               electronic payment
               access control list                 SPKI/SDSI
               authentication
               authentication
               electronic wallet
               cryptology
               cryptanalysis                       Shannon’s model
               penetration testing
               web security
               threshold signature                 multiparty computation



               fixed-exponent exponentiation
               computational complexity
               fixed-exponent exponentiation
               fixed-exponent exponentiation
               ring
               knapsack cryptographic schemes
               Pretty Good Privacy
               denial of service                   firewall
               prime number
               elliptic curves
               AES/Rijndael
               digital steganography
               multiparty computation
               access structure
               non-malleability
               authenticated encryption
               authenticated encryption
               Rijndael/AES                        NESSIE project
Boolean functions
Boolean functions
Boolean functions
authentication
authentication
elliptic curve keys
IPsec
IPsec

Alberti encryption
Secure Socket Layer
filter generator
Boolean functions                           combination generator
authentication
Boolean functions                           combination generator
number field
exhaustive key search
secret sharing scheme
nonlinearity of Boolean functions           cyclic codes
maximum-length linear sequence              cyclic codes
zero-knowledge

clock-controlled generator
ABA digital signature guidelines
differential cryptanalysis                  boomerang attack
Boolean functions
elliptic curve discrete logarithm problem
intrusion detection
anonimity
privacy
public key proxy encryption                 public key proxy signatures
MIX networks
MIX networks
RSA digital signature scheme                security standards activities
EMV
maximum-length linear sequence              cyclic codes
privacy
digital signature schemes
EMV
EMV
key management
X.509
signcryption
group                                       ring
key                                         public key cryptography
public key proxy encryption
public key proxy signatures
watermarking
computational complexity
self-synchronizing stream cipher
Proton                                      MONDEX-scheme
attribute management                        authorization architecture


policy
identity management
authenticated encryption
station-to-station protocol
authorization architecture          Ipsec
identification                      trust model
authentication
IPsec
identity management
biometrics

key management
identity management                 key management
cryptology                          authenticated encryption
web security
authorization management            access control
SPKI/SDSI


authorization architecture
policy

key
MONDEX-scheme                       Proton
electronic payment
electromagnetic attack
SPKI/SDSI
structural encryption               substitution-permutation (SP) network
discrete logarithm problem
group key agreement
MARS
Boolean functions                   correlation-immune and resilient Boolean functions
maximum-length linear sequence
generator
key
lattice
trust model
knapsack cryptographic schemes
Pretty Good Privacy
cyclic codes
identitybased cryptosystems

Beaufort encryption
nonlinearity of Boolean functions   maximum-length linear sequence


RSA public-key encryption
fixed-base exponentiation
substitution
substitution
identitybased cryptosystems
Bolero.net
alphabet


finite field
binary Euclidean algorithm
signcryption

credentials

substitution
hash function
integer factoring
alphabet
Serpent
side-channel analysis
Bolero.net
hash function
traitor tracing
X.509
blinding techniques


watermarking
substitution
substitution
cyclic codes
shortest vector problem                         lattice reduction
Twofish

E0 (Bluetooth)

pseudo-random number generator

Rabin cryptosystem

known plaintext attack
identity based cryptosystems
Wiener, Boneh-Durfee and May attacks on the RSA public key cryptosystem

differential cryptanalysis
FIPS 140
computational complexity
group
AES/Rijndael
knapsack cryptographic schemes
knapsack cryptosystem
trust model

cryptanalysis
group key agreement
Boolean functions
policy
alphabet
Certification Authority

NESSIE project
Security Evaluation Criteria
SPKI/SDSI
access control                                  credentials
access control
key escrow                                      Skipjack
SPKI/SDSI
electronic wallet
SET
SET
Fermat primality test                  integer factoring
product cipher, superencryption        multiple encryption
access control
related key attack
modes of operation of a block cipher
modes of operation of a block cipher
MAC algorithms
FIPS 140
Cramer-Shoup public key scheme

authenticated encryption
de Bruijn sequence
EMV
Decisional Diffie Hellman              identitybased cryptosystems
sequences
electronic postage
EMV standard                           electronic wallet

Certification Authority
trust model


trust model
ABA digital signature guidelines
CPS, Certificate Practice Statement

certificate revocation                 time-stamping
time stamping
Trusted Third Party                    key management

modes of operation of a block cipher
integer factoring
web security

hash function
MAC algorithms                         CBC-MAC and variants
group key agreement
digital steganography
naam veranderen                        identity verification protocol
digital steganography                  information theory
differential-linear attack             finite field
maximum-length linear sequence         sequences

undeniable signature

elliptic curves
knapsack cryptosystem
cryptanalysis                          block cipher
digital steganography
oblivious transfer
cryptanalysis                          block cipher
related key attack
modes of operation of a block cipher
modes of operation of a block cipher
Secure Socket Layer
cryptosystem
cryptosystem                                    Shannon’s model
cryptanalysis
cryptanalysis                                   block cipher
modes of operation of a block cipher
identification
symmetric cryptosystem                          key

claw-free
access control
Secure Socket Layer
key escrow                                      Skipjack



group                                            ring
Secure Socket Layer
Data Encryption Standard (DES)
secure signatures from the "strong RSA" assumption
CBC-MAC and variants
Bolero.net
S/MIME
FIPS 140
traitor tracing                                  fingerprinting
identity based cryptosystems
cyclic codes                                     secret sharing schemes

sequences
cyclic codes
prime number
MAC algorithms
multi-set attack                                MAC algorithms
hash function
hash function

hash function
fingerprinting

EMV
modes of operation of a block cipher
threshold cryptography
Schnorr Identification                          non-malleability
commitment
Security Evaluation Criteria                    FIPS 140
CEPS standard                                   electronic wallet
non-interactive proofs

group key agreement
group                                           ring
MAC algorithms
de Bruijn sequence
slide attack
Data Encryption Standard (DES)
access control
interactive proof
computational complexity
non-linear feedback shift register
prime number                                pseudoprime
Paillier encryption and signature schemes
hash function                               MAC algorithms
cryptanalysis

radio frequency attacks
multiparty computation

Decisional Diffie Hellman                   identitybased cryptosystems
security
interactive argument
digital steganography
interactive argument
zero-knowledge
Trojan horses, computer viruses and worms
signcryption
computational complexity
zero-knowledge
filter generator
information theory
group key agreement
electronic cash                             electronic payment
designated confirmer signature
undeniable signature
block cipher                                substitution-permutation (SP) network
cyclic codes
modular arithmetic
linear feedback shift register
SPKI/SDSI
credentials
copy protection
broadcast encryption
copy protection
integer factoring

visual secret sharing scheme

symmetric cryptosystem                      key
zero-knowledge
undeniable signature
web security
copy protection
copy protection

watermarking
Bolero.net
MARS
Pretty Good Privacy
hash function

correlation attack for stream ciphers
correlation-immune and resilient Boolean functions combination generator
modes of operation of a block cipher
electronic cash                                    electronic payment
watermarking

digital steganography
collision resistant hash function                 Universal One-Way Hash Functions (UOWHF)
broadcast encryption
ABA digital signature guidelines
Paillier encryption and signature schemes
policy                                            identity -based encryption
hash function
certificate revocation                            SPKI/SDSI
known plaintext attack
penetration testing                               FIPS 140
certificate revocation                            time-stamping

trust model
Playfair cipher
MIX networks                                      privacy
Chinese Remainder Theorem

FIPS 140
S/MIME
hardware security module
FIPS 140
protocol
cryptology




SPKI/SDSI
Cramer-Shoup public key scheme
penetration testing                               FIPS 140
copy protection
Security Evaluation Criteria
modes of operation of a block cipher
cryptology
SET

closest vector problem
authorization architecture
group                                             generator

cyclic codes
cyclic codes
integer factoring
cyclic codes
prime number
alphabet
authentication
NESSIE project

key encryption key
side-channel analysis
MAC algorithms

MAC algorithms
Data Encryption Standard (DES)
hash function

Paillier encryption and signature schemes
EMV
ABA digital signature guidelines                   identitybased cryptosystems
impossible-differential attack
de Bruijn sequence

cryptanalysis
replay attack
maximum-length linear sequence                     shrinking generator
encryption
access control
Paillier encryption and signature schemes
identitybased cryptosystems
biometrics
block cipher                                       linear cryptanalysis for block ciphers
encryption                                         Shannon’s model
cryptosystem

encryption
MAC algorithms
Triple DES
probabilistic primality test
extension field                                    number field
certificate revocation
certificate revocation
access control                                     SPKI/SDSI
maxims
NESSIE project
electromagnetic attack
alphabet

DC network                                         firewall
knapsack cryptographic schemes
cryptanalysis
propagation characteristics of Boolean functions   Boolean functions

FIPS 140
threshold signature

cyclic codes
Data Encryption Standard
knapsack cryptographic schemes

fault attack
Diffie-Hellman problem
dictionary attack

password                                           electromagnetic attack
filter generator
differential cryptanalysis
differential-linear attack
differential-linear attack

electromagnetic attack
fault attack

weak keys
side-channel analysis                               invasive attacks


block cipher                                        substitution-permutation (SP) network
identity management
copy protection
rights management                                   copy protection
digital signature schemes                           digital signature guidelines
digital signature standard
non-repudiation
RSA digital signature scheme                        EMV


watermarking
watermarking
substitution
trust model
inversion in finite fields
electronic payment
Boolean functions                                   cyclic codes
discrete logarithm problem

access control
elliptic curves
prime number
cyclic codes
time-memory tradeoff
miss-in-the-middle attack                          impossible-differential attack
block cipher
linear cryptanalysis for stream ciphers
denial of service
verifiable secret sharing
ring
correlation-immune and resilient Boolean functions
secure sigantures from the "strong RSA" assumption
integer factoring
discrete logarithm problem
copy protection
intrusion detection
elliptic curve keys
denial of service                                  intrusion detection
binary exponentiation
key
DES                                                triple DES
time-memory tradeoff
differential power analysis                        side-channel analysis
certificate revocation
certificate revocation
copy protection
copy protection
MAC algorithms
Digital Signature Standard
non-repudiation
Digital Signature Standard
FIPS 140
cyclic codes
watermarking
multiparty computation
authorization architecture
EMV
EMV
group signature
traitor tracing
authenticated encryption

Common Criteria
knapsack cryptographic schemes
smartcard tamper resistance
authenticated encryption
fair exchange
modes of operation of a block cipher
elliptic curve cryptography                    cyclic codes

elliptic curve discrete logartihm problem
elliptic curve signature schemes               NESSIE project
Elliptic Curve public-key encryption schemes
copy protection                                watermarking
prime number
subgroup cryptosystems
knapsack cryptographic schemes
SPKI/SDSI                                      PGP
Triple DES
group key agreement
firewall
invasive attacks
radio frequency attacks


modes of operation of a block cipher
electronic cash
acquirer                                       issuer
copy protection                                watermarking
Triple DES
electronic payment

random bit generation (hardware)


electronic wallet


prime number
Elliptic Curve public-key encryption schemes




prime number




electromagnetic attack
authenticated encryption                           CBC-MAC and variants
radio frequency attacks
electronic wallet                                  MAC algorithms
IPsec
encryption
authenticated encryption
copy protection
Shannon’s model
cryptosystem

encryption                                         public key cryptography
encryption
authenticated encryption
SPKI/SDSI                                          PGP
cryptosystem
access control                                     policy
crypto machines
entitlements management


information theory                                 pseudo-random number generator
fingerprinting
MAC algorithms
side-channel
propagation characteristics of Boolean functions
key agreement                                      perfect forward secrecy / PFS
modular arithmetic
information theory
threshold signature
cyclic codes
IPsec
authenticated encryption

secure signatures from the "strong RSA" assumption
prime number
Euler's totient function
prime number
modular root                                     RSA public-key encryption
Euler's totient function                         modular arithmetic
Common Criteria
policy
slide attack
fingerprinting
trust model
                    group signature
                    cryptanalysis                                        block cipher
                    MAC algorithms
                    Data Encryption Standard (DES)
                    trust model
                    computational complexity

                    group
                    right-to-left exponentiation
                    Euclidean algorithm
                    hash function
                    extension field

                    optimal extension fields
                    MAC algorithms
                    discrete logarithm problem                           integer factoring
                    integer factoring

                    computational complexity

                    blind signature
                    contract signing
                    multiparty computation
                    biometrics
                    digital signature
                    biometrics

                    FEAL
                    invasive attacks
                    smartcard tamper resistance
                    radio frequency attacks
                    RSA digital signature scheme                         Rabin digital signature scheme

                    biometrics
                    FIPS 140
                    identity management
                    linear feedback shift register
                    linear feedback shift register
                    non-linear feedback shift register                   linear feedback shift register
                    non-linear feedback shift register
                    Fiat-Shamir identification protocol and Fiat-Shamir signature scheme

                     prime number
                     integer factoring                                   pseudoprime
                     pseudo Mersenne prime
                     integer factoring                                   prime number
                     invasive attacks
                     broadcast encryption
hamir signature scheme
                     finite field


                    firewall
                    copy protection                                      digital steganography
                    fingerprinting
                    field
SHA family (Secure Hash Algorithm)               pseudo-random number generator

secure sigantures from the "strong RSA" assumption
fixed-base exponentiation
fixed-base exponentiation
exponentiation algorithms
fixed-base exponentiation
exponentiation algorithms
hash function
identification
secure signatures from the "strong RSA" assumption
random bit generation (hardware)
denial of service
intrusion detection
invasive attacks

MAC algorithms
Skipjack
MARS
group key agreement
group signature                                  threshold signature
MIX networks
resynchronization attack
resynchronization attack
A5/1
cryptanalysis
Needham-Schroeder protocols                      group key agreement
elliptic curve discrete logarithm problem
prime number
non-linear feedback shift register
identity based cryptosystems
Rabin digital signature scheme                   RSA digital signature scheme
penetration testing
filter generator
sieving in function fields
prime number
field

signcryption
threshold signature                              identitybased cryptosystems
index-calculus method
greatest common divisor
group key agreement
related key attack
pseudo-random number generator
inversion attack
generalized Mersenne prime

Number Field Sieve
number theory
exponentiation algorithms
knapsack cryptographic schemes
Feistel cipher

cyclic codes
cyclic codes
random oracle model
secure sigantures from the "strong RSA" assumption
lattice
elliptic curve discrete logarithm problem
maxims
group key agreement
block cipher
invasive attacks

Number Field Sieve
Pretty Good Privacy
security standards activities
cyclic codes
maximum-length linear sequence

filter generator
pseudo-random number generator
McEliece public key cryptosystem

NESSIE project
knapsack cryptographic schemes

substitution
filter generator

group
group key agreement

group key agreement
verifiable encryption
SPKI/SDSI
ring
group key agreement

A5/1
identity based cryptosystem
Boolean functions
crypto machines
elliptic curve point multiplication using halving
elliptic curve point multiplication using halving
proof of knowledge vs proof of membership
Boolean functions                                   non-linearity of Boolean functions
Boolean functions                                   cyclic codes
Secure Socket Layer


authenticated encryption
time stamping

hash function
elliptic curves
hash function
authorization architecture
time-memory tradeoff
radio frequency attacks
lattice reduction
web security
signcryption
identification
electromagnetic attack
non-malleability
authenticated encryption                           MAC algorithms
key
threshold cryptography

encryption
multiparty computation
web security
Hardware Security Module
firewall

sieving in function fields
firewall
authenticated encryption
authenticated encryption
identity based encryption                          identity-based cryptosystems
electronic postage
identity-based cryptosystems
fault attack
security standards activities
intrusion detection

cyclic codes
hash function
fingerprinting
entity authentication
identity management
group                                                ring
Fiat-Shamir identification protocol and Feige Fiat-Shamir signature scheme


identity-based cryptosystems
group signature

identity management
identity management
identification

intrusion detection
secret sharing schemes
security standards activities
security standards activities
certification authority                            IPsec
radio frequency attacks
IPsec
IPsec
linear cryptanalysis for block ciphers
authentication
differential cryptanalysis

Data Encryption Standard (DES)
cryptanalysis
hash function
semantic security
Cramer-Shoup public key scheme
information theory
Data Encryption Standard (DES)
discrete logarithm problem             references are needed here
cryptanalysis
electronic payment
semantic security
designated confirmer signature         undeniable signature
key
side-channel analysis
electronic postage
digital steganography
authentication
side-channel analysis
cyclic codes
Security Evaluation Criteria
security

group key agreement
firewall
trust model
trust model
initial policy set
linear feedback shift register
hash function                          modes of operation of a block cipher
certified mail                         contract signing
modes of operation of a block cipher
modes of operation of a block cipher
boomerang attack
signcryption

multi-set attack
authentication                         credentials
authenticated encryption
authenticated encryption
verifiable secret sharing


modes of operation of a block cipher
simultaneous exponentiation
MAC algorithms
X.509
certification authority                IPsec
IPsec
IPsec                                  firewall
IPsec

web security                           may become separate entry
intrusion detection
maximum-length linear sequence

group
Boolean functions
designated confirmer signature             undeniable signature
Feistel cipher                             Data Encryption Standard (DES)
IPsec                                      firewall
side-channel analysis
IDEA
security standards activities              MAC algorithms

IPsec                                      HMAC
Common Criteria                            EMV
cryptanalysis
cryptanalysis
SPKI/SDSI                                  electronic wallet
Itoh-Tsujii inversion algorith
block cipher
block cipher
hash function
knapsack cryptographic schemes
product cipher, superencryption            Skipjack

Security Evaluation Criteria
PKIX - Public Key Infrastructure (X.509)   X.509
hash function                              modes of operation of a block cipher
prime number

web security
web security
security standards activities
linear consistency attack
Karatsuba algorithm
maxims
cryptanalysis
multi-precision multiplication
cryptanalysis
KASUMI/MISTY1

elliptic curve signature schemes
Trusted Third Party                        key management
NESSIE project
key management
maxims                                     block cipher
Shannon’s model                            digital steganography

key

key authentication
Data Encryption Standard (DES)
key
Trusted Third Party                        key management
NESSIE project
key management

protocol
protocol                                   key encryption key
digital signature schemes                  public key cryptography
DC network
key

Data Encryption Standard (DES)
key
policy
key
differential-linear attack                          linear cryptanalysis for block ciphers
key escrow
identity-based encryption                           broadcast encryption
MAC algorithms
block cipher
Shannon’s model
running-key
key
cryptosystem                                        key
token
control vector
key encryption key
miss-in-the-middle attack                           impossible-differential attack
covert channel
interpolation attack

knapsack cryptosystem
proof of knowledge vs proof of membership
cryptanalysis                                       block cipher
related key attack
Quadratic Sieve
ECC challenges                                      elliptic curve discrete logarithm problem
lattice reduction
signcryption
knapsack cryptosystem
interpolation attack
subgroup                                            RSA public-key encryption
elliptic curve point multiplication using halving
proof of knowledge vs proof of membership
alphabet
cryptanalysis
knapsack cryptographic schemes
knapsack cryptographic schemes
Number Field Sieve

broadcast encryption
Jacobi symbol
modes of operation of a block cipher
least common multiple
security standards activities

binary exponentiation                               right-to-left exponentiation
identity management

Euclidean algorithm
visual secret sharing scheme
lattice reduction
knapsack cryptographic schemes
linear feedback shift register
copy protection
policy
linear cryptanalysis for block ciphers
differential-linear attack               linear cryptanalysis for block ciphers
cyclic codes
de Bruijn sequence                       Berlekamp- Massey algorithm
linear complexity




linear complexity

linear cryptanalysis for block ciphers
linear cryptanalysis for block ciphers
integer factoring                        Number Field Sieve
secret sharing schemes
Boolean functions
substitution

time stamping
differential-linear attack
broadcast encryption
shortest vector problem                  lattice reduction

block cipher
denial of service
policy
key management                           Registration Authority
broadcast encryption
denial of service
identity management
broadcast encryption
knapsack cryptographic schemes
Registration Authority                   key management
broadcast encryption

subgroup cryptosystems
prime number
prime number
Data Encryption Standard (DES)           product cipher, superencryption
MAC algorithms
authentication                           firewall

CBC-MAC and variants                     MAC algorithms
MAC algorithms
authenticated encryption
MAC algorithms
IPsec
multiparty computation
electronic voting schemes                non-malleability
access control

physical attacks
hash function
copy protection
fingerprinting

hash functions
copy protection

block cipher                                    modes of operation of a block cipher
biometrics
linear cryptanalysis for block ciphers
cyclic codes
prime number
pseudo-random number generator
maxims

Boolean functions
cyclic codes

non-linear feedback shift register
Wiener, Boneh-Durfee and May attacks on the RSA public key cryptosystem

group key agreement
hash function

MD4-MD5
hash function
cyclic codes
hash function
MAC algorithms
firewall
hash function
pseudonyms
weak keys
filter generator                                inversion attack
SET
hash function                                   SHA family
knapsack cryptographic schemes
knapsack cryptographic schemes
knapsack cryptographic schemes
hash function
time stamping
prime number                                    Mersenne prime

MAA                                             MAC algorithms
authentication                                  MAC algorithms
key
MIX networks
digital signature schemes
CRYPTREC
hash function
smartcard tamper resistance
integer factoring                               number theory
Secure Socket Layer
web security                                    S/MIME

cyclic codes
cyclic codes
lattice reduction
shortest vector problem                lattice reduction


intrusion detection
KASUMI/MISTY1                          NESSIE project
alphabet

hash function
web security
authenticated encryption

physical attacks
modular arithmetic
number theory
modular arithmetic                     exponentiation algorithms
modular arithmetic
modular arithmetic

modular arithmetic
electronic wallet                      MAC algorithms
physical attacks
Reed-Muller codes
access structure                       secret sharing scheme
forgery

Montgomery arithmetic
Montgomery arithmetic
Montgomery arithmetic
Montgomery arithmetic
Montgomery arithmetic
substitution
Montgomery arithmetic

integer factoring
CRYPTREC
Quadratic Sieve
elliptic curve key agreement schemes
Boolean functions                      correlation-immune and resilient Boolean functions
maximum-length linear sequence
authenticated encryption
RSA public-key encryption
simultaneous exponentiation
maximum-length linear sequence
substitution

cryptanalysis
electromagnetic attack
meet-in-the-middle attack              structural encryption
Quadratic Sieve
computational complexity               multi-precision multiplication
group                                  ring
modular arithmetic
knapsack cryptographic schemes
threshold cryptography
group signature                                     threshold signature
identity verification protocol
elliptic curve point multiplication using halving   signed digit exponentiation
SPKI/SDSI
trust model
identification
Cramer-Shoup public key scheme
fingerprinting
Data Encryption Standard (DES)
Data Encryption Standard (DES)
closest vector problem
generalized Mersenne prime

access control
crypto machines

SPKI/SDSI
NESSIE project
Number Field Sieve

FIPS 140                                           Common Criteria
non-malleability
correlation-immune and resilient Boolean functions
non-linear feedback shift register
elliptic curve point multiplication using halving  signed digit exponentiation
watermarking
Challenge-Response Identification
cryptanalysis
group
group
non-malleability
zero-knowledge
smartcard tamper resistance


Boolean functions
semantic security
RSA digital signature scheme
fail-stop signature                                 contract signing

de Bruijn sequence
linear feedback shift register
credentials                                         designated confirmer signature
Itoh-Tsujii inversion
NESSIE project
digital signature
computational complexity
computational complexity
Montgomery arithmetic
lattice-based cryptography
substitution
cryptology

discrete logarithm problem                          index-calculus method
RSA problem                                   Cramer-Shoup public key scheme
multiparty computation
electronic wallet
authenticated encryption
PKIX - Public Key Infrastructure (X.509)      certification authority
finite field                                  optimal extension fields
optimal extension fields
modes of operation of a block cipher
credentials                                   electronic payment
EMV
EMV
authenticated encryption
group key agreement
EMV
authenticated encryption                      CBC-MAC and variants
O-notation
O-notation
blind signature                               Chaum blind signature
blind signature
key
key

knapsack cryptographic schemes
time stamping
OAEP: Optimal asymmetric Encryption Padding   computational complexity
group key agreement
hash function
one-way function
MIX networks
credentials                                   electronic payment
EMV
EMV
PKIX - Public Key Infrastructure (X.509       certification authority
EMV

O-notation
public key proxy encryption                   public key proxy signatures
cryptology
security standards activities
authentication
OAEP: Optimal asymmetric Encryption Padding   RSA problem

contract signing
Security Evaluation Criteria
semantic security
modular arithmetic                            linear feedback shift register
oblivious transfer
key
modes of operation of a block cipher
auto-correlation
modes of operation of a block cipher
hash function                                 MAC algorithms
signcryption
hash function
computational complexity
privacy
resynchronization attack
MIX networks                                       encryption
Cramer-Shoup public key scheme

identity based cryptosystem
non-repudiation
authorization architecture
zero-knowledge
discrete logarithm problem
cyclic codes
cyclic codes
cyclic codes
Boolean functions
OAEP: Optimal asymmetric Encryption Padding
hash function
threshold signature
SPKI/SDSI
linear cryptanalysis for block ciphers
RSA factoring challenge
cryptanalysis                                      digital steganography
penetration testing
identity verification protocol
substitution
cryptanalysis
electronic payment
electronic payment
electronic cash                                    electronic payment
SET

propagation characteristics of Boolean functions
de Bruijn sequence
authorization policy                               authorization architecture

physical attacks
authorization architecture


information theory                                 threshold cryptography
digital steganography
zero-knowledge
key
maximum-length linear sequence                     sequences
auto-correlation
policy
trust model
substitution                                       Data Encryption Standard (DES)

electronic wallet
identity management
pseudonyms

IDEA
perfect forward secrecy / PFS
Pretty Good Privacy
random bit generation (hardware)

physical attacks                              web security
linear cryptanalysis for block ciphers
personal identification number
EMV
OAEP: Optimal asymmetric Encryption Padding   RSA digital signature scheme
identity-based encryption                     identity-based cryptosystems
Public Key Infrastructure                     PKIX - Public Key Infrastructure (X.509)
non-repudiation
security standards activities                 certificate revocation
cryptosystem                                  Shannon’s model
semantic security
cryptanalysis
cryptanalysis
privacy
copy protection

web security
authenticated encryption                      MAC algorithms
pseudo noise sequence
discrete logarithm problem
elliptic curves
elliptic curves
elliptic curves
signed digit exponentiation                   elliptic curve point multiplication using halving
CEPS-standard
authorization architecture
authorization architecture
trust model
identity management
authorization policy                          authorization architecture
authorization architecture
trust model
trust model
discrete logarithm problem
discrete logarithm problem
integer factoring
integer factoring                             discrete logarithm problem
key
key

substitution
extension field
polynomial time
polynomial time
computational complexity

encryption
solitaire

Porta encryption
CEPS-standard
electronic postage
side-channel analysis
differential power analysis
Common Criteria                                    FIPS 140
side-channel analysis
MIX networks
linear congruential generator
hash function
electronic payment
non-linear feedback shift register

computational complexity
prime number

certificate of primality
field
elliptic curve discrete logarithm problem
prime number

prime number                                       number theory
field                                              modular arithmetic
key
cyclic codes

primitive element
generator
cyclic codes
cyclic codes
authenticated encryption                           identity management
PEM, Privacy Enhanced Mail
privacy
symmetric cryptosystem                             key
identity-based encryption                          identity-based cryptosystems
watermarking
privilege management                               identity management

pseudo-random number generator
group signature                                    threshold signature
computational complexity


secret sharing schemes
signcryption
RSA problem                                        RSA digital signature scheme
prime number                                       probabilistic primality test
encryption

proof of knowledge vs proof of membership
Boolean functions
propagation characteristics of Boolean functions
IDEA
access control
Common Criteria                                    FIPS 140

MAC algorithms
prime number
authenticated encryption
interactive proof                                  SPKI/SDSI
identity management
public key proxy encryption
public key proxy signatures
CEPS-standard
electronic postage
NESSIE project
signcryption

???
Twofish

anonimity
privacy
prime number
DES-X

Luby-Rackoff cipher
Golomb's randomness postulates
RSA problem                                          RSA digital signature scheme
signcryption                                         RSA digital signature scheme
Fiat-Shamir identification protocol and Feige Fiat-Shamir signature scheme
certificate

PKCS



digital steganography
watermarking
verifiable secret sharing
watermarking
CEPS-standard
cryptosystem
de Bruijn sequence
MONDEX-scheme
Berlekamp Q-matrix
Quadratic Residuosity Problem
Quadratic Sieve
number theory
quadratic residue

Jacobi symbol

integer factoring                                  number theory
differential-linear attack
alphabet

IPsec
Registration Authority


prime number
Miller-Rabin test                                  integer factoring
NESSIE project

time-memory tradeoff
secret sharing schemes

key
random bit generation (hardware)

hash function
integer factoring
computational complexity
Golomb's randomness postulates
key
McEliece public key cryptosystem
elliptic curves
RC4                                                  related key attack



modes of operation of a block cipher
password
electronic voting schemes
deniable encryption

recipient anonymity
Secure Socket Layer
differential cryptanalysis                           Camelia
lattice reduction
irreducible polynomial
computational complexity
OAEP: Optimal asymmetric Encryption Padding
information theory

cyclic codes

group key agreement                                  group key agreement

communication channel anonymity
pseudonyms


electronic cash                                      electronic payment
certificate                                          SPKI/SDSI
denial of service
key
IPsec                                                code book attack
identity management                                  time stamping
elliptic curve point multiplication using halving
PKIX - Public Key Infrastructure (X.509)             PEM, Privacy Enhanced Mail
zero-knowledge
modular arithmetic                                   Euler's totient function
correlation-immune and resilient Boolean functions   combination generator
correlation-immune and resilient Boolean functions   Boolean functions


???
alphabet
credentials
broadcast encryption                                 identity-based encryption
radio frequency attacks
PEM, Privacy Enhanced Mail                     PKIX - Public Key Infrastructure (X.509)
rights management                              policy

binary exponentiation                          k-ary exponentiation
AES/Rijndael

homomorphism
NESSIE project
MAC algorithms                                 hash function
trust model
EMV
CBC-MAC and variants                           MAC algorithms
threshold signature                            multiparty computation
maxims
access control
SET
crypto machines
product cipher, superencryption                group key agreement
block cipher                                   hash function
group key agreement
relying party                                  SPKI/SDSI
cyclic codes
RSA public-key encryption                      RSA problem
Wiener, Boneh-Durfee and May attacks on the RSA public key cryptosystem
RSA public-key encryption                      RSA digital signature scheme


NESSIE project
RSA factoring challenge
RSA public-key encryption
NESSIE project

Bolero.net

key
computational complexity
maximum-length linear sequence
IPsec
Boolean functions
IPsec
OAEP: Optimal asymmetric Encryption Padding
trust model

related key attack                             truncated differentials
policy

privacy
multiset attack
elliptic curve keys
Twofish                                        multi-set attack
radio frequency attacks
group key agreement
signed digit exponentiation                    group
invasive attacks
elliptic curve keys
EMV
watermarking
SPKI/SDSI
SPKI/SDSI

hash function
cryptology
symmetric cryptosystem               key

password
Shannon's model
watermarking
SET                                  electronic payment
SHA family (Secure Hash Algorithm)
HTTPS, secure HTTP
MAC algorithms
SSH

SSH
authenticated encryption
authenticated encryption

IPsec
IPsec
privacy
penetration testing

IPsec
access control
FIPS 140
hardware security module
computational complexity             security
IPsec
web security
IPsec
authenticated encryption
penetration testing                  Common Criteria
pseudo-random number generator
MAC algorithms
Quadratic Sieve
substitution
RSA problem


policy
invasive attacks
electromagnetic attack
cryptology
non-malleability
multiparty computation
Data Encryption Standard (DES)

deniable encryption
access control
intrusion detection
biometrics

zero-knowledge

Secure Socket Layer
key                                                  perfect forward secrecy / PFS
pseudonyms
electronic payment
SPKI/SDSI
NESSIE project
radio frequency attacks
NESSIE project
NESSIE project

knapsack cryptographic schemes
knapsack cryptographic schemes
discrete logarithm problem
maxims

information theory
information theory

secret sharing schemes
interpolation attack
prime number
maximum-length linear sequence
alphabet
maximum-length linear sequence
multi-precision multiplication
BLS short digital signatures


electronic voting schemes


correlation-immune and resilient Boolean functions
prime number
sieving in function fields

impossible-differential attack
crypto machines
crypto machines
digital signature                                    digital signature schemes


fail-stop signature
Boolean functions
digital signature schemes
identity management
SPKI/SDSI
electromagnetic attack
differential power analysis                          invasive attacks
SPKI/SDSI
substitution                                         known plaintext attack
firewall
side-channel analysis                         electromagnetic attack
OAEP: Optimal asymmetric Encryption Padding

hard core bit
simultaneous exponentiation
identity management
cyclic codes
secret sharing schemes
key escrow
MAC algorithms
slide attack

slide attack

Data Encryption Standard (DES)
polynomial time
invasive attacks                              fault attack
security standards activities
smoothness                                    Quadratic Sieve
smoothness


firewall
truncated differentials
Number Field Sieve
web security
intrusion detection
authorization architecture
smartcard tamper resistance                   invasive attacks
prime number

safe prime
designated confirmer signature                undeniable signature
differential power analysis                   side-channel analysis
IPsec
Number Field Sieve
number theory
security standards activities
substitution-permutation (SP) network
substitution-permutation (SP) network         block cipher
denial of service                             firewall
binary exponentiation                         RSA public-key encryption
Camelia                                       multi-set attack
authentication
Quadratic Sieve
authenticated encryption
Secure Socket Layer (SSL)                     CRYPTREC
linear feedback shift register
alphabet
linear feedback shift register
firewall
broadcast encryption
group signature                               threshold signature
multiparty computation
EMV standard
EMV
block cipher
digital steganography
pseudo-random number generator
zero-knowledge
digital steganography                           cryptology
digital steganography
digital steganography
binary Euclidean algorithm
linear consistency attack
substitution
substitution
substitution
Boolean functions
prime number
authenticated encryption

prime number
number theory                                    prime number
                                                 RSA problem
secure signatures from the "strong RSA" assumption

differential-linear attack                      impossible-differential attack
station-to-station protocol

extension field
inversion in finite fields
optimal extension fields


SPKI/SDSI
covert channel
polynomial time
trust model
broadcast encryption
knapsack cryptographic schemes                  computational complexity
physical attacks                                Data Encryption Standard (DES)
authentication
substitution

substitution-permutation (SP) network
lattice reduction

Boolean functions
sieving in function fields
product cipher, superencryption                 encryption
cryptanalysis
knapsack cryptographic schemes
Luby-Rackoff cipher
elliptic curves
Boolean functions
shortest vector problem
MAC algorithms                                  Bolero.net
key                                             authenticated encryption
public key proxy encryption
public key proxy signatures
cryptanalysis
cyclic codes
block cipher
authentication                              SPKI/SDSI



hash function
filter generator
Universal One-Way Hash Functions (UOWHF)
fast correlation attack
FIPS 140
elliptic curve discrete logarithm problem   identity based cryptosystem
EMV
firewall
copy protection
Universal One-Way Hash Functions (UOWHF)
Security Evaluation Criteria
Triple DES
related key attack
radio frequency attacks
intrusion detection
alphabet
MAC algorithms
electromagnetic attack
alphabet
key management
O-notation
CBC-MAC and variants                        MAC algorithms
threshold cryptography

threshold cryptography
threshold cryptography
threshold cryptography
threshold cryptography
threshold cryptography
SPKI/SDSI
traitor tracing
threshold cryptography
Bolero.net
key management                              copy protection
key management
fingerprinting
key management                              certified mail

block cipher
MIX networks                                invasive attacks
Bolero.net
Transport Layer Security                    security standards activities
differential cryptanalysis
policy
FIPS 140

multi-precision multiplication
IPsec
block cipher                                blind signature
modular root
Bolero.net
elliptic curve point multiplication using halving   Boolean functions
group signature                                     threshold signature
Boolean functions                                   cyclic codes
fingerprinting
broadcast encryption
firewall
traitor tracing
copy protection                                     fingerprinting
pseudonyms
IPsec
IPsec
radio frequency attacks
forgery
public key proxy encryption                         public key proxy signatures
firewall
public key proxy encryption                         public key proxy signatures
security standards activities                       authenticated encryption
substitution                                        known plaintext attack
substitution
trapdoor one-way function
trapdoor one-way function
key
integer factoring                                   prime number
Data Encryption Standard (DES)
block cipher
virus protection
certified mail
differential cryptanalysis                          differential-linear attack
policy
access structure
Trusted Third Party
group key agreement
Security Evaluation Criteria
copy protection
group signature                                     threshold signature
password                                            FIPS 140
trust model

trust model
trust model
Boolean functions
Trusted Third Party
IPsec
authenticated encryption
TWIRL

authentication


block cipher
trust model

MAC algorithms                                      NESSIE project
IPsec
crypto machines
firewall
authenticated encryption                    NESSIE project
encryption
authentication
blind signature
security                                    authentication
chaffing and winnowing
electronic wallet
IPsec
designated confirmer signature              fail-stop signature
information theory                          block cipher
identity verification protocol
substitution
lattice-based cryptography
ring
blind signature
designated confirmer signature              undeniable signature
nonlinearity of Boolean functions
authentication
signcryption
pseudo-random number generator
digital steganography
undeniable signature                        designated confirmer signature
group signature
credentials
watermarking

commitment
Universal One-Way Hash Functions (UOWHF)

firewall
IPsec
security standards activities
lattice-based cryptography
time stamping
SPKI/SDSI
designated confirmer signature
fault attack
fixed-exponent exponentiation

MAC algorithms
MIX networks

digital signature schemes
biometrics
interactive proof                           identification

information theory
Vernam cipher
privacy

Vigenère encryption
radio frequency attacks
IPsec
Trojan horses, computer viruses and worms
                      Trojan horses, computer viruses and worms

                      alphabet
                      IPsec
                      verifiable secret sharing
                      visual secret sharing scheme
                      slide attack
                      identity management
                      electronic wallet                                  MONDEX-scheme
                      credentials
                      Boolean functions                                  correlation-immune and resilient Boolean functions
                      digital steganography                              fingerprinting
                      hash function
                      IDEA
                      OAEP: Optimal asymmetric Encryption Padding
                      web security
                      Pretty Good Privacy

                     web security
                     EMV
                     authenticated encryption
                     elliptic curves
                     cyclic codes
                     elliptic curve discrete logarithm problem
                     elliptic curve discrete logarithm problem           identity based cryptosystem
                     elliptic curves
                     authenticated encryption
                     hash function                                       NESSIE project
                     block cipher                                        side-channel analysis
                     fingerprinting
                     AES/Rijndael
                     elliptic curve point multiplication using halving
                     RC4
e RSA public key cryptosystem
                     chaffing and winnowing
                     authenticated encryption
                     RC4                                                 A5/1
                     probabilistic primality test                        time stamping

                      witness hiding
                      Trojan horses, computer viruses and worms          virus protection
                      security standards activities                      certificate revocation
                      elliptic curve discrete logarithm problem          index-calculus method
                      privacy
                      authenticated encryption                           CBC-MAC and variants
                      authenticated encryption                           MAC algorithms
                      security standards activities                      SPKI/SDSI
                      MAC algorithms
                      subgroup cryptosystems
                      pseudo-random number generator                     Skipjack
                      ring
                      identity verification protocol
                      interactive proof                                  zero-knowledge protocol
                      penetration testing
                      cryptanalysis
denial of service
Entry




authorization architecture




multiparty computation       digital steganography   eavesdropper
filter generator




pseudo-random number generator CBC-MAC and variants   Triple DES
identity management

authorization architecture




combination generator
number theory                    prime number




MAC algorithms                   Proton




trust model                      X.509




hash function


Schnorr Identification


linear feedback shift register




digital steganography
threshold cryptography




authentication




CLIP-scheme
CBC-MAC and variants   RIPEMD family




cryptology             public key proxy encryption   Ipsec
correlation attack for stream ciphers
irreducible polynomial   lattice




intrusion detection      radio frequency attacks




password
electromagnetic attack




digital signature standard




multi-precision multiplication




invasive attacks                 electromagnetic attack
MAC algorithms   NESSIE project

Proton




modular root     RSA public-key encryption
Number Field Sieve   Quadratic Sieve
HMAC                  Data Encryption Standard (DES)   Triple DES




group key agreement
cyclic codes
NESSIE project




privacy




time-stamping    SSH
IPsec   MAC algorithms
HMAC   MAA   time-stamping
k-ary exponentiation   sliding window exponentiation   signed digit exponentiation
knapsack cryptographic schemes




weak keys

EMV
EMV
finite field
                                Skipjack
SHA family (Secure Hash Algorithm)




certified mail



undeniable signature




integer factoring
electronic postage




MAC algorithms


forgery




trapdoor one-way function   pseudo-random function




electronic postage




CBC-MAC and variants
                                EMV
SHA family (Secure Hash Algorithm)




Shannon’s model                  multiparty computation   eavesdropper




Shamir’s threshold scheme        secret sharing scheme



linear feedback shift register



Luby-Rackoff cipher
authorization architecture


password                     threshold cryptography




pseudo prime
number theory
boomerang attack




group key agreement   threshold cryptography




X.509
MAC algorithms


sliding window exponentiation        signed digit exponentiation




watermarking




integral attack


elliptic curve point multiplication using halving
key management   group key agreement




policy           intrusion detection
interactive proof
invasive attacks    electromagnetic attack




key agreement       authorization architecture
CRYPTREC   MAC algorithms
maximum-length linear sequence

side-channel analysis            subgroup cryptosystems




miss-in-the-middle attack




verifiable encryption
group signature   threshold signature   undeniable signature




SPKI/SDSI
                                    F
correlation attack for stream ciphers ast correlation attack




BLS Short Digital Signatures



DES-X




trust model


MAC algorithms
modes of operation of a block cipher
RSA digital signature scheme
gned digit exponentiation
public key proxy signatures

								
To top