VIEWS: 0 PAGES: 154 POSTED ON: 5/7/2013
Encyclopedia of Cryptography and Security Index Index item A5/1 AAA AAC AAR AB ABA digital signature guidelines Abelian Abreast Davies-Meyer absence of communication attack absolute indicator abundance of communication attack abuse-free protocol Abwehr access control access control list access control model access control policy access management access matrix model access structure ACEKEM accumulator ACH ACL A-code A-distance acquirer acrostics active active penetration test ActiveX adaptive adaptive chosen ciphertext attack adaptive chosen plaintext attack adaptive chosen plaintext and chosen ciphertext attack addition chain addition problem addition sequence addition-subtraction chain additive inverse additive knapsack additonal decryption key address spoofing Adleman-Pomerance-Rumely primality proving algorithm admissable change of variables Advanced Encryption Standard (AES) advantage adversary adversary structure advisory simulator AE AEAD AES affine equivalent affine functions affine invariant affine scheme AG-code AGM method aggressive mode AH Alberti encryption Alberti matrix alert message algebraic attack algebraic degree algebraic-geometry codes algebraic normal from algebraic number field all-or-nothing encryption allowed almost bent function almost perfect nonlinear function almost perfect zero-knowledge alphabet alternating step generator American Bar Association amplified boomerang attack ANF anomalous binary curves anomaly anonimity set anonym anonymity anonymous network anonymous remailers ANSI AP APN function APPEL appendix application cryptogram ARQC AS ASN1 associated data associativity asymmetric cryptosystem asymmetric proxy encryption asymmetric proxy signature scheme asymmetric watermarking asymptotic security asynchronous ATM attribute attribute certificate attributes management auctioneer role auditing authenticated encryption (OCB, IAPM, XCBC) authenticated encryption with associated data authenticated key exchange authentication authentication authority authentication code authentication header authentication provider authentication scheme authentication token authentication server authenticator authenticity Authenticode authorization authorization algebra authorization architecture authorization management authorization policy authorizer auto-correlation autokey automated teller machine automatic clearing house automatic template analysis availability avalanche baby-step giant-step method backward security backwards mixing balanced balance property base base key basis basic constraints extension basic Merkle-Hellman scheme Bass-O-Matic BCH code BDH Beaufort encryption Beaufort table bent function Berlekamp- Massey algorithm Berlekamp Q matrix Bézout BGMW method bigram bigram substitution bilinear Diffie-Hellman problem bill of lading binary alphabet binary Euclidean algorithm binary exponentiation binary field binary gcd algorithm binder binomial distribution biometric identification biometrics bipartite substitution birthday attack birthday paradox bit bitslice bit tracing B/L black-box attack black-box tracing black list blinding factor blinding techniques blind signature blind watermarking block block cipher block code Block Korkine-Zolotarev reduction Blowfish BLS short digital signatures Bluetooth Blum integer Blum-Blum-Shub pseudorandom bit generator Blum-Goldwasser public key encryption system Blum prime Bolero.net bombs Boneh-Franklin identity based cryptosystems Boneh-Durfee attack Boolean functions boomerang attack boundary BPP braid group branch number Brickell Merkle-Hellman attack Brickell low density attack bridge certification authority broadcast encryption brute force attack Burmester-Desmedt protocol butterfly algorithm buyer role byte CA Caesar cipher Camellia Canadian Trusted Computer Product Evaluation Criteria canonical S-expressions capabilities capability list Capstone CAP theorem captured agent trust cardholder CA card issuer Carmichael number cascade cipher cascading revocation CAST CBC CBCN CBC-MAC and variants CC CCA2 CCIT-2 CCM CCR CDA CDH CDMA centralized system CEPS-standard certificate certificate authority certificate extension certificate management certificate of primality certificate policy certificate policy statement Certificate Practice Statement certificate revocation certificate revocation list certification certification authority certified mail CFB CFRAC CGI chaffing and winnowing chaining attack chaining variable chair challenge covertext challenge-response protocol channel characteristic characteristic polynomial Chaum blind signature scheme Chaum-van Antwerpen undeniable signature scheme Chinese Remainder Theorem chord-and-tangent rule Chor-Rivest cryptosystem chosen ciphertext attack chosen message attack chosen one-out-of-two chosen plaintext attack chosen plaintext and chosen ciphertext attack chosen related key Cipher Block Chaining Cipher FeedBack cipher suite cipher system ciphertext ciphertext ciphertext compromise ciphertext only attack ciphertext stealing claimant classical cryptosystem claw-free claw-resistant clearance level client hello Clipper CLIP-scheme clock-controlled generator closest vector problem closure closure alert closure attack CMA CMAC CMP CMS CMVP coalition Cock's identity based cryptosystem code code book attack code-division-multiple-access codeword Cohen-Lenstra-Bosma algorithm collision collision attack collision freeness collision intractable collision resistance Collision-Resistant Hash Function (CRHF) collusion attack combination generator combined data authentication combined modes combiner commitment commit phase Common Criteria Common Electronic Purse Specifications common reference string communication channel anonymity communication complexity commutative COMP128 complementary circulating register complementary slide complementation property complete mediation property completeness complexity class complexity spectrum composite composite residuosity assumption compression function compromise compromizing emanations Compton effect computable computational complexity computational Diffie Hellman computational security computational soundness computationally secure steganography computationally sound proof system computational zero-knowledge computer virus concealment concrete security concurrent zero-knowledge conditional correlation attack conditional entropy conference keying confidentiality confirmer signature confirming operation confusion conjugate congruence class connection polynomial consistency consumable credentials containing Content Protecion for Recordable Media content scrambling system continued fraction method contract signing contrast control vector conventional cryptosystem conversation convertible undeniable signature cookies copy generation control copy marking copy protection copy right protection Core Messaging Platform core rounds Corporate Message Recovery correcting-block attack correlation attack for stream ciphers correlation-immune and resilient Boolean functions correlation immunity order Counter Mode counterfeiting cover signal covert channel covertext CRHF CPRM CPS, Certificate Practice Statement CR credentials CRHF CRL cribs Critical Security Parameters CRL (CRLS) cross-correlation cross-certification crossing step crowds CRT cryptanalysis cryptographic boundary cryptographic message syntax cryptographic module cryptographic module validation program cryptographic protocol cryptography cryptology crypto machines cryptosystem CRYPTREC CSEXP CS-lite CSP CSS CTCPEC CTR cue customer acquirer cut-and-choose protocol CVP CWC cyclic cyclic codes cyclic codes with two zeros cyclic Reed-Muller code cycling attacks against RSA cyclotomic coset cyclotomy method Cyrillic alphabet data authentication data encapsulation mechanism Data Encryption Standard (DES) data key data masking data origin authentication data remanence Data Seal Davies attack Davies-Meyer DC Network DCR DDA DDH DEAL deBruijn graph de Bruijn sequence de Viaris attack deception decimation deciphering decision function decisional composite residuosity assumption decisional Diffie-Hellmann problem decision-making module decorrelation decryption decryption algorithm decryption exponent decryption steps DECT Deep Crack definitely composite degree delegated path discovery delegated path validation delegation Della Porta's maxim DEM DEMA denary alphabet deniable encryption denial-of-service density depth derivative derived key Derived Test Requirements designated combiner designated confirmer signature designed minimum distance DES Desmedt-Vandewalle-Govaerts knapsack DES-X DFA DHP dictionary dictionary attack (1) dictionary attack (2) difference set difference distribution table differential differential characteristic differential cryptanalysis differential electromagnetic analysis differential fault analysis differential-linear attack differential membership test differential power analysis Diffie-Hellman key agreement Diffie-Hellman problem diffusion digital identity digital millenium copyright act digital rights management system digital signature digital signature algorithm digital signature guidelines digital signature schemes Digital Signature Standard digital steganography digital versatile disk digital video disk digraphic substitution direct cross-certification direct inversion direct payment scheme discrete Fourier transform discrete logarithm discrete logarithm problem discretionary access control discriminant Disquisitiones Arithmeticae distance distinguished points distinguisher distinguishing algorithm distinguishing attack distributed DoS attack distributed key generation distributivity divide-and-conquer attack division intractable Dixon's random squares methods DLP DMCA DMZ domain parameters DoS double-and-add double key double-DES DP DPA DPD DPV DRM DRMS DAAA DSA DSG DSS DTR dual code DVD dynamic adversary dynamic attribute dynamic authentication dynamic data authentication dynamic group signature scheme dynamic traitor tracing E&M E0 (Bluetooth) EAL easy eavesdropper EAX Ebay ECB ECC ECC challenges ECDLP ECDSA ECIES ECMS ECPP ECSTR ED EE efficiency efficiency egress filtering electromagnetic attack electromagnetic pulse electronic cash electronic cheque electronic codebook mode (ECB) electronic coin electronic commerce electronic copyright management system Electronic Frontier Foundation electronic funds transfer electronic negotiable instruments electronic noise source electronic payment electronic postage electronic purse electronic voting schemes electronic wallet Elements ElGamal digital signature scheme ElGamal public key encryption elliptic curve cryptography elliptic curve discrete logarithm problem elliptic curve integrated encryption scheme elliptic curve key agreement schemes elliptic curve keys elliptic curve method elliptic curve point multiplication using halving elliptic curve primailty proving algortihm elliptic curve public-key encryption schemes elliptic curves elliptic curves for primality proving elliptic eurve signature schemes EMA EMAC EMP EMV encapsulating security payload enciphering Encrypt-and-MAC encrypt copyrighted content encryption encryption algorithm encryption exponent encryption key encryption step Encrypt-then-MAC end entity endomorphic cryptosystem enforcement Enigma entitlement entitlements management entity authentication entropy envelope envelope MAC environmental analysis EPC ephemeral equivalent equivocation erasure-free error-correcting code ESP EtM Euclidean algorithm EU-CMA Euler liar Euler's phi function Euler pseudoprime Euler's totient function Euler's theorem evaluation assurance level evaluation of policy Even-Mansour exact identification excluded subtrees exculpability scheme exhaustive key search existential forgery expansion explicit policy indicator exponential security exponential time exponentiation exponentiation algorithms extended Euclidean algorithm extended MD4 extension degree extension field extension field operations external collision factor base factoring factoring circuits FACTORING problem fail-stop signature fair blind signature fair exchange fairness false accept error false positive false reject error fast correlation attack fast data encryption algorithm fault attacks fault generation FCG FDH FEAL feature extraction module Federal Information Processing Standard federation feedback bit feedback coefficients feedback function/polynomial feedback shift register Feige-Fiat-Shamir signature scheme Feistel cipher Fermat liar Fermat primality test Fermat prime Fermat's little theorem FIB Fiat-Naor construction Fiat-Shamir identification protocol and Fiat-Shamir signature scheme field field polynomial filter generator filtering (packets) fingerprinting fingerprinting code finite field FIPS firewall Fischlin scheme fixed-base comb method fixed-base Euclidean method fixed-base exponentiation fixed-base windowing method fixed-exponent exponentiation fixed point attack flat namespace flexible RSA assumption flip-flop metastability source flooding DoS attack flow focused ion beam forgery forgery attack Fortezza forward mixing forward secrecy forward security fragmentation frame frame counter frame number frequency matching freshness Frobenius map Frobenius-Grantham primality test FSR Fujiwara-Okamoto transformation full-domain hash method full-knowledge prenetration test full positive difference set function field fundamental theorem of arithmetic Galois field gap gap Diffie-Hellman assumption+A604 gap Diffie-Hellman group Gaussian integer method gcd GCDH assumption G-DES Geffe generator generalized inversion attack generalized Mersenne number generalized Mersenne prime general NFS general purpose primality test general exponentiation general knapsack scheme generalized Feistel generator generator matrix generator polynomial generic Gennaro-Halevi-Rabin scheme geometry of numbers GHS attack Givierge's maxim GKE global deduction glue logic design GMR signature GNFS GNU Privacy Guard GOC PKI Golay code Gold sequence Goldwasser-Micali encryption scheme Golomb ruler Golomb's randomness postulates Goppa codes GOST GPS Graham-Shamir scheme greatest common divisor grille Groebner basis group group axioms Group Computational Diffie-Hellman assumption group key agreement group key distribution group manager group names group of units group session key group signature GSM Guillou-Quisquater signature scheme Hadamard transform Hagelin halving half-trace Hamiltonian graph Hamming distance Hamming weight handshake hard core bit Hardware Security Module hash127 hash-and-sign hash function hash rate Hasse's theorem HAVAL Helix Hellmann's time-memory trade-off HEMP Hermite-Korkine-Zolotarev lattice reduction hidden fields hider hierarchical namespace high order DPA history variable HMAC holocryptic homomorphic secret sharing homomorphism homophone honest-but-curious host security HSM HTTP HTTPS, secure HTTP hyperelliptic cryptosystems hypertext transfer protocol IACBC IAPM IBE IBIP IBS ICC ICE-CAR ID IDEA ideal ideally secure identifiable parent property identification identifier identity identity based identity based cryptosystems identity based encryption identity based signature identity escrow scheme identity management identity provider identity theft identity uniqueness identity verification protocol IDS ideal IEEE P802 IEEE P1363 IETF IEMP IETF IKE imbalance impersonation attack impossible cryptanalysis impossible differential attack improved Davies attack incidence of coincidence incremental IND IND-CCA2 independent key independent subkeys index-calculus method index of coincidence indirect payment system indistinguishability of encryptions individual conversion operation individual key inferential power analysis Information Based Indicia Program information hiding information integrity information leakage information symbols Information Technology Security Evaluation Criteria information theoretic security information theory Ingemarsson-Tang-Wong protocol ingress filtering inhibit any policy extension inhibit any policy indicator initial policy set initial state initial value in-line TTP inner CBC inner modes inside out attack insider secure integer factoring integral attack integrity integrity-aware cipher block chaining integrity-aware parallelizable mode interactive interactive argument interactive proof interleaved modes interleaved sliding window exponentiation internal collision attack International Telecommunication Union internet engineering task force internet key exchange internet protocol internet security association and key management protocol interpolation attack intrusion detection intrusion detection system invariance under decimation invasive attack inverse inverse Fourier relation inversion attack inversion in finite fields invisibilty involution IP IPA IPES IPsec irreducible polynomial ISAKMP ISO isologs isomorphs issuer ITA iterated attack iterated cipher iterated hash function iterated Merkle-Hellman scheme iterative cipher Itoh-Tsujii inversion algorithm ITSEC ITU IV (initial value) Jacobi Sum Test Jacobi symbol Java JavaScript JCP Jenning generator KA Kahn's maxim Kappa test Karatsuba algorithm Kasiski's method KASUMI KASUMI/MISTY1 KCDSA KDC KEM Kerberos authentication protocol Kerckhoff’s maxim key key agreement key alphabet key authentication key confirmation key-dependent S-boxes key directive key distribution center key encapsulation mechanism key encryption key key escrow key establishment protocol key exchange protocol key generation algorithm key graph key group key management key mixing key negotiation KeyNote system key phrase key ranking key recovery key revocation key recovery attack key schedule algorithm key space key stream key symmetric cryptosystem key text key token key translation key transport Khufu kleptography KN cipher knapsack cryptographic schemes knapsack problem knowledge extractor known plaintext attack known related key Knuth-Schroeppel function Koblitz curve L3 lattice reduction label Lagarias and Odlyzko attack Lagrange interpolation theorem Lagrange's theorem lambda representation language latin alphabet Latin square lattice lattice reduction lattice sieving lattice-based cryptography Layered Subset Difference law of quadratic reciprosity lchop lcm LDAP least common multiple left-to-right exponentiation legal structures Legendre symbol Lehmer's Euclidean algorithm length Lenstra-Lenstra-Lovász lattice reduction lexicographical knapsacks LFSR license licensee linear approximations linear characteristic linear code linear complexity linear complexity profile linear congruential generator linear consistency attack linear cryptanalysis for block ciphers linear cryptanalysis for stream ciphers linear equivalence linear feedback shift register linear hull linear probability linear sieve linear SSS linear structure linear substitution linear syndrome attack linking list decoding LKH LLL latice reduction algorithm L-notation local deduction local DoS attack local policy Local Registration Authority logical tree hierarchy scheme logic DoS attack longevity long-lived broadcast encryption low density knapsack LRA LSD Luby-Rackoff cipher LUC Lucas-Lehmer primality test Lucas probable prime test Lucifer MAA MAC MAC algorithms MacDES MAC guessing attack MAC-then-Encrypt MAC-verification attack main mode malicious malleable mandatory access control man-in-the-middle attack manipulation Manipulation Detection Code (MDC) mark copyrighted content marking assumption MARS MASH functions (Modular Arithmetic Secure Hash) master copy control master key matching ciphertext attack matching module Matsui Mattson-Solomon polynomial Maurer's method Maurer's universal statistical test Maxim Number One maxims maximum correlation maximum-distance-separable maximum-length linear sequence maximum order complexity May attack McEliece public key cryptosystem McGrew-Sherman OFT protocol MD2 MD4-MD5 MD5 hash function MDC MDS code MDx-family MDx-MAC media access control meet-in-the-middle attack member pseudonym membership test memory size merchant CA Merkle-Damgard strengthening Merkle-Hellman dominance Merkle-Hellman transformation Merkle-Hellman trapdoor Merkle's meta-method Merkle tree Mersenne number Mersenne prime message authenticaton algorithm message authentication code message-encrypting key message length attack message recovery METI Meyer-Schilling hash functions microprobing Miller-Rabin probabilistic primality test million message attack MIME minimal polynomial minimal polynomial minimum distance Minkowski Minkowski's first theorem MIPS-year miss-in-the-middle attack misuse MISTY1 mixed alphabet mix networks Miyaguchi-Preneel mobile code modes modes of operation of a block cipher modification modular addition modular arithmetic modular exponentiation modular inverse modular multiplication modular root modulus MONDEX-scheme monitoring monomial monotone monotone signature Montgomery arithmetic Montgomery exponentiation Montgomery product Montgomery reduction Montgomery representation Montgomery squaring monographic substitution MonPro algorithm Moore's law Morrison-Brillhart method MPHPT MPQS MQV key agreement scheme m-resilient m-sequence MtE multicast encryption multi-exponentiation multigram property multipartite substitution multiparty computation multiple anagramming multiple bits DPA multiple encryption multiple polynomial quadratic sieve multiplication problem multiplicative group multiplicative inverse multiplicative knapsack multiplicative secret sharing multi-precision multiplication multi-precision squaring multi-set attack multi-signature mutual NAF name name constraints extension naming authority Naor-Yung double encryption paradigm narrow-sense envelop National Bureau of Standards NBS nearest vector problem near prime Needham-Schroeder protocols need-to-know principle NEMA NESSIE project network partitions New European Schemes for Signature, Integrity and Encryption NFS Niederreiter encryption scheme NIST NIZK NL NLFSR non-adjavent form non-blind watermarking nonce non-coincidence exhaustion non-commutative non-cyclic non-interactive proofs non-interactive zero-knowledge proofs non-invasive attack non-linear feedback shift register non-linearity of Boolean functions non-linearity order non-malleability non-multiplicativity non-repudiation non-secret key encryption non-singular Boolean function non-singular LFSR non-transferable normal base normal-legacy normal profile NP NP-complete n-residue NTRU null null cipher number field number field sieve number theory Nyberg-Rueppel signature scheme OAEP: Optimal Asymmetric Encryption Padding oblivious transfer observer OCB OCSP odd-characteristic extension OEF OFB off-line off-line authenication method off-line CAM offset codebook OFT protocol OMA OMAC Omega-notation omega-notation one-more forgery one-time blind signature one-time key one-time pad one-time password one-to-one one-way accumulator one-way function one-way function tree protocol One-Way Hash Function (OWHF) one-way permutation onion routing on-line on-line authentication method on-line CAM on-line certificate status protocol on-line mutual authentication O-notation o-notation opaque open code Open PGP optimal authentication scheme Optimal asymmetric Encryption Padding optimal extension fields optimistic contract signing orange book oracle order OT OTP outer modes out-of-phase autocorrelation output feedback output transformation outsider secure overspender detection overspending prevention OWHF P P3P packet padding Pallier assumption Paillier encryption and signature schemes pairings over elliptic curves PAG PAP parallel composition parallelized collision search parity check matrix parity check polynomial parity check symbols Parseval's relation partial-domain one-wayness partial preimage resistance partial signature partitions partitioning cryptanalysis partition number passive passive penetration test password pastry dough mixing pattern finding pay later pay now payment authorization payment card payment card PC PCR PDP PEM, Privacy Enhanced Mail penetration PEP penetration testing perfect forward secrecy / PFS perfect perfectly secure steganography perfect zero knowledge periodic key period of a polynomial period of a sequence permission permitted subtrees permutation permutation matrix personal agent trust personalization person pseudonym personal identification number (PIN) PES PFS PGP phase noise source physical attacks physical security piling-up lemma PIN PIN verification PKCS PKG PKI PKI Assessment Guidelines PKIX - Public Key Infrastructure (X.509) plaintext plainetext awareness plaintext-ciphertext compromise plaintext-plaintext compromise platform for privacy preferences project playback control Playfair cipher plug-ins PMAC PN-sequence Pohlig-Hellman algorithm point addition point at infinity point doubling point multiplication point of sale policy Policy Administration Point policy constraint policy control Policy Decision Point Policy Enforcement Point policy mapping policy mapping inhibit indicator Pollard's kangaroo method Pollard's lambda method Pollard's p-1 method Pollard's rho method polyalphabetic encryption polyalphabetic substitution Polybios square encryption polygraphic substitution polynomial basis representation polynomial complexity polynomial function polynomial security polynomial time polyphony Pontifex Porta encryption Porta table POS postal security device power analysis power trace PP pre-charged dual rail logic predecessor attack predictable preimage resistance prepay preperiod Pretty Good Privacy PRIMALITY problem primality proving algorithm primality test prime certificate prime field prime field anomalous curve prime generation prime number prime number theorem prime-order field priming key character primitive cyclic code primitive element primitive polynomial primitive root principal ideal principal ideal ring privacy Privacy Enhanced Mail privacy enhancing technologies private key cryptosystem private key generator private watermarking privilege privilege management PRNG proactive probabilistic algorithm probabilistic primality test probabilistic public-key encryption probabilistic SSS Probabilistic Signature-Encryption Padding probabilistic signature scheme probable prime product cipher, superencryption proof of knowledge vs proof of membership proofs of membership propagation characteristics of Boolean functions propagation criterion proposed encryption standard protection protection profile protocol Proton provable prime provable security prover provisioning proxy encryption proxy signatures PSAM PSD PSEC-KEM PSEP pseudo Mersenne prime pseudo-collision (Preneel) pseudo-Hadamard transform pseudo-noise sequence pseudonymity pseudonym pseudoprime pseudo-random function pseudo-random number generator pseudo-random permutation pseudo-random sequence PSS PSS-R public key based public key cerificate public key cryptography public key cryptography standards Public Key Infrastructure public key proxy encryption public key proxy signatures public key steganosystem public key watermarking publicly verifiable secret sharing public watermarking purchase secure application module pure cryptosystem pure circulating register purse Q-matrix QRP QS quadratic Frobenius test quadratic non-residue quadratic residue quadratic reciprosity law Quadratic Residuosity Problem Quadratic Sieve quartet quaternary alphabet quantum cryptography quick mode RA Rabin cryptosystem Rabin digital signature scheme Rabin's primality test Rabin-Miller test RACE project radio frequency attacks rainbow tables ramp scheme random bit generation (hardware) random key randomness source random oracle model random preimage attack random squares method randomized algortihm randomness postulates of Golomb random sequence rank metric rational points RC2 RC4 RC5 RC6 rchop reactive defense receipt-free problem receiver deniable recipient anonymity recipient unobservability record layer rectangle attack reduced reducible polynomial reduction reductionist redundancy Reed-Muller codes Reed-Solomon code Registration Authority re-keying related key attack relationship anonymity relationship pseudonym relatively prime relay attack reliability relying party remote DoS attack repeated key replay attack repository representation (lambda) request for comment resettable zero-knowledge residue class resiliency order resilient response resynchronization attack retail MAC (Preneel) reversed alphabet revocable credentials revocation scheme RF attack RfC right rights management right-to-left exponentiation Rijndael ring ring homomorphism RIPE RIPEMD family risk risk management RMAC robust Rohrbach's maxim role hierarchy root CA rotor round round function rounds complexity RP RS code RSA assumption RSA-CRT RSA cryptosystem RSA digital signature scheme RSA factoring challenge RDA-KEM RSA number RSA problem RSA-PSS RSA public-key encryption Rule Book run running-key running time run property SA SAC SAD SAEP+ safeguard selection safe prime SAFER sally salt SAML SASAS Satoh's algorithm saturation attack SBEMP scalable scalar multiplication scanning electron microscope Schnorr digital signature scheme Schnorr Identification Schoof's algorithm SDA SDMI SDSI SDSI names SEAL second preimage resistance secrecy secret key cryptosystem secret sharing scheme secretive defense secure channel secure digital music initiative Secure ElectronicTransactions Secure Hash Algorithm secure HTTP SecureID Secure Shell secure sigantures from the "strong RSA" assumption secure shell Secure Socket Layer (SSL) security Security Architecture security association security association database security assertion markup language security boundary Security Evaluation Criteria security gateways security label security level security module security parameter security parameter index security policy security policy database security standards activities security target seed selective forgery self-initializing quadratic sieve self-reciprocal permutation self-reducibility self-shrinking generator self-synchronizing stream cipher seller SEM SEMA semagram semantic security semi-honest semi-weak key sender anonymity sender deniable sensitivity level sensor sensor module sequences sequential composition Serpent ServerHello session key session pseudonym SET S-expression SFLASH SGEMP SHACAL SHA family (Secure Hash Algorithm) Shamir’s threshold scheme Shamir's ultimate knapsack scheme Shamir-Zippel scheme Shank's baby-step giant-step method Shannon’s maxim Shannon’s model Shannon's main theorem Shannon theory share sharing rules SHARK Shawe-Taylor's algorithm shift-and-add property shifted alphabet shift register sequence Shönhage and Strasse method short digital signatures shortest vector problem shrinking generator shuffling procedures side-channel analysis side-channel attacks Siegenthaler sieve of Eratosthenes sieving sieving in function fields sieving technique SIGABA SIGMYC signature signcryption signed digit exponentiation signer's security sign function signing algorithm silo simple distributed security infrastructure simple electromagnetic analysis simple power analysis simple public key infrastructure simple substitution simple mail transport protocol simple power analysis Simplified Asymmetric Encryption Padding simultaneous exponentiation simultaneous security simultaneous sliding window exponentiation single sign-on Singleton bound size Skipjack Sky Videocrypt system slid pair slide attack slide-with a twist sliding window exponentiation slow key-schedule small polynomial smartcard tamper resistance S/MIME smooth number smooth polynomial smoothness smoothness probability SMTP Snefru SNFS sniffing SNORT SOBER-128 software attack Solovay & Strassen's primality test solitaire Sophie Germain prime soundness SPA SPD special NFS special purpose primality test SPKI/SDSI SPN SP network spoofing square-and-multiply algorithm square attack square-root bound SQUFOF algorithm SSH SSL-protocol stage standard alphabet state stateful stateless static static adversary Static Data Authentication static off-line CAM station-to-station protocol statistical cryptanalysis statistically secure steganography statistical test statistical zero knowledge steganography stegosystem stegotext Steiner's algorithm stop-and-go generator straddling cipher straddling encryption stream cipher strict avalance criterium strong liar strongly unforgeable strong prime strong pseudoprime strong pseudoprime test strong RSA assumption structural crypptanalysis structures STS protocol sub-exponential time subfield subfield inversion subfield operations subgroup subgroup cryptosystems subject subliminal channel subpolynomial time subscriber registration model subset difference subset sum problem substitution substitution attack substitution cipher substitution-permutation (SP) network substitution-permutation sandwich succesive minima summation generator sum-of-squares indicator superelliptic curves superencryption superimposition superincreasing super pseudorandom permutation supersingular curve support SVP S.W.I.F.T. symmetric cryptosystem symmetric proxy encryption symmetric proxy signature scheme symmetry of position synchronous stream cipher systematic table attack tag tamper detection tamper resistance tamper response Tandem Davies-Meyer tapping sequence target collision resistant target LFSR Target of Evaluation Tate pairing TC TCP TCPA TCR TCSEC TDEA TEA TED teardrop teletype alphabet Telepass tempest ternary alphabet TGS theta-notation three-GPP-MAC threshold authentication threshold cryptography threshold decryption threshold pseudorandomness threshold security threshold signature threshold scheme threshold subject threshold tracing threshold authentication codes Through Transport Club ticket ticket granting server t-identifiable parent property time stamping time-memory tradeoff time-memory tradeoff attack timing attack title registry TLS T method TM system TOE token Toom-Cook multiplication TOS total break totient function TR trace function traceability trace function tracing for watermarking tracing mechanism traffic normalization traitor traitor tracing transaction pseudonym transform transform mode transient electromagnetic device transitive signature translucent transmission control protocol transparent Transport Layer Security (TLS) transposition transposition cipher trapdoor one-way function trapdoor permutation treble key trial division Triple DES triple encryption Trojan horses, computer viruses and worms TS truncated differentials Trust Management system trusted trusted authority trusted center trusted computer system evaluation criteria trusted computing platform alliance trusted group authority trusted path trusted third party trust model trust model business controls trust relationship truth-table TTP tunnel mode tweakable blockcipher TWINKLE TWIRL twisted construction two-factor authentication Twofish two-key triple encryption two-tier hierarchy two-to-the-k-ary exponentiation Two-Track-MAC type of service bits TYPEX UDP UMAC unauthorized decryption unconditional authentication unconditional blindness unconditional security undeniable signature undercover agent trust UDP unforgeability unicity distance unilateral unipartite substitution unique SVP unit universal break universal conversion operation universal nonlinearity bound Universal One-Way Hash Functions (UOWHF) universal padding schemes universal statistical test universal stegosystem universal verifiability unlinkability unlinkable credential unobtrusiveness untraceability unveil phase UOWHF user authentication user datagram protocol user data protocol U.S. FPKI uSVP validation validity validity of conversion vcc glitch vector-addition chain verifiable encryption verifiable forgery verifiable MIX protocol verifiable secret sharing verification algorithm verification scheme verifier Vernam cipher Vernam type Vernam table veronym Vigenère encryption Vigenère table Vircator virtual private network virus virus protection virus scanner visual secret sharing scheme vocabulary VPN VSS VSSS WAKE-ROFB walled garden wallet wallet database Walsh transform watermarking weak collision resistant weak keys weak plaintext awareness web browser security web of trust web security webserver security wedge device Wegman-Carter construction Weierstrass equation weight Weil descent Weil pairing Weil's theorem WEP whirlpool whitening wide-sense wide trail strategy width-w NAF WI-FI Wiener, Boneh-Durfee and May attacks on the RSA public key cryptosystem winnowing wired equivalent privacy protocol wireless witness witness hiding witness indistinguishability worm X.509 xedni calculus XACML XCBC XECB XML XOR-MAC XTR yoyo-game zero-divisor zero-knowledge zero-knowledge interactive proof zero-knowledge penetration test zig-zag exhaustion zombies y and Security Index Entry Entry security standards activities EMV EMV nonlinearity of Boolean functions cyclic codes group hash function MIX networks Boolean functions MIX networks fair exchange crypto machines access control SPKI/SDSI access control policy access control policy identity management access control threshold signature secret sharing scheme NESSIE project time stamping electronic payment access control list SPKI/SDSI authentication authentication electronic wallet cryptology cryptanalysis Shannon’s model penetration testing web security threshold signature multiparty computation fixed-exponent exponentiation computational complexity fixed-exponent exponentiation fixed-exponent exponentiation ring knapsack cryptographic schemes Pretty Good Privacy denial of service firewall prime number elliptic curves AES/Rijndael digital steganography multiparty computation access structure non-malleability authenticated encryption authenticated encryption Rijndael/AES NESSIE project Boolean functions Boolean functions Boolean functions authentication authentication elliptic curve keys IPsec IPsec Alberti encryption Secure Socket Layer filter generator Boolean functions combination generator authentication Boolean functions combination generator number field exhaustive key search secret sharing scheme nonlinearity of Boolean functions cyclic codes maximum-length linear sequence cyclic codes zero-knowledge clock-controlled generator ABA digital signature guidelines differential cryptanalysis boomerang attack Boolean functions elliptic curve discrete logarithm problem intrusion detection anonimity privacy public key proxy encryption public key proxy signatures MIX networks MIX networks RSA digital signature scheme security standards activities EMV maximum-length linear sequence cyclic codes privacy digital signature schemes EMV EMV key management X.509 signcryption group ring key public key cryptography public key proxy encryption public key proxy signatures watermarking computational complexity self-synchronizing stream cipher Proton MONDEX-scheme attribute management authorization architecture policy identity management authenticated encryption station-to-station protocol authorization architecture Ipsec identification trust model authentication IPsec identity management biometrics key management identity management key management cryptology authenticated encryption web security authorization management access control SPKI/SDSI authorization architecture policy key MONDEX-scheme Proton electronic payment electromagnetic attack SPKI/SDSI structural encryption substitution-permutation (SP) network discrete logarithm problem group key agreement MARS Boolean functions correlation-immune and resilient Boolean functions maximum-length linear sequence generator key lattice trust model knapsack cryptographic schemes Pretty Good Privacy cyclic codes identitybased cryptosystems Beaufort encryption nonlinearity of Boolean functions maximum-length linear sequence RSA public-key encryption fixed-base exponentiation substitution substitution identitybased cryptosystems Bolero.net alphabet finite field binary Euclidean algorithm signcryption credentials substitution hash function integer factoring alphabet Serpent side-channel analysis Bolero.net hash function traitor tracing X.509 blinding techniques watermarking substitution substitution cyclic codes shortest vector problem lattice reduction Twofish E0 (Bluetooth) pseudo-random number generator Rabin cryptosystem known plaintext attack identity based cryptosystems Wiener, Boneh-Durfee and May attacks on the RSA public key cryptosystem differential cryptanalysis FIPS 140 computational complexity group AES/Rijndael knapsack cryptographic schemes knapsack cryptosystem trust model cryptanalysis group key agreement Boolean functions policy alphabet Certification Authority NESSIE project Security Evaluation Criteria SPKI/SDSI access control credentials access control key escrow Skipjack SPKI/SDSI electronic wallet SET SET Fermat primality test integer factoring product cipher, superencryption multiple encryption access control related key attack modes of operation of a block cipher modes of operation of a block cipher MAC algorithms FIPS 140 Cramer-Shoup public key scheme authenticated encryption de Bruijn sequence EMV Decisional Diffie Hellman identitybased cryptosystems sequences electronic postage EMV standard electronic wallet Certification Authority trust model trust model ABA digital signature guidelines CPS, Certificate Practice Statement certificate revocation time-stamping time stamping Trusted Third Party key management modes of operation of a block cipher integer factoring web security hash function MAC algorithms CBC-MAC and variants group key agreement digital steganography naam veranderen identity verification protocol digital steganography information theory differential-linear attack finite field maximum-length linear sequence sequences undeniable signature elliptic curves knapsack cryptosystem cryptanalysis block cipher digital steganography oblivious transfer cryptanalysis block cipher related key attack modes of operation of a block cipher modes of operation of a block cipher Secure Socket Layer cryptosystem cryptosystem Shannon’s model cryptanalysis cryptanalysis block cipher modes of operation of a block cipher identification symmetric cryptosystem key claw-free access control Secure Socket Layer key escrow Skipjack group ring Secure Socket Layer Data Encryption Standard (DES) secure signatures from the "strong RSA" assumption CBC-MAC and variants Bolero.net S/MIME FIPS 140 traitor tracing fingerprinting identity based cryptosystems cyclic codes secret sharing schemes sequences cyclic codes prime number MAC algorithms multi-set attack MAC algorithms hash function hash function hash function fingerprinting EMV modes of operation of a block cipher threshold cryptography Schnorr Identification non-malleability commitment Security Evaluation Criteria FIPS 140 CEPS standard electronic wallet non-interactive proofs group key agreement group ring MAC algorithms de Bruijn sequence slide attack Data Encryption Standard (DES) access control interactive proof computational complexity non-linear feedback shift register prime number pseudoprime Paillier encryption and signature schemes hash function MAC algorithms cryptanalysis radio frequency attacks multiparty computation Decisional Diffie Hellman identitybased cryptosystems security interactive argument digital steganography interactive argument zero-knowledge Trojan horses, computer viruses and worms signcryption computational complexity zero-knowledge filter generator information theory group key agreement electronic cash electronic payment designated confirmer signature undeniable signature block cipher substitution-permutation (SP) network cyclic codes modular arithmetic linear feedback shift register SPKI/SDSI credentials copy protection broadcast encryption copy protection integer factoring visual secret sharing scheme symmetric cryptosystem key zero-knowledge undeniable signature web security copy protection copy protection watermarking Bolero.net MARS Pretty Good Privacy hash function correlation attack for stream ciphers correlation-immune and resilient Boolean functions combination generator modes of operation of a block cipher electronic cash electronic payment watermarking digital steganography collision resistant hash function Universal One-Way Hash Functions (UOWHF) broadcast encryption ABA digital signature guidelines Paillier encryption and signature schemes policy identity -based encryption hash function certificate revocation SPKI/SDSI known plaintext attack penetration testing FIPS 140 certificate revocation time-stamping trust model Playfair cipher MIX networks privacy Chinese Remainder Theorem FIPS 140 S/MIME hardware security module FIPS 140 protocol cryptology SPKI/SDSI Cramer-Shoup public key scheme penetration testing FIPS 140 copy protection Security Evaluation Criteria modes of operation of a block cipher cryptology SET closest vector problem authorization architecture group generator cyclic codes cyclic codes integer factoring cyclic codes prime number alphabet authentication NESSIE project key encryption key side-channel analysis MAC algorithms MAC algorithms Data Encryption Standard (DES) hash function Paillier encryption and signature schemes EMV ABA digital signature guidelines identitybased cryptosystems impossible-differential attack de Bruijn sequence cryptanalysis replay attack maximum-length linear sequence shrinking generator encryption access control Paillier encryption and signature schemes identitybased cryptosystems biometrics block cipher linear cryptanalysis for block ciphers encryption Shannon’s model cryptosystem encryption MAC algorithms Triple DES probabilistic primality test extension field number field certificate revocation certificate revocation access control SPKI/SDSI maxims NESSIE project electromagnetic attack alphabet DC network firewall knapsack cryptographic schemes cryptanalysis propagation characteristics of Boolean functions Boolean functions FIPS 140 threshold signature cyclic codes Data Encryption Standard knapsack cryptographic schemes fault attack Diffie-Hellman problem dictionary attack password electromagnetic attack filter generator differential cryptanalysis differential-linear attack differential-linear attack electromagnetic attack fault attack weak keys side-channel analysis invasive attacks block cipher substitution-permutation (SP) network identity management copy protection rights management copy protection digital signature schemes digital signature guidelines digital signature standard non-repudiation RSA digital signature scheme EMV watermarking watermarking substitution trust model inversion in finite fields electronic payment Boolean functions cyclic codes discrete logarithm problem access control elliptic curves prime number cyclic codes time-memory tradeoff miss-in-the-middle attack impossible-differential attack block cipher linear cryptanalysis for stream ciphers denial of service verifiable secret sharing ring correlation-immune and resilient Boolean functions secure sigantures from the "strong RSA" assumption integer factoring discrete logarithm problem copy protection intrusion detection elliptic curve keys denial of service intrusion detection binary exponentiation key DES triple DES time-memory tradeoff differential power analysis side-channel analysis certificate revocation certificate revocation copy protection copy protection MAC algorithms Digital Signature Standard non-repudiation Digital Signature Standard FIPS 140 cyclic codes watermarking multiparty computation authorization architecture EMV EMV group signature traitor tracing authenticated encryption Common Criteria knapsack cryptographic schemes smartcard tamper resistance authenticated encryption fair exchange modes of operation of a block cipher elliptic curve cryptography cyclic codes elliptic curve discrete logartihm problem elliptic curve signature schemes NESSIE project Elliptic Curve public-key encryption schemes copy protection watermarking prime number subgroup cryptosystems knapsack cryptographic schemes SPKI/SDSI PGP Triple DES group key agreement firewall invasive attacks radio frequency attacks modes of operation of a block cipher electronic cash acquirer issuer copy protection watermarking Triple DES electronic payment random bit generation (hardware) electronic wallet prime number Elliptic Curve public-key encryption schemes prime number electromagnetic attack authenticated encryption CBC-MAC and variants radio frequency attacks electronic wallet MAC algorithms IPsec encryption authenticated encryption copy protection Shannon’s model cryptosystem encryption public key cryptography encryption authenticated encryption SPKI/SDSI PGP cryptosystem access control policy crypto machines entitlements management information theory pseudo-random number generator fingerprinting MAC algorithms side-channel propagation characteristics of Boolean functions key agreement perfect forward secrecy / PFS modular arithmetic information theory threshold signature cyclic codes IPsec authenticated encryption secure signatures from the "strong RSA" assumption prime number Euler's totient function prime number modular root RSA public-key encryption Euler's totient function modular arithmetic Common Criteria policy slide attack fingerprinting trust model group signature cryptanalysis block cipher MAC algorithms Data Encryption Standard (DES) trust model computational complexity group right-to-left exponentiation Euclidean algorithm hash function extension field optimal extension fields MAC algorithms discrete logarithm problem integer factoring integer factoring computational complexity blind signature contract signing multiparty computation biometrics digital signature biometrics FEAL invasive attacks smartcard tamper resistance radio frequency attacks RSA digital signature scheme Rabin digital signature scheme biometrics FIPS 140 identity management linear feedback shift register linear feedback shift register non-linear feedback shift register linear feedback shift register non-linear feedback shift register Fiat-Shamir identification protocol and Fiat-Shamir signature scheme prime number integer factoring pseudoprime pseudo Mersenne prime integer factoring prime number invasive attacks broadcast encryption hamir signature scheme finite field firewall copy protection digital steganography fingerprinting field SHA family (Secure Hash Algorithm) pseudo-random number generator secure sigantures from the "strong RSA" assumption fixed-base exponentiation fixed-base exponentiation exponentiation algorithms fixed-base exponentiation exponentiation algorithms hash function identification secure signatures from the "strong RSA" assumption random bit generation (hardware) denial of service intrusion detection invasive attacks MAC algorithms Skipjack MARS group key agreement group signature threshold signature MIX networks resynchronization attack resynchronization attack A5/1 cryptanalysis Needham-Schroeder protocols group key agreement elliptic curve discrete logarithm problem prime number non-linear feedback shift register identity based cryptosystems Rabin digital signature scheme RSA digital signature scheme penetration testing filter generator sieving in function fields prime number field signcryption threshold signature identitybased cryptosystems index-calculus method greatest common divisor group key agreement related key attack pseudo-random number generator inversion attack generalized Mersenne prime Number Field Sieve number theory exponentiation algorithms knapsack cryptographic schemes Feistel cipher cyclic codes cyclic codes random oracle model secure sigantures from the "strong RSA" assumption lattice elliptic curve discrete logarithm problem maxims group key agreement block cipher invasive attacks Number Field Sieve Pretty Good Privacy security standards activities cyclic codes maximum-length linear sequence filter generator pseudo-random number generator McEliece public key cryptosystem NESSIE project knapsack cryptographic schemes substitution filter generator group group key agreement group key agreement verifiable encryption SPKI/SDSI ring group key agreement A5/1 identity based cryptosystem Boolean functions crypto machines elliptic curve point multiplication using halving elliptic curve point multiplication using halving proof of knowledge vs proof of membership Boolean functions non-linearity of Boolean functions Boolean functions cyclic codes Secure Socket Layer authenticated encryption time stamping hash function elliptic curves hash function authorization architecture time-memory tradeoff radio frequency attacks lattice reduction web security signcryption identification electromagnetic attack non-malleability authenticated encryption MAC algorithms key threshold cryptography encryption multiparty computation web security Hardware Security Module firewall sieving in function fields firewall authenticated encryption authenticated encryption identity based encryption identity-based cryptosystems electronic postage identity-based cryptosystems fault attack security standards activities intrusion detection cyclic codes hash function fingerprinting entity authentication identity management group ring Fiat-Shamir identification protocol and Feige Fiat-Shamir signature scheme identity-based cryptosystems group signature identity management identity management identification intrusion detection secret sharing schemes security standards activities security standards activities certification authority IPsec radio frequency attacks IPsec IPsec linear cryptanalysis for block ciphers authentication differential cryptanalysis Data Encryption Standard (DES) cryptanalysis hash function semantic security Cramer-Shoup public key scheme information theory Data Encryption Standard (DES) discrete logarithm problem references are needed here cryptanalysis electronic payment semantic security designated confirmer signature undeniable signature key side-channel analysis electronic postage digital steganography authentication side-channel analysis cyclic codes Security Evaluation Criteria security group key agreement firewall trust model trust model initial policy set linear feedback shift register hash function modes of operation of a block cipher certified mail contract signing modes of operation of a block cipher modes of operation of a block cipher boomerang attack signcryption multi-set attack authentication credentials authenticated encryption authenticated encryption verifiable secret sharing modes of operation of a block cipher simultaneous exponentiation MAC algorithms X.509 certification authority IPsec IPsec IPsec firewall IPsec web security may become separate entry intrusion detection maximum-length linear sequence group Boolean functions designated confirmer signature undeniable signature Feistel cipher Data Encryption Standard (DES) IPsec firewall side-channel analysis IDEA security standards activities MAC algorithms IPsec HMAC Common Criteria EMV cryptanalysis cryptanalysis SPKI/SDSI electronic wallet Itoh-Tsujii inversion algorith block cipher block cipher hash function knapsack cryptographic schemes product cipher, superencryption Skipjack Security Evaluation Criteria PKIX - Public Key Infrastructure (X.509) X.509 hash function modes of operation of a block cipher prime number web security web security security standards activities linear consistency attack Karatsuba algorithm maxims cryptanalysis multi-precision multiplication cryptanalysis KASUMI/MISTY1 elliptic curve signature schemes Trusted Third Party key management NESSIE project key management maxims block cipher Shannon’s model digital steganography key key authentication Data Encryption Standard (DES) key Trusted Third Party key management NESSIE project key management protocol protocol key encryption key digital signature schemes public key cryptography DC network key Data Encryption Standard (DES) key policy key differential-linear attack linear cryptanalysis for block ciphers key escrow identity-based encryption broadcast encryption MAC algorithms block cipher Shannon’s model running-key key cryptosystem key token control vector key encryption key miss-in-the-middle attack impossible-differential attack covert channel interpolation attack knapsack cryptosystem proof of knowledge vs proof of membership cryptanalysis block cipher related key attack Quadratic Sieve ECC challenges elliptic curve discrete logarithm problem lattice reduction signcryption knapsack cryptosystem interpolation attack subgroup RSA public-key encryption elliptic curve point multiplication using halving proof of knowledge vs proof of membership alphabet cryptanalysis knapsack cryptographic schemes knapsack cryptographic schemes Number Field Sieve broadcast encryption Jacobi symbol modes of operation of a block cipher least common multiple security standards activities binary exponentiation right-to-left exponentiation identity management Euclidean algorithm visual secret sharing scheme lattice reduction knapsack cryptographic schemes linear feedback shift register copy protection policy linear cryptanalysis for block ciphers differential-linear attack linear cryptanalysis for block ciphers cyclic codes de Bruijn sequence Berlekamp- Massey algorithm linear complexity linear complexity linear cryptanalysis for block ciphers linear cryptanalysis for block ciphers integer factoring Number Field Sieve secret sharing schemes Boolean functions substitution time stamping differential-linear attack broadcast encryption shortest vector problem lattice reduction block cipher denial of service policy key management Registration Authority broadcast encryption denial of service identity management broadcast encryption knapsack cryptographic schemes Registration Authority key management broadcast encryption subgroup cryptosystems prime number prime number Data Encryption Standard (DES) product cipher, superencryption MAC algorithms authentication firewall CBC-MAC and variants MAC algorithms MAC algorithms authenticated encryption MAC algorithms IPsec multiparty computation electronic voting schemes non-malleability access control physical attacks hash function copy protection fingerprinting hash functions copy protection block cipher modes of operation of a block cipher biometrics linear cryptanalysis for block ciphers cyclic codes prime number pseudo-random number generator maxims Boolean functions cyclic codes non-linear feedback shift register Wiener, Boneh-Durfee and May attacks on the RSA public key cryptosystem group key agreement hash function MD4-MD5 hash function cyclic codes hash function MAC algorithms firewall hash function pseudonyms weak keys filter generator inversion attack SET hash function SHA family knapsack cryptographic schemes knapsack cryptographic schemes knapsack cryptographic schemes hash function time stamping prime number Mersenne prime MAA MAC algorithms authentication MAC algorithms key MIX networks digital signature schemes CRYPTREC hash function smartcard tamper resistance integer factoring number theory Secure Socket Layer web security S/MIME cyclic codes cyclic codes lattice reduction shortest vector problem lattice reduction intrusion detection KASUMI/MISTY1 NESSIE project alphabet hash function web security authenticated encryption physical attacks modular arithmetic number theory modular arithmetic exponentiation algorithms modular arithmetic modular arithmetic modular arithmetic electronic wallet MAC algorithms physical attacks Reed-Muller codes access structure secret sharing scheme forgery Montgomery arithmetic Montgomery arithmetic Montgomery arithmetic Montgomery arithmetic Montgomery arithmetic substitution Montgomery arithmetic integer factoring CRYPTREC Quadratic Sieve elliptic curve key agreement schemes Boolean functions correlation-immune and resilient Boolean functions maximum-length linear sequence authenticated encryption RSA public-key encryption simultaneous exponentiation maximum-length linear sequence substitution cryptanalysis electromagnetic attack meet-in-the-middle attack structural encryption Quadratic Sieve computational complexity multi-precision multiplication group ring modular arithmetic knapsack cryptographic schemes threshold cryptography group signature threshold signature identity verification protocol elliptic curve point multiplication using halving signed digit exponentiation SPKI/SDSI trust model identification Cramer-Shoup public key scheme fingerprinting Data Encryption Standard (DES) Data Encryption Standard (DES) closest vector problem generalized Mersenne prime access control crypto machines SPKI/SDSI NESSIE project Number Field Sieve FIPS 140 Common Criteria non-malleability correlation-immune and resilient Boolean functions non-linear feedback shift register elliptic curve point multiplication using halving signed digit exponentiation watermarking Challenge-Response Identification cryptanalysis group group non-malleability zero-knowledge smartcard tamper resistance Boolean functions semantic security RSA digital signature scheme fail-stop signature contract signing de Bruijn sequence linear feedback shift register credentials designated confirmer signature Itoh-Tsujii inversion NESSIE project digital signature computational complexity computational complexity Montgomery arithmetic lattice-based cryptography substitution cryptology discrete logarithm problem index-calculus method RSA problem Cramer-Shoup public key scheme multiparty computation electronic wallet authenticated encryption PKIX - Public Key Infrastructure (X.509) certification authority finite field optimal extension fields optimal extension fields modes of operation of a block cipher credentials electronic payment EMV EMV authenticated encryption group key agreement EMV authenticated encryption CBC-MAC and variants O-notation O-notation blind signature Chaum blind signature blind signature key key knapsack cryptographic schemes time stamping OAEP: Optimal asymmetric Encryption Padding computational complexity group key agreement hash function one-way function MIX networks credentials electronic payment EMV EMV PKIX - Public Key Infrastructure (X.509 certification authority EMV O-notation public key proxy encryption public key proxy signatures cryptology security standards activities authentication OAEP: Optimal asymmetric Encryption Padding RSA problem contract signing Security Evaluation Criteria semantic security modular arithmetic linear feedback shift register oblivious transfer key modes of operation of a block cipher auto-correlation modes of operation of a block cipher hash function MAC algorithms signcryption hash function computational complexity privacy resynchronization attack MIX networks encryption Cramer-Shoup public key scheme identity based cryptosystem non-repudiation authorization architecture zero-knowledge discrete logarithm problem cyclic codes cyclic codes cyclic codes Boolean functions OAEP: Optimal asymmetric Encryption Padding hash function threshold signature SPKI/SDSI linear cryptanalysis for block ciphers RSA factoring challenge cryptanalysis digital steganography penetration testing identity verification protocol substitution cryptanalysis electronic payment electronic payment electronic cash electronic payment SET propagation characteristics of Boolean functions de Bruijn sequence authorization policy authorization architecture physical attacks authorization architecture information theory threshold cryptography digital steganography zero-knowledge key maximum-length linear sequence sequences auto-correlation policy trust model substitution Data Encryption Standard (DES) electronic wallet identity management pseudonyms IDEA perfect forward secrecy / PFS Pretty Good Privacy random bit generation (hardware) physical attacks web security linear cryptanalysis for block ciphers personal identification number EMV OAEP: Optimal asymmetric Encryption Padding RSA digital signature scheme identity-based encryption identity-based cryptosystems Public Key Infrastructure PKIX - Public Key Infrastructure (X.509) non-repudiation security standards activities certificate revocation cryptosystem Shannon’s model semantic security cryptanalysis cryptanalysis privacy copy protection web security authenticated encryption MAC algorithms pseudo noise sequence discrete logarithm problem elliptic curves elliptic curves elliptic curves signed digit exponentiation elliptic curve point multiplication using halving CEPS-standard authorization architecture authorization architecture trust model identity management authorization policy authorization architecture authorization architecture trust model trust model discrete logarithm problem discrete logarithm problem integer factoring integer factoring discrete logarithm problem key key substitution extension field polynomial time polynomial time computational complexity encryption solitaire Porta encryption CEPS-standard electronic postage side-channel analysis differential power analysis Common Criteria FIPS 140 side-channel analysis MIX networks linear congruential generator hash function electronic payment non-linear feedback shift register computational complexity prime number certificate of primality field elliptic curve discrete logarithm problem prime number prime number number theory field modular arithmetic key cyclic codes primitive element generator cyclic codes cyclic codes authenticated encryption identity management PEM, Privacy Enhanced Mail privacy symmetric cryptosystem key identity-based encryption identity-based cryptosystems watermarking privilege management identity management pseudo-random number generator group signature threshold signature computational complexity secret sharing schemes signcryption RSA problem RSA digital signature scheme prime number probabilistic primality test encryption proof of knowledge vs proof of membership Boolean functions propagation characteristics of Boolean functions IDEA access control Common Criteria FIPS 140 MAC algorithms prime number authenticated encryption interactive proof SPKI/SDSI identity management public key proxy encryption public key proxy signatures CEPS-standard electronic postage NESSIE project signcryption ??? Twofish anonimity privacy prime number DES-X Luby-Rackoff cipher Golomb's randomness postulates RSA problem RSA digital signature scheme signcryption RSA digital signature scheme Fiat-Shamir identification protocol and Feige Fiat-Shamir signature scheme certificate PKCS digital steganography watermarking verifiable secret sharing watermarking CEPS-standard cryptosystem de Bruijn sequence MONDEX-scheme Berlekamp Q-matrix Quadratic Residuosity Problem Quadratic Sieve number theory quadratic residue Jacobi symbol integer factoring number theory differential-linear attack alphabet IPsec Registration Authority prime number Miller-Rabin test integer factoring NESSIE project time-memory tradeoff secret sharing schemes key random bit generation (hardware) hash function integer factoring computational complexity Golomb's randomness postulates key McEliece public key cryptosystem elliptic curves RC4 related key attack modes of operation of a block cipher password electronic voting schemes deniable encryption recipient anonymity Secure Socket Layer differential cryptanalysis Camelia lattice reduction irreducible polynomial computational complexity OAEP: Optimal asymmetric Encryption Padding information theory cyclic codes group key agreement group key agreement communication channel anonymity pseudonyms electronic cash electronic payment certificate SPKI/SDSI denial of service key IPsec code book attack identity management time stamping elliptic curve point multiplication using halving PKIX - Public Key Infrastructure (X.509) PEM, Privacy Enhanced Mail zero-knowledge modular arithmetic Euler's totient function correlation-immune and resilient Boolean functions combination generator correlation-immune and resilient Boolean functions Boolean functions ??? alphabet credentials broadcast encryption identity-based encryption radio frequency attacks PEM, Privacy Enhanced Mail PKIX - Public Key Infrastructure (X.509) rights management policy binary exponentiation k-ary exponentiation AES/Rijndael homomorphism NESSIE project MAC algorithms hash function trust model EMV CBC-MAC and variants MAC algorithms threshold signature multiparty computation maxims access control SET crypto machines product cipher, superencryption group key agreement block cipher hash function group key agreement relying party SPKI/SDSI cyclic codes RSA public-key encryption RSA problem Wiener, Boneh-Durfee and May attacks on the RSA public key cryptosystem RSA public-key encryption RSA digital signature scheme NESSIE project RSA factoring challenge RSA public-key encryption NESSIE project Bolero.net key computational complexity maximum-length linear sequence IPsec Boolean functions IPsec OAEP: Optimal asymmetric Encryption Padding trust model related key attack truncated differentials policy privacy multiset attack elliptic curve keys Twofish multi-set attack radio frequency attacks group key agreement signed digit exponentiation group invasive attacks elliptic curve keys EMV watermarking SPKI/SDSI SPKI/SDSI hash function cryptology symmetric cryptosystem key password Shannon's model watermarking SET electronic payment SHA family (Secure Hash Algorithm) HTTPS, secure HTTP MAC algorithms SSH SSH authenticated encryption authenticated encryption IPsec IPsec privacy penetration testing IPsec access control FIPS 140 hardware security module computational complexity security IPsec web security IPsec authenticated encryption penetration testing Common Criteria pseudo-random number generator MAC algorithms Quadratic Sieve substitution RSA problem policy invasive attacks electromagnetic attack cryptology non-malleability multiparty computation Data Encryption Standard (DES) deniable encryption access control intrusion detection biometrics zero-knowledge Secure Socket Layer key perfect forward secrecy / PFS pseudonyms electronic payment SPKI/SDSI NESSIE project radio frequency attacks NESSIE project NESSIE project knapsack cryptographic schemes knapsack cryptographic schemes discrete logarithm problem maxims information theory information theory secret sharing schemes interpolation attack prime number maximum-length linear sequence alphabet maximum-length linear sequence multi-precision multiplication BLS short digital signatures electronic voting schemes correlation-immune and resilient Boolean functions prime number sieving in function fields impossible-differential attack crypto machines crypto machines digital signature digital signature schemes fail-stop signature Boolean functions digital signature schemes identity management SPKI/SDSI electromagnetic attack differential power analysis invasive attacks SPKI/SDSI substitution known plaintext attack firewall side-channel analysis electromagnetic attack OAEP: Optimal asymmetric Encryption Padding hard core bit simultaneous exponentiation identity management cyclic codes secret sharing schemes key escrow MAC algorithms slide attack slide attack Data Encryption Standard (DES) polynomial time invasive attacks fault attack security standards activities smoothness Quadratic Sieve smoothness firewall truncated differentials Number Field Sieve web security intrusion detection authorization architecture smartcard tamper resistance invasive attacks prime number safe prime designated confirmer signature undeniable signature differential power analysis side-channel analysis IPsec Number Field Sieve number theory security standards activities substitution-permutation (SP) network substitution-permutation (SP) network block cipher denial of service firewall binary exponentiation RSA public-key encryption Camelia multi-set attack authentication Quadratic Sieve authenticated encryption Secure Socket Layer (SSL) CRYPTREC linear feedback shift register alphabet linear feedback shift register firewall broadcast encryption group signature threshold signature multiparty computation EMV standard EMV block cipher digital steganography pseudo-random number generator zero-knowledge digital steganography cryptology digital steganography digital steganography binary Euclidean algorithm linear consistency attack substitution substitution substitution Boolean functions prime number authenticated encryption prime number number theory prime number RSA problem secure signatures from the "strong RSA" assumption differential-linear attack impossible-differential attack station-to-station protocol extension field inversion in finite fields optimal extension fields SPKI/SDSI covert channel polynomial time trust model broadcast encryption knapsack cryptographic schemes computational complexity physical attacks Data Encryption Standard (DES) authentication substitution substitution-permutation (SP) network lattice reduction Boolean functions sieving in function fields product cipher, superencryption encryption cryptanalysis knapsack cryptographic schemes Luby-Rackoff cipher elliptic curves Boolean functions shortest vector problem MAC algorithms Bolero.net key authenticated encryption public key proxy encryption public key proxy signatures cryptanalysis cyclic codes block cipher authentication SPKI/SDSI hash function filter generator Universal One-Way Hash Functions (UOWHF) fast correlation attack FIPS 140 elliptic curve discrete logarithm problem identity based cryptosystem EMV firewall copy protection Universal One-Way Hash Functions (UOWHF) Security Evaluation Criteria Triple DES related key attack radio frequency attacks intrusion detection alphabet MAC algorithms electromagnetic attack alphabet key management O-notation CBC-MAC and variants MAC algorithms threshold cryptography threshold cryptography threshold cryptography threshold cryptography threshold cryptography threshold cryptography SPKI/SDSI traitor tracing threshold cryptography Bolero.net key management copy protection key management fingerprinting key management certified mail block cipher MIX networks invasive attacks Bolero.net Transport Layer Security security standards activities differential cryptanalysis policy FIPS 140 multi-precision multiplication IPsec block cipher blind signature modular root Bolero.net elliptic curve point multiplication using halving Boolean functions group signature threshold signature Boolean functions cyclic codes fingerprinting broadcast encryption firewall traitor tracing copy protection fingerprinting pseudonyms IPsec IPsec radio frequency attacks forgery public key proxy encryption public key proxy signatures firewall public key proxy encryption public key proxy signatures security standards activities authenticated encryption substitution known plaintext attack substitution trapdoor one-way function trapdoor one-way function key integer factoring prime number Data Encryption Standard (DES) block cipher virus protection certified mail differential cryptanalysis differential-linear attack policy access structure Trusted Third Party group key agreement Security Evaluation Criteria copy protection group signature threshold signature password FIPS 140 trust model trust model trust model Boolean functions Trusted Third Party IPsec authenticated encryption TWIRL authentication block cipher trust model MAC algorithms NESSIE project IPsec crypto machines firewall authenticated encryption NESSIE project encryption authentication blind signature security authentication chaffing and winnowing electronic wallet IPsec designated confirmer signature fail-stop signature information theory block cipher identity verification protocol substitution lattice-based cryptography ring blind signature designated confirmer signature undeniable signature nonlinearity of Boolean functions authentication signcryption pseudo-random number generator digital steganography undeniable signature designated confirmer signature group signature credentials watermarking commitment Universal One-Way Hash Functions (UOWHF) firewall IPsec security standards activities lattice-based cryptography time stamping SPKI/SDSI designated confirmer signature fault attack fixed-exponent exponentiation MAC algorithms MIX networks digital signature schemes biometrics interactive proof identification information theory Vernam cipher privacy Vigenère encryption radio frequency attacks IPsec Trojan horses, computer viruses and worms Trojan horses, computer viruses and worms alphabet IPsec verifiable secret sharing visual secret sharing scheme slide attack identity management electronic wallet MONDEX-scheme credentials Boolean functions correlation-immune and resilient Boolean functions digital steganography fingerprinting hash function IDEA OAEP: Optimal asymmetric Encryption Padding web security Pretty Good Privacy web security EMV authenticated encryption elliptic curves cyclic codes elliptic curve discrete logarithm problem elliptic curve discrete logarithm problem identity based cryptosystem elliptic curves authenticated encryption hash function NESSIE project block cipher side-channel analysis fingerprinting AES/Rijndael elliptic curve point multiplication using halving RC4 e RSA public key cryptosystem chaffing and winnowing authenticated encryption RC4 A5/1 probabilistic primality test time stamping witness hiding Trojan horses, computer viruses and worms virus protection security standards activities certificate revocation elliptic curve discrete logarithm problem index-calculus method privacy authenticated encryption CBC-MAC and variants authenticated encryption MAC algorithms security standards activities SPKI/SDSI MAC algorithms subgroup cryptosystems pseudo-random number generator Skipjack ring identity verification protocol interactive proof zero-knowledge protocol penetration testing cryptanalysis denial of service Entry authorization architecture multiparty computation digital steganography eavesdropper filter generator pseudo-random number generator CBC-MAC and variants Triple DES identity management authorization architecture combination generator number theory prime number MAC algorithms Proton trust model X.509 hash function Schnorr Identification linear feedback shift register digital steganography threshold cryptography authentication CLIP-scheme CBC-MAC and variants RIPEMD family cryptology public key proxy encryption Ipsec correlation attack for stream ciphers irreducible polynomial lattice intrusion detection radio frequency attacks password electromagnetic attack digital signature standard multi-precision multiplication invasive attacks electromagnetic attack MAC algorithms NESSIE project Proton modular root RSA public-key encryption Number Field Sieve Quadratic Sieve HMAC Data Encryption Standard (DES) Triple DES group key agreement cyclic codes NESSIE project privacy time-stamping SSH IPsec MAC algorithms HMAC MAA time-stamping k-ary exponentiation sliding window exponentiation signed digit exponentiation knapsack cryptographic schemes weak keys EMV EMV finite field Skipjack SHA family (Secure Hash Algorithm) certified mail undeniable signature integer factoring electronic postage MAC algorithms forgery trapdoor one-way function pseudo-random function electronic postage CBC-MAC and variants EMV SHA family (Secure Hash Algorithm) Shannon’s model multiparty computation eavesdropper Shamir’s threshold scheme secret sharing scheme linear feedback shift register Luby-Rackoff cipher authorization architecture password threshold cryptography pseudo prime number theory boomerang attack group key agreement threshold cryptography X.509 MAC algorithms sliding window exponentiation signed digit exponentiation watermarking integral attack elliptic curve point multiplication using halving key management group key agreement policy intrusion detection interactive proof invasive attacks electromagnetic attack key agreement authorization architecture CRYPTREC MAC algorithms maximum-length linear sequence side-channel analysis subgroup cryptosystems miss-in-the-middle attack verifiable encryption group signature threshold signature undeniable signature SPKI/SDSI F correlation attack for stream ciphers ast correlation attack BLS Short Digital Signatures DES-X trust model MAC algorithms modes of operation of a block cipher RSA digital signature scheme gned digit exponentiation public key proxy signatures