B



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Backdoor
Base Exchange
Base-rate fallacy 2nd
     Bayes' theorem
     conditional probability
     demonstrated
     independence
     problem of
Base64 transfer encoding
Basic constraints
Bastion host
Bayes' theorem
Behavior control
Behavior-blocking software
Bijection
Binary curve
Birthday attacks 2nd
     duplication
     inequality
     mathematical basis of
     overlap between two sets
     paradox 2nd
     related problem
     strategy for
Bit independence criterion (BIC)
Blinding
Block chaining techniques
Block cipher W
     add layer AK
     CState
     diffusion layer MR
     key expansion for
     KState
     nonlinear layer SB
     permutation layer SC
     structure
Block ciphers 2nd 3rd
     cipher block chaining (CBC) mode
     cipher feedback (CFB) mode
     counter (CTR) mode 2nd
     design principles
     electronic codebook (ECB) mode
     ideal
     modes of operation
     motivation for Feistel structure
     output feedback (OFB) mode 2nd
     principles
Block size
Bloom filter
Blum Blum Shub (BBS) generator
Boot sector virus
Brute-force attack 2nd 3rd
     hash functions
     message authentication codes (MAC)




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net