E



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

E-mail virus
Electronic codebook (ECB) mode
Electronic data interchange (EDI)
Electronic mail (e-mail) security
     data compression
     e-mail compatibility
     Pretty Good Privacy (PGP) 2nd 3rd
     radix-64 conversion
     random number generation using PGP
     Secure/Multipurpose Internet Mail Extension (S/MIME)
     ZIP, data compression using
Elliptic curve arithmetic
     Abelian groups
     algebraic description of addition
     binary curve
     curves over GF(2m)
     curves over Zp
     geometric description of addition
     prime curve
     real numbers
Elliptic curve cryptography (ECC)
     Diffie-Hellman key exchange
     encryption/decryption
     security of
Encapsulating Security Payload (ESP) 2nd 3rd 4th
     algorithms, encryption and authentication
     authentication option
     format
     Information
     padding
     transport mode 2nd
     tunnel mode 2nd 3rd
Encapsulating Security Payload header
Encrypt-decrypt-encrypt (EDE) sequence
Encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th [See also Block cipher, Data Encryption Standard (DES), Public-key encryption]
     algorithm 2nd 3rd
     application-layer
     authentication approaches
     block ciphers 2nd 3rd
     classical techniques
     computationally secure
     cryptanalysis 2nd
     cryptography 2nd
     cyclic
     Data Encryption Standard (DES) 2nd 3rd 4th
     elliptic curves
     end-to-end
     function, placement of
     IPSec
     Kerberos techniques
     key management
     link
     message
     multiple
     network-layer 2nd
     optimal assymetric encryption padding (OAEP)
     public-key 2nd
     public-key authentication approaches 2nd
     rotor machines
     S-AES 2nd
     SSL
     steganography
     stream ciphers
     substitution techniques
     symmetric 2nd 3rd 4th 5th
     transposition techniques
     unconditionally secure
End entity
End-to-end encryption
     basic approach
     placement of function
Enhanced security services 2nd
EnvelopedData 2nd
Euclidean algorithm
Euler's theorem 2nd
Euler's totient function
Exchanges, ISAKMP
Extension headers, IPv6
Extensions




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net