F



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Family, defined
Fast software encryption/decryption
Federal Information Processing Standards (FIPS)
Feistel cipher
     confusion
     decryption algorithm
     diffusion
     motivation for
     structure
Fermat's theorem
Finished messages 2nd
Finite fields (F)
     Euclidean algorithm
     fields 2nd
     Galois field (GF)
     GF(2n), of the form of
     GF(p), of the form of
     groups
     importance of
     modular arithmetic
     polynomial arithmetic
     rings 2nd
Finite group
Firewalls 2nd
     characteristics
     Common Criteria (CC)
     configurations
     design principles
     trusted systems
     types of
Flags
Flow label
Fortezza scheme 2nd
Fragment header 2nd
Fragment Offset
Fragmentation, network
Front-end processor (FEP)
Function F, design of




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net