H



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Handshake Protocol
Hardware efficiency, CTR mode
Hash (HASH) payload 2nd
Hash code, defined
Hash functions 2nd 3rd 4th 5th 6th [See also HMAC, Secure Hash Algorithms (SHA)]
     algorithms 2nd
     birthday attacks 2nd
     block chaining techniques
     brute-force attacks
     cryptanalysis
     requirements for
     security of
     SHA
     simple
     use of
     Whirlpool
Header Checksum
Header, IPv6
Hierarchical key control
Hill cipher
HMAC
     algorithm structure
     design objectives
     development of
     security of
Honeypots
Hop Limit
Hop-by-Hop Options header 2nd




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net