Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Name constraints National Institute of Standards and Technology (NIST) 2nd 3rd 4th 5th Network security 2nd 3rd 4th 5th 6th 7th 8th applications, types of authentication applications electronic mail Internet protocol (IP) Kerberos 2nd model for projects for teaching public-key infrastructure (PKI) Web X.509 New European Schemes for Signatures, Integrity, and Encryption (NESSIE) Next Header 2nd Nibble substitution Nonce 2nd Nonce (NONCE) payload 2nd Nonlinear layer SB Nonrepudiation Notification (N) payload 2nd Number theory Chinese remainder theorem (CRT) discrete logarithms distribution of primes Euler's theorem 2nd Euler's totient function Fermat's theorem Miller-Rabin algorithm primality, testing for prime numbers |