Index M

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

MAC127  2nd 
MACs (Message Authentication Codes)  2nd  3rd  4th 
    algorithms, compared 
    creating your own 
    defined 
    dual-use modes 
    fastest software authentication 
    integrity checking 
    interfaces and memory allocation 
    limitations 
    monitoring log files using 
    OMAC block cipher-based MAC 
    parallelizing computation 
    properties 
    secure authentication 
    security recommendations 
    stream ciphers, converting to 
    support of multiple algorithms 
    use in securing channels 
    using smaller authentication tags 
    using smaller MAC tags 
    vs. message digests 
mailslots 
make_sockaddr( ) 
making encryption and message integrity work together 
malicious data, handling via input validation 
malicious HTML 
malloc( )
    and BIGNUM objects 
    environment variables and 
man-in-the-middle attacks  2nd  3rd  4th 
    Diffie-Hellman and DSA 
    prevention 
mandatory locks 
manipulating big numbers 
Matyas-Meyer-Oseas algorithm 
MCF (Modular Crypt Format) 
    encoding 
McGraw, Gary 
MD-strengthening 
MD2 (Message Digest 2) 
MD4 and MD5 
    insecurity of 
MD5 Modular Crypt Format  [See MD5-MCF]
MD5-MCF 
    password encryption using 
    verifying a password 
MDC-2 algorithm 
    building a one-way hash from a block cipher 
    patent restrictions 
memory
    C++, risks associated with 
    data, securely erasing from 
        volatile keyword  2nd 
    dead-code elimination compiler optimization, risks from 
        neutralizing risks 
    memset( ), risks associated with 
    paging to disk, preventing 
        on Unix 
        on Windows 
    realloc( ), risks associated with 
memory dumps, disabling during crashes 
memset( ) 
    use of memory, risks associated with 
Mersenne Twister 
message authentication 
    cryptographic primitives for 
    HMAC algorithm 
message authentication codes  [See MACs]
message digests 
    block sizes of common functions 
    desirable properties 
    support of multiple algorithms 
    vs MACs 
message integrity checks 
message queues 
messages, integrity and encryption 
Messier, Matt 
Microsoft
    certificate revocation lists, handling of 
    CryptoAPI  [See CryptoAPI]
    CSPs 
        supported symmetric ciphers 
    string-handling functions (strsafe.h) 
    WinInet API 
Microsoft DeveloperÕs Network (MSDN) 
Microsoft Windows Platform SDK 
MIME headers 
minimum effective key length 
mkstemp( ) 
mktemp( ) 
mlock( ) 
Modular Crypt Format (MCF) 
MouseEntropyProc( ) 
mprotect( ) 
MSDN (Microsoft DeveloperÕs Network) 
Muffett, Alec 
mutexes 
MySQL, enabling SSL support 
mysql_options( ) 
mysql_real_connect( ) 
mysql_ssl_set( ) 



Secure Programming Cookbook for C and C++
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
ISBN: 0596003943
EAN: 2147483647
Year: 2005
Pages: 266

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net