R



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Radix-64 conversion
Random access, CTR mode
Random delay
Random number generation 2nd 3rd
     ANSI X.9.17 PGP
     ANSI X.9.17 PRNG
     Blum Blum Shub (BBS) generator
     cryptographically
     cyclic encryption
     linear congruential generators
     output feedback (OFB) mode, DES
     Pretty Good Privacy (PGP)
     pseudorandom number generators (PRNGs) 2nd 3rd 4th
     randomness
     skew
     true random number generator (TRNG) 2nd
     unpredictability
     use of
RC4 algorithm
     development of
     initialization of S
     logic of
     stream generation
     strength of 2nd
Reader's guide
Receiver, role of
Record Protocol
Reflector DDoS
Registration authority (RA)
Registration request
Relatively prime
Release of message contents
Reliability, network
Replay
Replay attacks
Repository
Request for Comment (RFC) publication 2nd
Residue 2nd
Revocation request
RFC 822
Rijndael proposal 2nd
Rings (R) 2nd
Rivest-Shamir-Adleman (RSA) algorithm 2nd
     chosen ciphertext attack (CCA)
     complexity of
     computational aspects of
     description of
     development of
     efficient operation of
     exponentiation on modular arithmetic
     factoring problem
     key generation
     optimal assymetric encryption padding (OAEP)
     proof of
     security of
     timing attacks
Root, polynomial
Rotor machines
Rounds 2nd 3rd 4th
     function of
     number of 2nd
     single, details of
Routing header 2nd
RSA algorithm [See Rivest-Shamir-Adleman (RSA) algorithm]
Rule-based intrusion detection 2nd




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net