Index

(n, t)-threshold scheme 1

GF(pn) 1

3-colouring 1

abelian group 1

abelianization 1

active attacker 1

adaptive chosen message attack 1

AES 1

affine cipher 1

Ajtai-Dwork cryptosystem 1

Ajtai hash function 1

AKS algorithm 1

Alberti code 1

algebraic attack 1

– ciphertext-only 1

– known plaintext 1

– public key system 1

algebraic closure 1

algebraic element 1, 2

algebraic eraser method 1

algebraic extension 1

algebraically closed 1

amalgam factors 1

Artin presentation 1

associated subgroups 1

asymmetric cryptography 1

asymptotically equal 1

Atabash code 1

attack 1, 2

– length based 1

authentication 1, 2, 3

authentication protocol 1

average case complexity 1

Babai’s algorithm 1

baby step giant step algorithm 1

base 1

base field equation 1

base ...

Get A Course in Mathematical Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.