Index

A5, 389, 662667

Abadi, Martin, 66

Absolute rate, of language, 234

Accreditation, 103

Active attacks, 27

Active cheaters, 27

Adams, Carlisle, 334

Adaptive-chosen-plaintext attack, 6

Addition chaining, 244

Additive generators, 390392

Adjudicated protocol, 26, 71

Adjudicator, 26

Adleman, Leonard M., 163164, 467

Adler, Roy, 266

Agnew, G. B., 423

Algebraic structure, DES, 282283

Algorithm M, 393394

Algorithms, 24, 17

all-or-nothing disclosure of secrets, 543546

Asmuth-Bloom, 529530

Barrett's, 244

Berlekamp-Massey algorithm, 380, 404

block

chain mode, 206207

choosing, 354355

replay, 191193

breaking, 8

CAST, 334335

choosing, 214216

cipher block chaining mode, 193197, 208210

cipher block chaining of plaintext difference mode, 208

cipher block chaining with checksum, 207208

cipher-feedback mode, 200202, 208210

cipher mode

choosing, 208210

summary, 209

classes, 217

coin flipping

using Blum integers, 543

using exponentiation modulo p, 542543

using square roots, 541542

complexity, 237239

constant, 238

convertible undeniable signatures, 538539

counter mode, 205206, 209

cubic, 238

data compression, 226

designated confirmer signatures, 539540

Diffie-Hellman, fair, 546547

digital signatures, 39

exponential, 238

for export, 215216

extended Euclidean, 246248

factoring, 256

ISO/IEC 9979 registered, 607

Karnin-Greene-Hellman, 530

Khafre, 317318

Khufu, 317

linear, 238

linear syndrome, 381

modes, DES, 277278

multiple block

cascading, 367368

combining, 368

multiple-key ...

Get Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.