Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Family, defined

Fast software encryption/decryption

Federal Information Processing Standards (FIPS)

Feistel cipher

     confusion

     decryption algorithm

     diffusion

     motivation for

     structure

Fermat's theorem

Finished messages 2nd

Finite fields (F)

     Euclidean algorithm

     fields 2nd

     Galois field (GF)

     GF(2n), of the form of

     GF(p), of the form of

     groups

     importance of

     modular arithmetic

     polynomial arithmetic

     rings 2nd

Finite group

Firewalls 2nd

     characteristics

     Common Criteria (CC)

     configurations

     design principles

     trusted systems

     types of

Flags

Flow label

Fortezza scheme 2nd

Fragment header 2nd

Fragment Offset

Fragmentation, network

Front-end processor (FEP)

Function F, design of

Категории