Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Handshake Protocol

Hardware efficiency, CTR mode

Hash (HASH) payload 2nd

Hash code, defined

Hash functions 2nd 3rd 4th 5th 6th [See also HMAC, Secure Hash Algorithms (SHA)]

     algorithms 2nd

     birthday attacks 2nd

     block chaining techniques

     brute-force attacks

     cryptanalysis

     requirements for

     security of

     SHA

     simple

     use of

     Whirlpool

Header Checksum

Header, IPv6

Hierarchical key control

Hill cipher

HMAC

     algorithm structure

     design objectives

     development of

     security of

Honeypots

Hop Limit

Hop-by-Hop Options header 2nd

Категории