Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Name constraints

National Institute of Standards and Technology (NIST) 2nd 3rd 4th 5th

Network security 2nd 3rd 4th 5th 6th 7th 8th

     applications, types of

     authentication applications

     electronic mail

     Internet protocol (IP)

     Kerberos 2nd

     model for

     projects for teaching

     public-key infrastructure (PKI)

     Web

     X.509

New European Schemes for Signatures, Integrity, and Encryption (NESSIE)

Next Header 2nd

Nibble substitution

Nonce 2nd

Nonce (NONCE) payload 2nd

Nonlinear layer SB

Nonrepudiation

Notification (N) payload 2nd

Number theory

     Chinese remainder theorem (CRT)

     discrete logarithms

     distribution of primes

     Euler's theorem 2nd

     Euler's totient function

     Fermat's theorem

     Miller-Rabin algorithm

     primality, testing for

     prime numbers

Категории