Cryptography Reference
In-Depth Information
MIC
message integrity code
MIT
Massachusetts Institute of Technology
MPC
multiparty computation
MSB
most significant bit
NBS
National Bureau of Standards
NESSIE
new European schemes for signatures, integrity and encryption
NFS
number field sieve
NIST
National Institute of Standards and Technology
NMAC
nested MAC
NRL
Naval Research Laboratory
NSE
non-secret encryption
OAEP
optimal asymmetric encryption padding
OFB
output feedback
OID
object identifier
OPIE
one-time passwords in everything
OWHF
one-way hash function
PC
permuted choice
personal computer
PD
Privatdozent
PDA
personal digital assistant
PER
packet encoding rules
PGP
Pretty Good Privacy
PIN
personal identification number
PKCS
public key cryptography standard
PKI
public key infrastructure
PKIX
PKI X.509
PPT
probabilistic polynomial-time
PRBG
pseudorandom bit generator
PRF
pseudorandom function
PRP
pseudorandom permutation
PSS
probabilistic signature scheme
PSS-R
probabilistic signature scheme with message recovery
QRP
quadratic residuosity problem
QS
quadratic sieve
qubit
quantum bit
Search WWH ::




Custom Search