Back to Results
First PageMeta Content
Index of cryptography articles / Stream cipher / FEAL / Cipher / WAKE / RC5 / Feistel cipher / Differential cryptanalysis / Cryptanalysis / Cryptography / Data Encryption Standard / Block cipher


This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi
Add to Reading List

Document Date: 2011-07-10 02:35:13


Open Document

File Size: 156,63 KB

Share Result on Facebook

Company

Fiat / CBC / Needham / CRC Press Inc. / /

Currency

CRC / IDR / /

Event

FDA Phase / /

Facility

Audit trail / /

IndustryTerm

step algorithm / rho algorithm / baby-step giant-step algorithm / analyzed algorithms / inner product / decryption algorithm / exhaustive key search / zero-knowledge protocol / exhaustive search / multiplicative / curve primality proving algorithm / Index encryption algorithm / law enforcement access field / search attack / index-calculus algorithms / curve factoring algorithm / generalized decryption algorithm / blind signature protocol / gcd algorithm / disavowal protocol / forward search / identification protocol / assignment operator / fraction factoring algorithm / encryption algorithm / class groups / /

MarketIndex

CBC / FIPS / BAN / /

Organization

European Central Bank / Accredited Standards Committee / /

Position

Extractor / Forward / /

Product

NX / AKEP2 / /

ProgrammingLanguage

C / /

ProvinceOrState

California / /

Technology

298 generalized decryption algorithm / 496 Brickell-McCurley identification protocol / 570 Capstone chip / 517 ElGamal public-key encryption / 286 Encryption / Elliptic curve factoring algorithm / 11 Encryption / Q-matrix algorithm / Stream cipher Encryption / block cipher / 318 decryption algorithm / zero-knowledge protocol / 424 Chor-Rivest public-key encryption / 135 761 Disavowal protocol / Z∗p decryption algorithm / 205 Algorithm / 654 Data Encryption / probabilistic public-key encryption / 506 Escrowed Encryption / 279 FEAL decryption algorithm / 303 encryption algorithm / 309 encryption algorithm / 311 decryption algorithm / 130 ElGamal public-key encryption / gcd algorithm / rigorously analyzed algorithms / 494 protocol / 257 decryption algorithm / 306 Deterministic algorithm / 113 baby-step giant-step algorithm / blind signature protocol / Encryption / Exponentiation Exponential-time algorithm / Cryptography / 132 Berlekamp-Massey algorithm / 126 Elliptic curve primality proving algorithm / Public-key encryption / 256 encryption / 423 Continued fraction factoring algorithm / 128 Pohlig-Hellman algorithm / 295 encryption algorithm / 423 Broadcast encryption / 113 index-calculus algorithms / 297 encryption algorithm / 261 FEAL-8 encryption algorithm / identification protocol / 632 Binary gcd algorithm / caching / 493 Authenticated key exchange protocol / 58 B Baby-step giant-step algorithm / 468 Clipper chip / Digital signature / rho algorithm / 478 disavowal protocol / 658 Conventional encryption / 15 Cut-and-choose protocol / 316 Elliptic curve factoring algorithm / 473 Euclidean algorithm / stream cipher / Index encryption algorithm / 538 Encryption / /

URL

www.cacr.math.uwaterloo.ca/hac / /

SocialTag