(n, M, d) code, 445
GF(28), 73, 163
GF(4), 69, 397, 479
[n, k, d] code, 451
Zp, 71
⊕, 108, 137
ϕ(n), 57
ar≡1 factorization method, 175, 192, 518, 544, 578
p−1 method, 188, 393, 396, 519, 546, 580
q-ary code, 442
x2≡y2 factorization method, 494, 501
G23, 463
G24, 459
3DES, 155
absorption, 238
acoustic cryptanalysis, 183
addition law, 384, 388, 404
AddRoundKey, 161
ADFGX cipher, 27
Adleman, 171
Advanced Encryption Standard (AES), 137, 160, 293
Aesop, 37
affine cipher, 12, 133, 380
Agrawal, 188
Alice,
anonymity, 325, 329
ASCII, 88
asymptotic bounds, 449
Athena, 299
Atkins, 193
attacks,
attacks on RSA, 177, 426
authenticated key agreement, 292
authenticated key distribution, 295
authentication, , 25, 196, 310, 314
automatic teller machine, 357, 361