• (n, M, d) code, 445

  • GF(28), 73, 163

  • GF(4), 69, 397, 479

  • [n, k, d] code, 451

  • Zp, 71

  • , 108, 137

  • ϕ(n), 57

  • ar1 factorization method, 175, 192, 518, 544, 578

  • p1 method, 188, 393, 396, 519, 546, 580

  • q-ary code, 442

  • x2y2 factorization method, 494, 501

  • G23, 463

  • G24, 459

  • 3DES, 155

  • absorption, 238

  • acoustic cryptanalysis, 183

  • addition law, 384, 388, 404

  • AddRoundKey, 161

  • ADFGX cipher, 27

  • Adleman, 171

  • Advanced Encryption Standard (AES), 137, 160, 293

  • Aesop, 37

  • affine cipher, 12, 133, 380

  • Agrawal, 188

  • Alice, 2

  • anonymity, 325, 329

  • ASCII, 88

  • asymptotic bounds, 449

  • Athena, 299

  • Atkins, 193

  • attacks, 3

  • attacks on RSA, 177, 426

  • authenticated key agreement, 292

  • authenticated key distribution, 295

  • authentication, 8, 25, 196, 310, 314

  • automatic teller machine, 357, 361

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset