ABBREVIATIONS

AE

authenticated encryption

AEAD

authentication encryption with associated data

AES

Advanced Encryption Standard

AES-NI

AES native instructions

AKA

authenticated key agreement

API

application program interface

ARX

add-rotate-XOR

ASIC

application-specific integrated circuit

CA

certificate authority

CAESAR

Competition for Authenticated Encryption: Security, Applicability, and Robustness

CBC

cipher block chaining

CCA

chosen-ciphertext attackers

CDH

computational Diffie–Hellman

CMAC

cipher-based MAC

COA

ciphertext-only attackers

CPA

chosen-plaintext attackers

CRT

Chinese remainder theorem

CTR

counter mode

CVP

closest vector problem

DDH

decisional Diffie–Hellman

DES

Data Encryption Standard

DH

Diffie–Hellman

DLP

discrete logarithm problem

DRBG

deterministic random bit generator

ECB

electronic codebook

ECC

elliptic curve cryptography

ECDH

elliptic curve Diffie–Hellman

ECDLP

elliptic-curve discrete logarithm problem

ECDSA

elliptic-curve digital signature algorithm

FDH

Full Domain Hash

FHE

fully homomorphic encryption

FIPS

Federal Information Processing Standards

FPE

format-preserving encryption

FPGA

field-programmable gate array

FSR

feedback shift register

GCD

greatest common divisor

GCM

Galois Counter Mode

GNFS

general number field sieve

HKDF

HMAC-based key derivation function

HMAC

hash-based message authentication code

HTTPS

HTTP Secure

IND

indistinguishablity

IP

Internet Protocol

IV

initial value

KDF

key derivation function

KPA

known-plaintext attackers

LFSR

linear feedback shift register

LSB

least significant bit

LWE

learning with errors

MAC

messsage authentication code

MD

message digest

MitM

meet-in-the-middle

MQ

multivariate quadratics

MQV

Menezes–Qu–Vanstone

MSB

most significant bit

MT

Mersenne Twister

NFSR

nonlinear feedback shift register

NIST

National Institute of Standards and Technology

NM

non-malleability

NP

nondeterministic polynomial-time

OAEP

Optimal Asymmetric Encryption Padding

OCB

offset codebook

P

polynomial time

PLD

programmable logic device

PRF

pseudorandom function

PRNG

pseudorandom number generator

PRP

pseudorandom permutation

PSK

pre-shared key

PSS

Probabilistic Signature Scheme

QR

quarter-round

QRNG

quantum random number generator

RFC

request for comments

RNG

random number generator

RSA

Rivest–Shamir–Adleman

SHA

Secure Hash Algorithm

SIS

short integer solution

SIV

synthetic IV

SPN

substitution–permutation network

SSH

Secure Shell

SSL

Secure Socket Layer

TE

tweakable encryption

TLS

Transport Layer Security

TMTO

time-memory trade-off

UDP

User Datagram Protocol

UH

universal hash

WEP

Wireless Encrypted Protocol

WOTS

Winternitz one-time signature

XOR

exclusive OR