AE |
authenticated encryption |
AEAD |
authentication encryption with associated data |
AES |
Advanced Encryption Standard |
AES-NI |
AES native instructions |
AKA |
authenticated key agreement |
API |
application program interface |
ARX |
add-rotate-XOR |
ASIC |
application-specific integrated circuit |
CA |
certificate authority |
CAESAR |
Competition for Authenticated Encryption: Security, Applicability, and Robustness |
CBC |
cipher block chaining |
CCA |
chosen-ciphertext attackers |
CDH |
computational Diffie–Hellman |
CMAC |
cipher-based MAC |
COA |
ciphertext-only attackers |
CPA |
chosen-plaintext attackers |
CRT |
Chinese remainder theorem |
CTR |
counter mode |
CVP |
closest vector problem |
DDH |
decisional Diffie–Hellman |
DES |
Data Encryption Standard |
DH |
Diffie–Hellman |
DLP |
discrete logarithm problem |
DRBG |
deterministic random bit generator |
ECB |
electronic codebook |
ECC |
elliptic curve cryptography |
ECDH |
elliptic curve Diffie–Hellman |
ECDLP |
elliptic-curve discrete logarithm problem |
ECDSA |
elliptic-curve digital signature algorithm |
FDH |
Full Domain Hash |
FHE |
fully homomorphic encryption |
FIPS |
Federal Information Processing Standards |
FPE |
format-preserving encryption |
FPGA |
field-programmable gate array |
FSR |
feedback shift register |
GCD |
greatest common divisor |
GCM |
Galois Counter Mode |
GNFS |
general number field sieve |
HKDF |
HMAC-based key derivation function |
HMAC |
hash-based message authentication code |
HTTPS |
HTTP Secure |
IND |
indistinguishablity |
IP |
Internet Protocol |
IV |
initial value |
KDF |
key derivation function |
KPA |
known-plaintext attackers |
LFSR |
linear feedback shift register |
LSB |
least significant bit |
LWE |
learning with errors |
MAC |
messsage authentication code |
MD |
message digest |
MitM |
meet-in-the-middle |
MQ |
multivariate quadratics |
MQV |
Menezes–Qu–Vanstone |
MSB |
most significant bit |
MT |
Mersenne Twister |
NFSR |
nonlinear feedback shift register |
NIST |
National Institute of Standards and Technology |
NM |
non-malleability |
NP |
nondeterministic polynomial-time |
OAEP |
Optimal Asymmetric Encryption Padding |
OCB |
offset codebook |
P |
polynomial time |
PLD |
programmable logic device |
PRF |
pseudorandom function |
PRNG |
pseudorandom number generator |
PRP |
pseudorandom permutation |
PSK |
pre-shared key |
PSS |
Probabilistic Signature Scheme |
QR |
quarter-round |
QRNG |
quantum random number generator |
RFC |
request for comments |
RNG |
random number generator |
RSA |
Rivest–Shamir–Adleman |
SHA |
Secure Hash Algorithm |
SIS |
short integer solution |
SIV |
synthetic IV |
SPN |
substitution–permutation network |
SSH |
Secure Shell |
SSL |
Secure Socket Layer |
TE |
tweakable encryption |
TLS |
Transport Layer Security |
TMTO |
time-memory trade-off |
UDP |
User Datagram Protocol |
UH |
universal hash |
WEP |
Wireless Encrypted Protocol |
WOTS |
Winternitz one-time signature |
XOR |
exclusive OR |