ABBREVIATIONS
AE |
authenticated encryption |
---|---|
AEAD |
authenticated encryption with associated data |
AES |
Advanced Encryption Standard |
AES-NI |
AES native instructions |
AKA |
authenticated key agreement |
API |
application programming interface |
ARX |
add-rotate-XOR |
ASIC |
application-specific integrated circuit |
BLS |
Barreto–Lynn–Scott |
BLS |
Boneh–Lynn–Shacham |
CA |
certificate authority |
CAESAR |
Competition for Authenticated Encryption: Security, Applicability, and Robustness |
CBC |
cipher block chaining |
CCA |
chosen-ciphertext attackers |
CDH |
computational Diffie–Hellman |
CMAC |
cipher-based MAC |
COA |
ciphertext-only attackers |
CPA |
chosen-plaintext attackers |
CRT |
Chinese remainder theorem |
CTR |
counter mode |
CVP |
closest vector problem |
DDH ... |
Get Serious Cryptography, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.