ABBREVIATIONS

AE

authenticated encryption

AEAD

authenticated encryption with associated data

AES

Advanced Encryption Standard

AES-NI

AES native instructions

AKA

authenticated key agreement

API

application programming interface

ARX

add-rotate-XOR

ASIC

application-specific integrated circuit

BLS

Barreto–Lynn–Scott

BLS

Boneh–Lynn–Shacham

CA

certificate authority

CAESAR

Competition for Authenticated Encryption: Security, Applicability, and Robustness

CBC

cipher block chaining

CCA

chosen-ciphertext attackers

CDH

computational Diffie–Hellman

CMAC

cipher-based MAC

COA

ciphertext-only attackers

CPA

chosen-plaintext attackers

CRT

Chinese remainder theorem

CTR

counter mode

CVP

closest vector problem

DDH ...

Get Serious Cryptography, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.