<<

. 5
( 5 .)



validity of conversion, 146
TS, 71 wireless, 1, 515
vcc glitch, 218
TTP, 637 witness, 480, 617
vector-addition chain, 236
tunnel mode, 311 witness hiding, 667
veri¬able encryption, 645
tweakable blockcipher, 17 witness indistinguishability, 667
veri¬able forgery, 363, 364
TWINKLE, 637 worm, 627, 648
veri¬able mix protocol, 385
TWIRL, 637 veri¬able secret sharing, 645
X
twisted construction, 22 veri¬cation algorithm, 158
two-factor authentication, 638 veri¬cation scheme, 34
X.509, 68, 69, 553, 629, 631, 634,
Two¬sh, 638 veri¬er, 272, 297, 593
669
two-key triple encryption, 46 Vernam cipher, 647
XACML, 479
two-tier hierarchy, 632 Vernam table, 647
XCBC, 15, 64, 365
two-to-the-k-ary exponentiation, Vernam type, 290
XECB, 13, 15, 366
639 veronym, 476, 477
xedni calculus, 187
Two-Track-MAC, 366, 410, 411 `
Vigenere encryption, 648
XEDNI calculus, 289
type of service bits, 311 Vigen` re table, 648
e
XML, 555, 595
TYPEX, 117 vircator, 506
XOR-MAC, 365, 366
Vircator, 506
U XTR, 599
virtual private network, 310
virus, 627
UDP, 230, 231, 232, 311 Y
virus protection, 648“51
UMAC, 14, 410, 411 virus scanner, 627
unauthorized decryption, 202 yoyo-game, 587
visual secret sharing scheme, 652
unconditional authentication, 21 vocabulary, 10
unconditional blindness, 38 Z
VPN, 310
unconditional security, 21, 551 VSS, 645
undeniable signature, 73, 641 zero-divisor, 524
VSSS, 652
undercover agent trust, 181 zero-knowledge, 286, 671
unforgeability, 145, 214, 251, 490, 613, zero-knowledge interactive proof, 298,
W
641 671
unicity distance, 42, 290 zero-knowledge penetration test,
WAKE-ROFB, 588
unilateral identity veri¬cation protocol, 456
walled garden, 285
285 zig-zag exhaustion, 116
wallet, 180“82, 394
unipartite substitution, 601 zombies, 144
wallet database, 111

<<

. 5
( 5 .)