Index
(n, t)-threshold scheme 1
GF(pn) 1
3-colouring 1
abelian group 1
abelianization 1
active attacker 1
adaptive chosen message attack 1
AES 1
affine cipher 1
Ajtai-Dwork cryptosystem 1
Ajtai hash function 1
AKS algorithm 1
Alberti code 1
algebraic attack 1
– ciphertext-only 1
– known plaintext 1
– public key system 1
algebraic closure 1
algebraic eraser method 1
algebraic extension 1
algebraically closed 1
amalgam factors 1
Artin presentation 1
associated subgroups 1
asymmetric cryptography 1
asymptotically equal 1
Atabash code 1
– length based 1
authentication protocol 1
average case complexity 1
Babai’s algorithm 1
baby step giant step algorithm 1
base 1
base field equation 1
base ...
Get A Course in Mathematical Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.