Index
NC1, see Nick's Class
(·), 310
π(·), 310
eth roots assumption, 314
gcd(·,·), 310
1963 virus, 175
3DES, see symmetric cipher, 3DES
activity monitor, 186
adaptive attacks
chosen-ciphertext, 53, 80, 328, 340
chosen-plaintext, 327
AES, see symmetric cipher, AES
algorithmic combinatorics, 53
all-or-nothing disclosure, 137
ambivalent root, 166, 248, 256
ANSI C, 232
ARDA, 77
assassination politics, 92, 93, 97
asymmetric cryptography, 39
asymmetric cryptosystem, 326
AT&T, 34
authentication systems, 35
battleprogs, 17
bias matching, heuristic, 60
Big-O notation, 309
Binomial Theorem, 110
black-box cryptosystem, 231
Blowfish, see symmetric cipher, Blowfish
Blum integer, 330
busy-waiting, 53
call graph, 193
call-back function, 34
Capstone, 230
card shuffling, 71
Carmichael lambda function, 310
cascading encryptions, 290
certificate of recoverability, 227
certificate revocation list, see CRL
certification authority, 225, 227, 259, 292, 337
CFB, see cipher feed-back
chaotic air-turbulence, 54
checksum, 18, 30, 46, 135, 330
Chernoff bounds, 232
Chinese Remainder Theorem, 111, 331, 336
chosen-ciphertext attack, 327, 331
chosen-message attack, 329
chosen-plaintext attack, 327, 331
cipher feed-back, 46
ciphertext-only attack, 326
circularly linked list, 21, 100, 133
Clipper chip, ...
Get Malicious Cryptography: Exposing Cryptovirology now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.