AES

Advanced Encryption Standard

BIC

Bit Independence Criterion

CAPI

Cryptography Application Programming Interface

CAST

Carlisle Adams and Stafford Tavares

CBC-MAC

Cipher Block Chaining of Message Authentication Code

CCMP

Counter mode CBC MAC Protocol

COCA

Cost Of Cracking Adjustment

CRL

Certificate Revocation List

CTS

Cipher Text Stealing (mode)

DDF

Data Decryption Field

DDOS

Distributed Denial of Service

DDV

DES-DES-Verfahren

DOS

Denial of Service

DPV

Delegated Path Validation

DRF

Data Recovery Field

E3

End-to-End Encryption

EA

Escrowed Authenticator

ECC

Elliptic Curve Cryptosystem

EES

Escrowed Encryption Standard

EFS

Encrypting File System

EPIC

Electronic Privacy Information Center

FEAST

Fast Data Enciphering Algorithm

FEK

File Encryption Key

FPK

Fast Packet Keying

GAK

Governmental Accessed Keys

GMK

Group Master Key

GNFS

General Number Field Sieve

GTK

Group Transient Key

HDCP

High-bandwidth Digital Copy Protection

IPES

Improved Proposed Encryption Standard

IV

Initialisation Vector

KDC

Key Distribution Center

KES

Key Escrow System

LCM

LEAF Creation Method

LOCT

Layered Open Crypto Toolkit

MIKEY

Multimedia Internet KEYing

MTT

MailTrusT

OCSP

Online Certificate Status (revocation) Protocol

PCA

Policy Certification Authority

PES

Proposed Encryption Standard

PK

Public Key

PMK

Pairwise Master Key

PSK

Pre-Shared Key

PSM

Personal Security Manager

PSS

Pre-Shared Secret

PTK

Pairwise Transient Key

RC2

Rivest Cipher / Ron’s Code 2

RC4

Rivest Cipher / Ron’s Code 4

READ

Relative Element Address Designate

RSA

Rivest, Shamir and Adleman

RSN

Robust Security Network

SAC

Strict Avalanche Criterion

SCVP

Simple Certificate Validation Protocol

SKIP

Simple Key-management for Internet Protocols

SPN

Substitution Permutation Network

SRT

Secure Request Technology

SSL

Secure Socket Layer

SSL/TLS

Secure Socket Layer / Transport Layer Security

STC

Secure Transaction Channel

TC

Trust Center

TEA

Tiny Encryption Algorithm

TLS

Transport Layer Security

TTP

Trusted Third Parties

TWINKLE

The Weizman INstitute Key Locating Engine