AES |
Advanced Encryption Standard |
BIC |
Bit Independence Criterion |
CAPI |
Cryptography Application Programming Interface |
CAST |
Carlisle Adams and Stafford Tavares |
CBC-MAC |
Cipher Block Chaining of Message Authentication Code |
CCMP |
Counter mode CBC MAC Protocol |
COCA |
Cost Of Cracking Adjustment |
CRL |
Certificate Revocation List |
CTS |
Cipher Text Stealing (mode) |
DDF |
Data Decryption Field |
DDOS |
Distributed Denial of Service |
DDV |
DES-DES-Verfahren |
DOS |
Denial of Service |
DPV |
Delegated Path Validation |
DRF |
Data Recovery Field |
E3 |
End-to-End Encryption |
EA |
Escrowed Authenticator |
ECC |
Elliptic Curve Cryptosystem |
EES |
Escrowed Encryption Standard |
EFS |
Encrypting File System |
EPIC |
Electronic Privacy Information Center |
FEAST |
Fast Data Enciphering Algorithm |
FEK |
File Encryption Key |
FPK |
Fast Packet Keying |
GAK |
Governmental Accessed Keys |
GMK |
Group Master Key |
GNFS |
General Number Field Sieve |
GTK |
Group Transient Key |
HDCP |
High-bandwidth Digital Copy Protection |
IPES |
Improved Proposed Encryption Standard |
IV |
Initialisation Vector |
KDC |
Key Distribution Center |
KES |
Key Escrow System |
LCM |
LEAF Creation Method |
LOCT |
Layered Open Crypto Toolkit |
MIKEY |
Multimedia Internet KEYing |
MTT |
MailTrusT |
OCSP |
Online Certificate Status (revocation) Protocol |
PCA |
Policy Certification Authority |
PES |
Proposed Encryption Standard |
PK |
Public Key |
PMK |
Pairwise Master Key |
PSK |
Pre-Shared Key |
PSM |
Personal Security Manager |
PSS |
Pre-Shared Secret |
PTK |
Pairwise Transient Key |
RC2 |
Rivest Cipher / Ron’s Code 2 |
RC4 |
Rivest Cipher / Ron’s Code 4 |
READ |
Relative Element Address Designate |
RSA |
Rivest, Shamir and Adleman |
RSN |
Robust Security Network |
SAC |
Strict Avalanche Criterion |
SCVP |
Simple Certificate Validation Protocol |
SKIP |
Simple Key-management for Internet Protocols |
SPN |
Substitution Permutation Network |
SRT |
Secure Request Technology |
SSL |
Secure Socket Layer |
SSL/TLS |
Secure Socket Layer / Transport Layer Security |
STC |
Secure Transaction Channel |
TC |
Trust Center |
TEA |
Tiny Encryption Algorithm |
TLS |
Transport Layer Security |
TTP |
Trusted Third Parties |
TWINKLE |
The Weizman INstitute Key Locating Engine |