| AES |
Advanced Encryption Standard |
| BIC |
Bit Independence Criterion |
| CAPI |
Cryptography Application Programming Interface |
| CAST |
Carlisle Adams and Stafford Tavares |
| CBC-MAC |
Cipher Block Chaining of Message Authentication Code |
| CCMP |
Counter mode CBC MAC Protocol |
| COCA |
Cost Of Cracking Adjustment |
| CRL |
Certificate Revocation List |
| CTS |
Cipher Text Stealing (mode) |
| DDF |
Data Decryption Field |
| DDOS |
Distributed Denial of Service |
| DDV |
DES-DES-Verfahren |
| DOS |
Denial of Service |
| DPV |
Delegated Path Validation |
| DRF |
Data Recovery Field |
| E3 |
End-to-End Encryption |
| EA |
Escrowed Authenticator |
| ECC |
Elliptic Curve Cryptosystem |
| EES |
Escrowed Encryption Standard |
| EFS |
Encrypting File System |
| EPIC |
Electronic Privacy Information Center |
| FEAST |
Fast Data Enciphering Algorithm |
| FEK |
File Encryption Key |
| FPK |
Fast Packet Keying |
| GAK |
Governmental Accessed Keys |
| GMK |
Group Master Key |
| GNFS |
General Number Field Sieve |
| GTK |
Group Transient Key |
| HDCP |
High-bandwidth Digital Copy Protection |
| IPES |
Improved Proposed Encryption Standard |
| IV |
Initialisation Vector |
| KDC |
Key Distribution Center |
| KES |
Key Escrow System |
| LCM |
LEAF Creation Method |
| LOCT |
Layered Open Crypto Toolkit |
| MIKEY |
Multimedia Internet KEYing |
| MTT |
MailTrusT |
| OCSP |
Online Certificate Status (revocation) Protocol |
| PCA |
Policy Certification Authority |
| PES |
Proposed Encryption Standard |
| PK |
Public Key |
| PMK |
Pairwise Master Key |
| PSK |
Pre-Shared Key |
| PSM |
Personal Security Manager |
| PSS |
Pre-Shared Secret |
| PTK |
Pairwise Transient Key |
| RC2 |
Rivest Cipher / Ron’s Code 2 |
| RC4 |
Rivest Cipher / Ron’s Code 4 |
| READ |
Relative Element Address Designate |
| RSA |
Rivest, Shamir and Adleman |
| RSN |
Robust Security Network |
| SAC |
Strict Avalanche Criterion |
| SCVP |
Simple Certificate Validation Protocol |
| SKIP |
Simple Key-management for Internet Protocols |
| SPN |
Substitution Permutation Network |
| SRT |
Secure Request Technology |
| SSL |
Secure Socket Layer |
| SSL/TLS |
Secure Socket Layer / Transport Layer Security |
| STC |
Secure Transaction Channel |
| TC |
Trust Center |
| TEA |
Tiny Encryption Algorithm |
| TLS |
Transport Layer Security |
| TTP |
Trusted Third Parties |
| TWINKLE |
The Weizman INstitute Key Locating Engine |