CZ:Security Subgroup
Jump to navigation
Jump to search
| ||||||||
Main article | Home | Talk | All articles (125) | Citable (2) | Members (2) | Recent changes | ||
Affiliation: Computers (Recent changes)| Military (Recent changes)| Engineering (Recent changes)| [ e ] |
Using R template
- Government Communications Headquarters [r]: Add brief definition or description
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Hashed message authentication code [r]: A technique for authenticating a message using a hash function and a secret key. [e]
- Hasty Pudding (cipher) [r]: A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Signals intelligence [r]: Add brief definition or description
- International Data Encryption Algorithm [r]: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
- Internet Protocol security architecture [r]: Add brief definition or description
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
Using Rpl template
- Government Communications Headquarters: Add brief definition or description
- Hash (cryptography): An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Hashed message authentication code: A technique for authenticating a message using a hash function and a secret key. [e]
- Hasty Pudding (cipher): A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
- Hybrid cryptosystem: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Information assurance: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Signals intelligence: Add brief definition or description
- International Data Encryption Algorithm: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
- Internet Protocol security architecture: Add brief definition or description
- IPsec: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]