0% found this document useful (0 votes)
41 views2 pages

Khufu Cipher FEAL Cipher

The document lists 57 topics related to mathematics, block ciphers, stream ciphers, public-key cryptography, system security, protocols, programming, and classical cipher implementations. The topics range from big integer algorithms and primality tests to SSL/TLS, SSH, Kerberos, electronic cash, RSA, Java security, .Net security, PHP security, XML security, IP security, firewalls, and Ajax security. The document was created by Hoang V.Nguyen in Fall 2012.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views2 pages

Khufu Cipher FEAL Cipher

The document lists 57 topics related to mathematics, block ciphers, stream ciphers, public-key cryptography, system security, protocols, programming, and classical cipher implementations. The topics range from big integer algorithms and primality tests to SSL/TLS, SSH, Kerberos, electronic cash, RSA, Java security, .Net security, PHP security, XML security, IP security, firewalls, and Ajax security. The document was created by Hoang V.Nguyen in Fall 2012.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Information safe STT 1 2 3 4 5 6 7 8 9 10 11 12 13 15 16 17 18 19 20 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 Topic Name Big-Integer Algorithms Primality Test Factoring Algorithms Pseudo-random number generation Twofish

Algorithm Threefish cipher Blowfish Algorithm IDEA cipher Khufu cipher FEAL cipher Akelarre cipher Hierocrypt cipher Mesh cipher Zodiac cipher NOEKEON cipher Skipjack cipher FROG cipher FOX cipher Blow-CAST -FISH Cipher SEAL cipher Scream cipher Turing cipher Trivium cipher SNOW cipher Salsa20 cipher Py cipher Rabbit cipher Achterbahn-128/80 cipher Grain cipher Rabin public-key cipher ElGamal public-key cipher McEliece public-key cipher Knapsack public-key cipher Probabilistic public-key cipher Eliptic Curve Cryptography The Skein hash family Blind Digitial Signature Quantum Cryptography Modern Steganography Lattice-based cryptography IIS security Apache security Cloud computing Security Web service security PGP Note

Fall 2012

Mathematics

Block cipher

Theory

Stream cipher

Public-key cryptography

System security

Hoang V.Nguyen

Information safe 46 47 48 49 50 51 52 53 54 55 56 57 58 Protocol SSL/TLS SSH Kerberos Electronic Cash RSA implementation Java Security .Net Security PHP Security Classical cipher implementation XML Security IP security(IPsec) Firewall Ajax security

Fall 2012

Programming

Hoang V.Nguyen

You might also like