[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

C++ language
    buffer overflows and 
    exception handling 
    use of memory, risks associated with 
C language
    buffer overflows and 
    exception handling 
canary 
capture replay attacks, preventing 
CAs (certification authorities)  2nd  3rd 
    root certificates
        fingerprints and 
        obtaining 
        obtaining and checking 
CAST5, supported key sizes 
CBC (Cipher Block Chaining) mode  2nd 
    block cipher setup, OpenSSL 
    calculating message output length 
    high-level API 
    incremental decryption 
    incremental encryption 
        PKCS #11 compliance 
    incremental initialization 
    padding 
        OpenSSL, disabling in 
        switching off 
    parallelization issues 
    SPC_CBC_CTX data type 
cbc_set_padding( ) 
CCM (CTR plus CBC-MAC) mode 
    precomputing keystream for 
CERT_CONTEXT objects 
CertEnumCertificatesInStore( ) 
CertFreeCertificateContext( ) 
CertFreeCRLContext( ) 
CertGetIssuerCertificateFromStore( ) 
CertGetNameStringW( ) 
Certicom 
Certificate Management Library 
certificate revocation 
certificate revocation lists  [See CRLs]
certificates  2nd 
    binary representation 
    certificate hierarchies  2nd 
    certificate revocation lists  [See CRLs]
    certificate signing requests (CSRs) 
    code-signing certificates 
    obtaining 
    personal certificates 
    precedence of fields 
    purposes 
    representing in plaintext (PEM encoding) 
    self-signed certificates 
    term of validity 
    trusted list, adding to 
    verification 
        adding hostname checking to 
        against whitelists 
    web site certificates 
    X.509 certificates  [See X.509 certificates]
certification authorities  [See CAs]
CertOpenSystemStore( ) 
CFB (Cipher Feedback) mode  2nd 
    block cipher setup, OpenSSL 
    block size 
    high-level API 
    initialization 
    parallelization issues 
    PKCS #11 compliance 
    SPC_CFB_CTX data type 
cfb_decrypt_update( ) 
cfmakeraw( ) 
CGI scripts, environment variables used by 
chain responders 
Chandra, Pravir 
check_spoofdns( ) 
checking message integrity 
checksum algorithms, using for software protection 
Chen, Hao 
child processes, creating securely 
chroot( )  2nd 
    jail( ), compared to 
cipher instantiation reference 
ciphers 
    configurable key lengths 
    modes  2nd 
        parallelization of encryption and decryption 
        selecting 
    padding
        adding and checking 
        disabling in OpenSSL in CBC mode 
    variable key length, usage in OpenSSL 
ciphertext stealing (CTS) mode 
Class 1 Digital ID 
clock cycles, counting 
clock( ) 
CMAC  2nd 
cmac_cleanup( ) 
cmac_final( ) 
cmac_mac( ) 
cmac_update( ) 
code_len 
code_offset 
collision attacks 
collision resistance and one-wayness 
command-line arguments, environment variables as separators 
confirming requests via email 
converting
    binary strings to integers for use with RSA 
    integers to binary strings for use with RSA 
    text keys to binary keys 
Cookie headers 
cookie theft 
cookies 
    authentication using 
core dumps, security aspects 
cpuid instruction 
Crack 
CrackLib 
CRAM (Challenge-Response Authentication Mechanism) 
crashes, disabling memory dumps during 
CRC32 algorithm 
crc32_calc( ) 
CreateDialog( ) 
    progress bar control, need for 
CreateJobObject( ) 
CreateMutex( ) 
CreateProcess( ) 
CreateProcessAsUser( )  2nd  3rd 
CreateRestrictedToken( ) 
creating files for temporary use 
cRLDistributionPoints extensions  2nd 
CRLs (certificate revocation lists)  2nd 
    CryptoAPI, obtaining with 
    OpenSSL, obtaining with 
        HTTP client for server connection 
cross-site scripting attacks  2nd 
    JavaScript code injection 
    preventing 
crypt( ) 
    password-based authentication using 
CRYPT_VERIFYCONTEXT flag 
CryptAcquireContext( )  2nd  3rd 
CryptCreateHash( )  2nd 
CryptDecrypt( ) 
CryptDeriveKey( )  2nd 
CryptDestroyHash( ) 
CryptDestroyKey( ) 
CryptEncrypt( ) 
CryptExportKey( )  2nd 
CryptGenKey( ) 
CryptGenRandom( )  2nd 
CryptGetHashParam( ) 
CryptGetUserKey( )  2nd 
CryptHashCertificate( ) 
CryptHashData( ) 
CryptImportKey( )  2nd 
CryptoAPI 
    certificate stores 
    CRLs, obtaining with 
    design features 
    extracting raw key data from key objects 
    key object creation with raw key data 
    MAC implementations 
    message authentication via HMAC 
    public key cryptography issues 
    symmetric encryption using 
    X.509 certificate verification using 
CryptoExportKey( ) 
cryptographic hash algorithms 
cryptographic hash functions 
    algorithms 
        properties 
    collision resistance and one-wayness 
    desirable characteristics 
    patents 
    PRNGs, using as 
    whitening, using for 
cryptographic hashes 
cryptographic primitives, timing 
Cryptographic Service Providers  [See CSPs]
cryptography  [See also symmetric cryptography]
    algorithms, comparing 
    CPU clock speed and 
    elliptic curve cryptography 
    keys 
        random symmetric, generating 
        representation, public vs. symmetric 
    machines, comparing 
    one-time values 
    public key  [See public key cryptography]
    symmetric primitives 
CryptReleaseContext( ) 
CryptSetHashParam( ) 
CryptSetKeyParam( ) 
CSPs (Cryptographic Service Providers)  2nd 
    supported symmetric ciphers 
CSS  [See cross-site scripting attacks]
CTR (counter) mode  2nd 
    high-level API 
    MACs, conversion into stream ciphers using 
    nonce 
    PKCS #11 compliance 
    precomputing keystream for 
    SPC_CTR_CTX data type 
CTS (ciphertext stealing) mode 
current_stamp( ) 
    entropy gathering, using for 
CWC (Carter-Wegman + CTR) mode  2nd 
    Brian GladmanÕs implementation 
    in a high-level encryption and decryption API 
    local_options.h file 
    precomputing keystream for 
cwc_cleanup( ) 
cwc_decrypt_message( )  2nd 
cwc_encrypt_message( ) 
cwc_init( ) 

[ Team LiB ]