[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Kerberos 
    authentication using 
    encryption using 
    Heimdal and MIT implementations 
    padding 
    supported ciphers 
key agreement 
key agreement protocols  2nd 
key exchange
    Diffie-Hellman protocol 
        and DSA 
        and forward secrecy 
    securing against rollback attacks 
key schedules 
key transport protocols 
key_len 
key_offset 
keys  [See also cryptography]
    ASCII hexadecimal, conversion to binary 
    authenticated exchange using RSA 
    binary keys, representing as hexadecimal 
    converting text keys to binary keys 
    cryptographic algorithms, representing for usage in 
    exchange keys 
    generating short-term keys from a long-term key 
    length 
        minimum effective 
    length and security 
    management 
    for message queues 
    public keys, binary representation 
    public keys, recommended lengths 
    random symmetric, generating  2nd 
    representation
        as English text 
        in plaintext (PEM encoding) 
        public keys vs. symmetric keys 
    RSA
        decryption using private keys 
        encryption using public keys 
        key pairs, generating 
        signature verification with public keys 
        used in digital signatures 
    secure management 
    session keys, providing forward secrecy while using 
    signed data types and 
    symmetric key-length, choosing 
    third-party validation  2nd 
    variable key sizes, OpenSSL supported 
keystreams 
    parallelizing generation of 
    precomputing in cipher modes or stream ciphers 
Kohno, Tadayoshi 
Kosiur, Dave 
Krawczyk, Pawel 
krb_auth_con_getremotesubkey( ) 
krb5_auth_con_getremotesubkey( ) 
KRB5_GENERAL_ _ preprocessor macro 
krb5_recvauth( ) 

[ Team LiB ]