AE |
Algebraic Eraser (AE) |

AES |
Advanced Encryption Standard (AES) |

CA |
certificate authority |

CCA |
chosen-ciphertext attack |

CPA |
chosen-plaintext attack |

DDH |
decisional Diffie–Hellman assumption |

DEM |
data encapsulation mechanism |

DES |
Data Encryption Standard (DES) |

D-H |
Diffie–Hellman key exchange |

DSA |
Digital Signature Algorithm (DSA) |

FHE |
fully homomorphic encryption |

IND |
indistinguishability |

IND-CCA1 |
indistinguishability under chosen-ciphertext attack |

IND-CCA2 |
indistinguishability under adaptive chosen-ciphertext attack |

IND-CPA |
indistinguishability under chosen-plaintext attack |

KEM |
key encapsulation mechanism |

MAC |
message authentication code |

MD |
Message Digest (MD) |

NM |
non-malleability |

NM-CCA1 |
non-malleability under chosen-ciphertext attack |

NM-CCA2 |
non-malleability under adaptive chosen-ciphertext attack |

NM-CPA |
non-malleability under chosen-plaintext attack |

OAEP |
optimal asymmetric encryption padding |

OT |
one-time attack |

OTCCA |
one-time chosen-ciphertext attack |

OTP |
one-time pad |

OWF |
one-way function |

OWP |
one-way permutation |

PKE |
public-key encryption / asymmetric-key encryption |

PKI |
public key infrastructure |

PPT |
probabilistic polynomial-time |

PRF |
pseudorandom function |

PRG |
pseudorandom generator |

PRP |
pseudorandom permutation |

RC4 |
Rivest Cipher 4 (RC4) |

RSA |
Rivest-Shamir-Adleman algorithm (RSA) |

SHA |
Secure Hash Algorithm (SHA) |

SKE |
symmetric-key encryption / private-key encryption |

ZKP |
zero-knowledge proof |