User:Ysfcay/Books/Cryptology and Security

from wikipedia.org - Created by Shepherd

 * Cryptology
 * Stream Cipher Algorithms
 * RC4
 * A5/1
 * A5/2


 * Block Cipher Algorithms
 * Substitution–permutation network
 * Feistel cipher
 * Data Encryption Standard
 * DES supplementary material
 * Advanced Encryption Standard
 * Camellia (cipher)
 * Hill cipher
 * Blowfish (cipher)
 * Playfair cipher
 * RC2
 * Block cipher mode of operation


 * Secure Communication and Mobile Networks
 * Point-to-point (telecommunications)
 * Point-to-multipoint communication
 * Peer-to-peer
 * Friend-to-friend
 * Instant messaging
 * End-to-end encryption
 * Network switching subsystem


 * Attack Scenes
 * Second Layer Attacks
 * MAC flooding
 * VLAN hopping
 * Spanning Tree Protocol
 * MAC spoofing
 * ARP spoofing