Concepts
algorithm,
authentication,
authorization,
certificate,
cryptography,
digital signature,
entity,
identification,
risk,
Terms
- acceptor
- HasPreferred:card acceptor,
- access control
- Includes:credential, data separation,
- accountability
- IncludedBy:entity,
- acquirer
- IncludedBy:entity,
- active (key state)
- IncludedBy:cryptographic key, key state,
- addition rule
- address certificate
- IncludedBy:certificate,
- agent identity
- IncludedBy:entity, identification,
- algorithm
- Includes:Data Encryption Algorithm, Secure Hash Algorithm, Revision 1, algorithm identifier, asymmetric cryptographic algorithm, authentication algorithm, elliptic curve digital signature algorithm, encryption algorithm,
- algorithm identifier
- IncludedBy:algorithm,
- alteration
- IncludedBy:risk,
- asymmetric cryptographic algorithm
- IncludedBy:algorithm, cryptography,
- Includes:digital signature, private key, private prime factors, public key, public key certificate,
- attribute
- IncludedBy:entity,
- Includes:Attribute Authority, attribute certificate,
- Attribute Authority
- IncludedBy:Certification Authority, attribute,
- Includes:attribute certificate,
- attribute certificate
- IncludedBy:Attribute Authority, attribute, certificate,
- audit journal
- Includes:audit record field,
- PreferredFor:audit trail,
- audit record field
- IncludedBy:audit journal,
- audit trail
- HasPreferred:audit journal,
- authentication
- IncludedBy:authorization, entity,
- Includes:authentication algorithm, authentication element, authentication key, authentication sequence number, authentication token, entity authentication, identification, identity factor, identity of key for authentication, key authentication, message authentication, message authentication code, notarization, personal authenticating information, simple authentication, strong authentication, transportation authentication data key, verification,
- authentication algorithm
- IncludedBy:algorithm, authentication,
- authentication element
- IncludedBy:authentication,
- authentication key
- IncludedBy:authentication, cryptographic key,
- authentication sequence number
- IncludedBy:authentication,
- authentication token
- IncludedBy:authentication,
- PreferredFor:token,
- authorization
- Includes:authentication, authorization certificate, authorization procedure, authorized signatory, signatory authority,
- authorization certificate
- IncludedBy:authorization, certificate,
- authorization procedure
- IncludedBy:authorization,
- authorized signatory
- IncludedBy:Certification Authority, authorization, entity, signatory authority,
- base derivation key
- IncludedBy:cryptographic key,
- base key
- IncludedBy:cryptographic key,
- base point (G)
- basis
- BAUDOT
- beneficiary party(ies)
- biased
- big-endian
- binary polynomial
- binary string
- binary string to integer conversion
- binary vector
- birthday phenomenon
- bit string
- block
- block encryption
- IncludedBy:Data Encryption Algorithm, encryption,
- bundle
- IncludedBy:Data Encryption Algorithm,
- Synonym:key bundle,
- CA-certificate
- IncludedBy:Certification Authority, certificate,
- card acceptor
- IncludedBy:entity,
- PreferredFor:acceptor,
- card issuer
- IncludedBy:entity,
- PreferredFor:issuer,
- cascading obsolete flag
- certificate
- IncludedBy:certification,
- Includes:CA-certificate, Certificate Revocation List, Certification Authority, address certificate, attribute certificate, authorization certificate, certificate hold, certificate information, certificate policy, certificate request data, certificate serial number, certificate user, certificate-using system, certification, certification path, certification policy element, certification practice statement, cross certification, device certificate, digital signature, end certificate, intermediate certificates, meta certificate, power of attorney certificate, public key certificate, restriction certificate, role certificate, signatory certificate, sponsor certificate, user certificate,
- certificate hold
- IncludedBy:certificate,
- certificate information
- IncludedBy:certificate,
- certificate policy
- IncludedBy:certificate,
- certificate request data
- IncludedBy:certificate,
- Certificate Revocation List
- IncludedBy:Certification Authority, certificate,
- Includes:CRL distribution point, delta-CRL,
- certificate serial number
- IncludedBy:certificate,
- certificate user
- IncludedBy:certificate,
- certificate-using system
- IncludedBy:certificate,
- certification
- IncludedBy:certificate,
- Includes:Certification Authority, certificate, certification path, certification practice statement, cross certification,
- Certification Authority
- IncludedBy:certificate, certification,
- Includes:Attribute Authority, CA-certificate, CRL distribution point, Certificate Revocation List, authorized signatory, certification path, certification practice statement, delta-CRL, policy mapping, policy qualifier, subject CA, subscriber,
- certification path
- IncludedBy:Certification Authority, certificate, certification,
- certification policy element
- IncludedBy:certificate,
- certification practice statement
- IncludedBy:Certification Authority, certificate, certification,
- characteristic 2 finite field
- checkvalue
- HasPreferred:checkvalue,
- PreferredFor:checkvalue,
- cipher block chaining
- IncludedBy:Data Encryption Algorithm,
- ciphertext
- Antonym:cleartext, plaintext,
- HasPreferred:ciphertext,
- IncludedBy:cryptography, encryption,
- Includes:ciphertext encryption element, ciphertext string, ciphertext substring,
- PreferredFor:ciphertext,
- ciphertext encryption element
- IncludedBy:ciphertext,
- ciphertext string
- IncludedBy:ciphertext,
- ciphertext substring
- IncludedBy:ciphertext,
- cleartext
- Antonym:ciphertext,
- Synonym:plaintext,
- clock cycle
- clocking
- IncludedBy:Data Encryption Algorithm,
- closed-loop response integrity
- communicating pair
- compressed form
- compromise
- IncludedBy:threat,
- Includes:compromised obsolete (key state), compromised obsolete flag,
- compromised obsolete (key state)
- IncludedBy:compromise, cryptographic key, key state,
- compromised obsolete flag
- IncludedBy:compromise,
- confidentiality
- Synonym:privacy,
- corresponding key field
- IncludedBy:cryptographic key,
- credential
- IncludedBy:access control, identification,
- credit party
- IncludedBy:entity,
- CRL distribution point
- IncludedBy:Certificate Revocation List, Certification Authority,
- cross certification
- IncludedBy:certificate, certification,
- cryptographic boundary
- IncludedBy:Data Encryption Algorithm, cryptography,
- cryptographic equipment
- IncludedBy:cryptography,
- cryptographic hash
- IncludedBy:cryptographic hash function,
- cryptographic hash function
- IncludedBy:cryptography,
- Includes:Secure Hash Algorithm, Revision 1, cryptographic hash, hash, hash value,
- PreferredFor:hash function,
- cryptographic initialization
- IncludedBy:Data Encryption Algorithm, cryptography,
- cryptographic key
- IncludedBy:cryptography,
- Includes:active (key state), authentication key, base derivation key, base key, compromised obsolete (key state), corresponding key field, cryptographic key synchronization, data key, derivation key, derived unique key per transaction, discontinued keys, double length key, effective date of key, elliptic curve key pair, elliptic curve private key, elliptic curve public key, encryption key, highest level key, identity of key for authentication, implicitly identified key, irreversible transformation for a key, irreversible transformation of a key, key agreement, key authentication, key bundle, key component, key confirmation, key encrypting key, key encrypting key pair, key establishment, key exchange, key exchange transaction, key generation center, key generator, key granularity, key integrity, key loader, key management, key management facility, key offset, key pair, key pair updating, key security, key service message, key set, key set identifier, key state, key storage, key subtype, key translation, key transport, key type, key usage vector, key validation, keying material, keying relationship, master key, obsolete (key state), pending activation (key state), pending obsolete (key state), polyinstantiation, private key, public key, split knowledge, subscriber key, symmetric key, system key, transaction key, transportation authentication data key, variant of a key, working key,
- PreferredFor:key,
- cryptographic key synchronization
- IncludedBy:cryptographic key,
- cryptographic keying material
- HasPreferred:keying material,
- cryptographic material
- HasPreferred:keying material,
- cryptographic module
- IncludedBy:cryptography,
- PreferredFor:module,
- cryptographic module facility
- IncludedBy:cryptography,
- cryptographic service message
- IncludedBy:cryptography,
- cryptographic synchronization
- IncludedBy:cryptography,
- cryptographic system
- IncludedBy:cryptography,
- cryptography
- Includes:Data Encryption Algorithm, asymmetric cryptographic algorithm, ciphertext, cryptographic boundary, cryptographic equipment, cryptographic hash function, cryptographic initialization, cryptographic key, cryptographic module, cryptographic module facility, cryptographic service message, cryptographic synchronization, cryptographic system, cryptoperiod, decipherment, decryption, digital signature, elliptic curve, encipherment, encryption, irreversible encipherment, message authentication code, reversible encipherment, reversible public key cryptography,
- cryptoperiod
- IncludedBy:cryptography,
- customer
- IncludedBy:entity,
- cyclic group
- Data Encryption Algorithm
- IncludedBy:algorithm, cryptography,
- Includes:DEA Decryption Operation, DEA Device, DEA Encryption Operation, DEA Functional Block, DEA Input Block, DEA Key, DEA Output Block, block encryption, bundle, cipher block chaining, clocking, cryptographic boundary, cryptographic initialization, initialization vector, propagation delay,
- data integrity
- data key
- IncludedBy:cryptographic key,
- data separation
- IncludedBy:access control,
- data unit
- date of message origination
- DEA Decryption Operation
- IncludedBy:Data Encryption Algorithm,
- DEA Device
- IncludedBy:Data Encryption Algorithm,
- DEA Encryption Operation
- IncludedBy:Data Encryption Algorithm,
- DEA Functional Block
- IncludedBy:Data Encryption Algorithm,
- DEA Input Block
- IncludedBy:Data Encryption Algorithm,
- DEA Key
- IncludedBy:Data Encryption Algorithm,
- DEA Output Block
- IncludedBy:Data Encryption Algorithm,
- debit party
- decipher
- HasPreferred:decryption,
- decipherment
- Antonym:encipherment,
- IncludedBy:cryptography,
- Synonym:decryption,
- decrypt
- decrypt state
- decryption
- IncludedBy:cryptography,
- PreferredFor:decipher,
- Synonym:decipherment,
- degauss
- delegation
- deletion
- PreferredFor:loss,
- delimiter
- delta-CRL
- IncludedBy:Certificate Revocation List, Certification Authority,
- derivation key
- IncludedBy:cryptographic key,
- derived unique key per transaction
- IncludedBy:cryptographic key, transaction,
- design standard
- device certificate
- IncludedBy:certificate,
- Diffie-Hellman numbers
- digest information
- digital signature
- IncludedBy:asymmetric cryptographic algorithm, certificate, cryptography,
- Includes:elliptic curve digital signature algorithm, non-repudiation, rDSA, signatory, signed document,
- PreferredFor:signature,
- directory
- discontinued keys
- IncludedBy:cryptographic key,
- distinguished entity
- distinguished name
- distinquished entity
- IncludedBy:entity,
- distinquished name
- IncludedBy:entity,
- document
- domain parameters
- double length key
- IncludedBy:cryptographic key,
- dual control
- Includes:split knowledge,
- duplication
- HasPreferred:replay,
- ECDSA
- effective date
- effective date of key
- IncludedBy:cryptographic key,
- electronic distribution
- elliptic curve
- IncludedBy:cryptography,
- Includes:elliptic curve digital signature algorithm, elliptic curve discrete logarithm problem, elliptic curve key pair, elliptic curve key pair (Q, d), elliptic curve parameters, elliptic curve point, elliptic curve private key, elliptic curve private key (d), elliptic curve public key, elliptic curve public key (Q), valid elliptic curve parameters, x-coordinate, y-coordinate,
- elliptic curve digital signature algorithm
- IncludedBy:algorithm, digital signature, elliptic curve,
- elliptic curve discrete logarithm problem
- IncludedBy:elliptic curve,
- elliptic curve key pair (Q, d)
- IncludedBy:elliptic curve,
- elliptic curve key pair
- IncludedBy:cryptographic key, elliptic curve,
- elliptic curve parameters
- IncludedBy:elliptic curve,
- elliptic curve point
- IncludedBy:elliptic curve,
- elliptic curve private key (d)
- IncludedBy:elliptic curve,
- elliptic curve private key
- IncludedBy:cryptographic key, elliptic curve,
- elliptic curve public key (Q)
- IncludedBy:elliptic curve,
- elliptic curve public key
- IncludedBy:cryptographic key, elliptic curve,
- encipher
- HasPreferred:encryption,
- encipherment
- Antonym:decipherment,
- IncludedBy:cryptography,
- Includes:irreversible encipherment, reversible encipherment,
- Synonym:encryption,
- encrypt
- encrypt state
- encryption
- IncludedBy:cryptography,
- Includes:block encryption, ciphertext, encryption algorithm,
- PreferredFor:encipher,
- Synonym:encipherment,
- encryption algorithm
- IncludedBy:algorithm, encryption,
- encryption element
- encryption key
- IncludedBy:cryptographic key,
- end certificate
- IncludedBy:certificate,
- end entity
- IncludedBy:entity,
- entity
- Includes:accountability, acquirer, agent identity, attribute, authentication, authorized signatory, card acceptor, card issuer, credit party, customer, distinquished entity, distinquished name, end entity, entity authentication, grantor, identification, initial recipient, institution, legal entity, local registration agent, logical party, node, owner, recipient, relying party, repudiation, sender, signatory, signatory authority, subject, subject end entity, subscriber, user, verifier,
- entity authentication
- IncludedBy:authentication, entity,
- ephemeral data
- error service message
- exclusive-or
- Includes:modulo-2 addition,
- explicitly identified
- field tag
- financial institution
- IncludedBy:institution,
- financial message
- fixed format message
- fixed split
- IncludedBy:split,
- PreferredFor:organization split,
- forgery
- IncludedBy:risk,
- forward secrecy
- forwarding
- gaussian normal basis
- IncludedBy:normal basis,
- GF(p)*
- grantor
- IncludedBy:entity,
- hash
- IncludedBy:cryptographic hash function,
- Includes:hash function, hash value,
- hash function
- HasPreferred:cryptographic hash function,
- IncludedBy:hash,
- hash value
- IncludedBy:cryptographic hash function, hash,
- header
- highest level key
- IncludedBy:cryptographic key,
- hybrid form
- identification
- IncludedBy:authentication, entity,
- Includes:agent identity, credential, identification cards, identification factor, identity factor, personal identification number,
- identification cards
- IncludedBy:identification,
- identification factor
- IncludedBy:identification,
- identity factor
- IncludedBy:authentication, identification,
- identity of key for authentication
- IncludedBy:authentication, cryptographic key,
- immediately activated
- implicitly identified key
- IncludedBy:cryptographic key,
- initial recipient
- IncludedBy:entity,
- initial text sequence
- initialization vector
- IncludedBy:Data Encryption Algorithm,
- insertion
- institution
- IncludedBy:entity,
- Includes:financial institution,
- interactive
- interchange
- intermediate certificates
- IncludedBy:certificate,
- interoperability
- irreducible binary
- irreversible encipherment
- Antonym:reversible encipherment,
- IncludedBy:cryptography, encipherment,
- irreversible transformation for a key
- IncludedBy:cryptographic key,
- irreversible transformation of a key
- IncludedBy:cryptographic key,
- issuer
- HasPreferred:card issuer,
- key
- HasPreferred:cryptographic key,
- key agreement
- IncludedBy:cryptographic key,
- key authentication
- IncludedBy:authentication, cryptographic key,
- key bundle
- IncludedBy:cryptographic key,
- Synonym:bundle,
- key component
- IncludedBy:cryptographic key,
- key confirmation
- IncludedBy:cryptographic key,
- key encrypting key
- IncludedBy:cryptographic key,
- key encrypting key pair
- IncludedBy:cryptographic key,
- key establishment
- IncludedBy:cryptographic key,
- key exchange
- IncludedBy:cryptographic key,
- key exchange transaction
- IncludedBy:cryptographic key, transaction,
- key generation center
- IncludedBy:cryptographic key,
- key generator
- IncludedBy:cryptographic key,
- key granularity
- IncludedBy:cryptographic key,
- key integrity
- IncludedBy:cryptographic key,
- key loader
- IncludedBy:cryptographic key,
- key management
- IncludedBy:cryptographic key,
- Includes:nonce,
- key management facility
- IncludedBy:cryptographic key,
- key offset
- IncludedBy:cryptographic key,
- key pair
- IncludedBy:cryptographic key,
- key pair updating
- IncludedBy:cryptographic key,
- key security
- IncludedBy:cryptographic key,
- key service message
- IncludedBy:cryptographic key,
- key set
- IncludedBy:cryptographic key,
- Includes:key set identifier,
- key set identifier
- IncludedBy:cryptographic key, key set,
- key state
- IncludedBy:cryptographic key,
- Includes:active (key state), compromised obsolete (key state), obsolete (key state), pending activation (key state), pending obsolete (key state),
- key storage
- IncludedBy:cryptographic key,
- key subtype
- IncludedBy:cryptographic key,
- key translation
- IncludedBy:cryptographic key,
- key transport
- IncludedBy:cryptographic key,
- key type
- IncludedBy:cryptographic key,
- key usage vector
- IncludedBy:cryptographic key,
- key validation
- IncludedBy:cryptographic key,
- keying material
- IncludedBy:cryptographic key,
- PreferredFor:cryptographic keying material, cryptographic material,
- keying relationship
- IncludedBy:cryptographic key,
- label
- IncludedBy:split,
- large prime factors
- least significant bit(s)
- Antonym:most significant bit(s),
- legal entity
- IncludedBy:entity,
- local registration agent
- IncludedBy:entity,
- logical party
- IncludedBy:entity,
- loss
- HasPreferred:deletion,
- m-bit number
- master key
- IncludedBy:cryptographic key,
- material data integrity
- message
- message authentication
- IncludedBy:authentication,
- Includes:message authentication code,
- message authentication code
- IncludedBy:authentication, cryptography, message authentication,
- message digest
- message element
- message identifier
- meta certificate
- IncludedBy:certificate,
- module
- HasPreferred:cryptographic module,
- modulo-2 addition
- IncludedBy:exclusive-or,
- most significant bit(s)
- Antonym:least significant bit(s),
- multi-threaded
- multiple center agent
- multiple center group
- multiple center subscriber
- IncludedBy:subscriber,
- nibble
- node
- IncludedBy:entity,
- non-repudiation
- Antonym:repudiation,
- IncludedBy:digital signature,
- non-reversible transformation
- non-supersingular
- nonce
- IncludedBy:key management, replay,
- normal basis
- Includes:gaussian normal basis, optimal normal basis,
- notarization
- IncludedBy:authentication,
- object
- obsolete (key state)
- IncludedBy:cryptographic key, key state,
- obsolete date
- octet
- Includes:octet string,
- octet string
- IncludedBy:octet,
- octet string to binary string conversion
- offset
- offset decrypt
- offset encrypt
- offset encryption
- one-way function
- optimal normal basis
- IncludedBy:normal basis,
- Includes:type I ONB, type II ONB,
- optional
- order of a curve
- order of a point
- organization split
- HasPreferred:fixed split,
- originator
- Synonym:sender,
- out-of-band notification
- owner
- IncludedBy:entity,
- padding
- pair of field elements ( , )
- parity
- parity bit
- party a
- party b
- pending activation (key state)
- IncludedBy:cryptographic key, key state,
- pending obsolete (key state)
- IncludedBy:cryptographic key, key state,
- pending obsolete date
- pentanomial
- pentanomial basis
- perfect forward secrecy
- performance
- performance standard
- personal authenticating information
- IncludedBy:authentication,
- personal identification number
- IncludedBy:identification,
- Includes:reference PIN, transaction PIN,
- plaintext
- Antonym:ciphertext,
- HasPreferred:plaintext,
- PreferredFor:plaintext,
- Synonym:cleartext,
- point compression
- policy mapping
- IncludedBy:Certification Authority,
- policy qualifier
- IncludedBy:Certification Authority,
- polyinstantiation
- IncludedBy:cryptographic key,
- polynomial
- polynomial basis
- power of attorney certificate
- IncludedBy:certificate,
- primary account number
- prime finite field
- privacy
- Synonym:confidentiality,
- private key
- IncludedBy:asymmetric cryptographic algorithm, cryptographic key,
- private prime factors
- IncludedBy:asymmetric cryptographic algorithm,
- propagation delay
- IncludedBy:Data Encryption Algorithm,
- protection mapping
- protocol
- pseudo-random
- pseudo-random number
- public key
- IncludedBy:asymmetric cryptographic algorithm, cryptographic key,
- public key certificate
- IncludedBy:asymmetric cryptographic algorithm, certificate,
- random
- random data
- random number generator
- Includes:seed,
- random split
- IncludedBy:split,
- rDSA
- IncludedBy:digital signature, reversible public key cryptography,
- reasonable assurance
- receiver
- Synonym:recipient,
- recipient
- IncludedBy:entity,
- Synonym:receiver,
- reduction polynomial
- reference PIN
- IncludedBy:personal identification number,
- relying party
- IncludedBy:entity,
- remote access
- replay
- IncludedBy:risk, threat,
- Includes:nonce,
- PreferredFor:duplication,
- repudiation
- Antonym:non-repudiation,
- IncludedBy:entity,
- request for service initiation message
- request for service message
- requester
- response service message
- response to request message
- restriction certificate
- IncludedBy:certificate,
- reversible encipherment
- Antonym:irreversible encipherment,
- IncludedBy:cryptography, encipherment,
- Includes:reversible public key cryptography,
- reversible encryption
- reversible public key cryptography
- IncludedBy:cryptography, reversible encipherment,
- Includes:rDSA,
- risk
- Includes:alteration, forgery, replay, risk assessment, threat,
- risk assessment
- IncludedBy:risk,
- role certificate
- IncludedBy:certificate,
- scalar multiplication
- Secure Hash Algorithm, Revision 1
- IncludedBy:algorithm, cryptographic hash function,
- secured information
- security association
- security attribute
- security exchange
- security life
- security management information data
- security policy
- security transformation
- seed
- IncludedBy:random number generator,
- sender
- IncludedBy:entity,
- Synonym:originator,
- shadow
- signatory
- IncludedBy:digital signature, entity,
- signatory authority
- IncludedBy:authorization, entity,
- Includes:authorized signatory, signatory certificate,
- signatory certificate
- IncludedBy:certificate, signatory authority,
- signature
- HasPreferred:digital signature,
- signed document
- IncludedBy:digital signature,
- simple authentication
- IncludedBy:authentication,
- single threaded
- SMID
- split
- IncludedBy:split knowledge, working key,
- Includes:fixed split, label, random split,
- split knowledge
- IncludedBy:cryptographic key, dual control,
- Includes:split,
- sponsor certificate
- IncludedBy:certificate,
- static data
- statistically unique
- store-and-forward
- strong authentication
- IncludedBy:authentication,
- subject
- IncludedBy:entity,
- subject CA
- IncludedBy:Certification Authority,
- subject end entity
- IncludedBy:entity,
- subscriber
- IncludedBy:Certification Authority, entity,
- Includes:multiple center subscriber, subscriber a, subscriber b, subscriber key,
- subscriber a
- IncludedBy:subscriber,
- subscriber b
- IncludedBy:subscriber,
- subscriber data key
- HasPreferred:subscriber key,
- subscriber key
- IncludedBy:cryptographic key, subscriber,
- PreferredFor:subscriber data key, subscriber key encrypting key,
- subscriber key encrypting key
- HasPreferred:subscriber key,
- supersingular
- switch
- symmetric
- symmetric key
- IncludedBy:cryptographic key,
- system key
- IncludedBy:cryptographic key,
- tamper resistant security module
- tampering
- IncludedBy:threat,
- terminal
- IncludedBy:transaction,
- TG-17
- The Secure Hash Algorithm1, (SHA-1),
- threat
- IncludedBy:risk,
- Includes:compromise, replay, tampering, vulnerability,
- time-variant parameter
- time-variant value
- token
- HasPreferred:authentication token,
- transaction
- Includes:derived unique key per transaction, key exchange transaction, terminal, transaction PIN, transaction initiator, transaction integrity, transaction key, unique key per transaction,
- transaction initiator
- IncludedBy:transaction,
- transaction integrity
- IncludedBy:transaction,
- transaction key
- IncludedBy:cryptographic key, transaction,
- transaction PIN
- IncludedBy:personal identification number, transaction,
- translate
- Transportation *KK
- transportation authentication data key
- IncludedBy:authentication, cryptographic key,
- trinomial
- trinomial basis
- TRSM
- trust
- type I ONB
- IncludedBy:optimal normal basis,
- type II ONB
- IncludedBy:optimal normal basis,
- UKPT
- ultimate recipient
- uncompressed form
- unique key per transaction
- IncludedBy:transaction,
- unsolicited RTR
- user
- IncludedBy:entity,
- Includes:user certificate,
- user certificate
- IncludedBy:certificate, user,
- valid elliptic curve parameters
- IncludedBy:elliptic curve,
- value date
- variant of a key
- IncludedBy:cryptographic key,
- verification
- IncludedBy:authentication,
- verifier
- IncludedBy:entity,
- vulnerability
- IncludedBy:threat,
- wire service
- working key
- IncludedBy:cryptographic key,
- Includes:split,
- x-coordinate
- IncludedBy:elliptic curve,
- X3.106
- X3.92
- X9.17/85
- X9.17/95
- X9.19
- X9.23
- X9.24
- X9.26
- X9.28
- X9.30-1
- X9.30-2
- X9.30-3
- X9.31-1
- X9.31-2
- X9.41
- X9.42
- X9.44
- X9.45
- X9.49
- X9.50
- X9.52
- X9.55
- X9.57
- X9.59
- X9.61
- X9.62
- X9.65
- X9.66
- X9.69
- X9.70
- X9.74
- X9.76
- X9.78
- X9.8
- X9.80
- X9.82
- X9.9
- y-coordinate
- IncludedBy:elliptic curve,
- zeroized