Hacking [Electronic resources] : The Art of Exploitation

Jon Erickson

نسخه متنی -صفحه : 60/ 48
نمايش فراداده

Index

K

K array, 218

kernel modification, 166

Key Scheduling Algorithm (KSA), 213-14, 218

key size, 174

keystream, 179, 215-16

KSA (Key Scheduling Algorithm), 213-14, 218