| AES | Advanced Encryption Standard |
| AI | artificial intelligence |
| ANSI | American National Standards Institute |
| BSI | Bundesamt für Sicherheit in der Informationstechnik (German Federal Office for Information Security) |
| C-RAN | Cloud Radio Access Network |
| CAC | Common Access Card |
| CFIUS | Committee on Foreign Investment in the United States |
| CPU | central processing unit |
| CRQC | Cryptographically Relevant Quantum Computer |
| DES | Data Encryption Standard |
| DevOps | Software development (Dev) and IT operations (Ops) |
| DHS | Department of Homeland Security |
| ECDH | Elliptic Curve Diffie-Hellman |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| FHE | fully homomorphic encryption |
| FIPS | Federal Information Processing Standard |
| FSS | Function Secret Sharing |
| GCHQ | Government Communications Headquarters |
| GDPR | Union General Data Protection Regulation |
| GPU | graphics processing unit |
| GSM | Global System for Mobile Communications |
| HTTPS | Hypertext Transfer Protocol Secure |
| IEC | International Electrotechnical Commission |
| IETF | Internet Engineering Task Force |
| IoT | Internet of Things |
| IP | Internet protocol |
| IPsec | Internet protocol security |
| ISO | International Organization for Standardization |
| IT | information technology |
| KDC | key distribution center |
| LTE | Long Term Evolution (usually called 4G LTE) |
| MAC | method authentication code |
| MPC | multi-party computation |
| NFV | Network Functions Virtualization |
| NISQ | noisy, intermediate-scale quantum |
| NIST | National Institute of Standards and Technology |
| NSA | National Security Agency |
| ODNI | Office of the Director of National Intelligence |
| OPM | Office of Personnel Management |
| ORAM | Oblivious Random Access Memory |
| PIR | Private Information Retrieval |
| PKI | public-key infrastructure |
| PQC | post-quantum cryptography |
| PRNG | pseudo-random number generator |
| PSI | private set intersection |
| PSU | private set union |
| QKD | quantum key distribution |
| RFC | request for comments |
| RSA | Rivest-Shamir-Adleman (the developers) |
| SCADA | Supervisory Control and Data Acquisition |
| SDN | Software-Defined Networks |
| SGX | software guard extensions |
| SHA | Secure Hash Algorithm |
| SIKE | Supersingular Isogeny Key Encapsulation |
| SSL | Secure Sockets Layer |
| TLS | Transport Layer Security |
| VCAT | Visiting Committee on Advanced Technology |
| VPN | virtual private network |
| WG | working group |
| ZK | zero knowledge |