Limit search to available items
Book Cover
E-book

Title Encyclopedia of cryptography and security / editor-in-chief, Henk C.A. van Tilborg
Published New York : Springer, 2005

Copies

Description 1 online resource (x, 684 pages) : illustrations
Series PIR (Series)
Contents List of Advisory Board Members -- List of Contributors -- Preface -- A -- A5/1 -- ABA DIGITAL SIGNATURE GUIDELINES -- ACCESS CONTROL -- ACCESS STRUCTURE -- ACQUIRER -- ADAPTIVE CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT ATTACK ALBERTI ENCRYPTION -- ALPHABET -- ANONYMITY -- ASYMMETRIC CRYPTOSYSTEM -- ATTRIBUTE CERTIFICATE -- ATTRIBUTES MANAGEMENT -- AUTHENTICATED ENCRYPTION -- AUTHENTICATION -- AUTHENTICATION TOKEN -- AUTHORIZATION ARCHITECTURE -- AUTHORIZATIONS MANAGEMENT
AUTHORIZATION POLICYAUTOCORRELATION -- AVAILABILITY -- B -- BEAUFORT ENCRYPTION -- BERLEKAMPÃ?MASSEY ALGORITHM -- BERLEKAMP Q-MATRIX -- BINARY EUCLIDEAN ALGORITHM -- BINARY EXPONENTIATION -- BINOMIAL DISTRIBUTION -- BIOMETRICS -- BIRTHDAY PARADOX -- BLIND SIGNATURE -- BLINDING TECHNIQUES -- BLOCK CIPHERS -- BLOWFISH -- BLS SHORT DIGITAL SIGNATURES -- BLUM INTEGER -- BLUMÃ?BLUMÃ?SHUB PSEUDORANDOM BIT GENERATOR -- BLUMÃ?GOLDWASSER PUBLIC KEY ENCRYPTION SYSTEM -- BOLERO.NET -- BOOLEAN FUNCTIONS -- BOOMERANG ATTACK -- BROADCAST ENCRYPTION
C C SAR CIPHER CAMELLIACAST -- CBC-MAC AND VARIANTS -- CCIT2-CODE -- CEPS STANDARD -- CERTIFICATE -- CERTIFICATE MANAGEMENT -- CERTIFICATE OF PRIMALITY -- CERTIFICATE REVOCATION -- CERTIFICATION AUTHORITY -- CERTIFIED MAIL -- CHAFFING AND WINNOWING -- CHALLENGEÃ?RESPONSE IDENTIFICATION -- CHAUM BLIND SIGNATURE SCHEME -- CHINESE REMAINDER THEOREM -- CHOSEN CIPHERTEXT ATTACK -- CHOSEN PLAINTEXT ATTACK -- CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- CIPHERTEXT-ONLY ATTACK -- CLAW-FREE -- CLIP SCHEME -- CLOCK-CONTROLLED GENERATOR
CLOSEST VECTOR PROBLEMCODEBOOK ATTACK -- COLLISION ATTACK -- COLLISION RESISTANCE -- COMBINATION GENERATOR -- COMMITMENT -- COMMON CRITERIA -- COMMUNICATION CHANNEL ANONYMITY -- COMPROMISING EMANATIONS -- COMPUTATIONAL COMPLEXITY -- CONTRACT SIGNING -- CONTROL VECTORS -- COPY PROTECTION -- CORRECTING-BLOCK ATTACK -- CORRELATION ATTACK FOR STREAM CIPHERS -- CORRELATION IMMUNE AND RESILIENT BOOLEAN FUNCTIONS -- COVERT CHANNELS -- CPS, CERTIFICATE PRACTICE STATEMENT -- CRAMERÃ?SHOUP PUBLIC KEY SYSTEM -- CREDENTIALS -- CROSS-CORRELATION
CRYPTANALYSISCRYPTO MACHINES -- CRYPTOLOGY -- CRYPTOSYSTEM -- CRYPTREC -- CUT-AND-CHOOSE PROTOCOL -- CYCLIC CODES -- D -- DATA ENCRYPTION STANDARD (DES) -- DATA REMANENCE -- DAVIESÃ?MEYER HASH FUNCTION -- DC NETWORK -- DEBRUIJN SEQUENCE -- DECISIONAL DIFFIEÃ? HELLMAN ASSUMPTION -- DECRYPTION EXPONENT -- DENIABLE ENCRYPTION -- DENIAL OF SERVICE -- DERIVED KEY -- DESIGNATED CONFIRMER SIGNATURE -- DES-X (OR DESX) -- DICTIONARY ATTACK (I) -- DICTIONARY ATTACK (II) -- DIFFERENTIAL CRYPTANALYSIS
Summary This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification.- Block ciphers and stream ciphers.- Computational issues.- Copy protection.- Cryptanalysis and security.- Cryptographic protocols.- Electronic payment and digital certificates.- Elliptic curve cryptography.- Factorization algorithms and primality tests.- Hash functions and MACs.- Historical systems.- Identity-based cryptography.- Implementation aspects for smart cards and standards.- Key management.- Multiparty computations like voting schemes.- Public key cryptography.- Quantum cryptography.- Secret sharing schemes.- Sequences.- Web security. The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject
Bibliography Includes bibliographical references and index
Notes English
Print version record
In Springer Nature eReference
Subject Cryptography -- Encyclopedias
Data protection -- Encyclopedias
Data protection.
Cryptographie.
Protection de l'information (Informatique)
Cryptografie.
Computerbeveiliging.
Databescherming.
Cryptographie (Informatique)
Sécurité des données.
Cryptography.
Informatique.
Cryptography
Data protection
Cryptografie.
Computerbeveiliging.
Databescherming.
Cryptographie (Informatique)
Sécurité des données.
Kryptologi -- uppslagsverk.
IT-säkerhet -- uppslagsverk.
Genre/Form encyclopedias.
Encyclopedias
Encyclopedias.
Encyclopédies.
Form Electronic book
Author Tilborg, Henk C. A. van, 1947-
ISBN 9780387234830
0387234837
038723473X
9780387234731