Description |
1 online resource (x, 684 pages) : illustrations |
Series |
PIR (Series)
|
Contents |
List of Advisory Board Members -- List of Contributors -- Preface -- A -- A5/1 -- ABA DIGITAL SIGNATURE GUIDELINES -- ACCESS CONTROL -- ACCESS STRUCTURE -- ACQUIRER -- ADAPTIVE CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT ATTACK ALBERTI ENCRYPTION -- ALPHABET -- ANONYMITY -- ASYMMETRIC CRYPTOSYSTEM -- ATTRIBUTE CERTIFICATE -- ATTRIBUTES MANAGEMENT -- AUTHENTICATED ENCRYPTION -- AUTHENTICATION -- AUTHENTICATION TOKEN -- AUTHORIZATION ARCHITECTURE -- AUTHORIZATIONS MANAGEMENT |
|
AUTHORIZATION POLICYAUTOCORRELATION -- AVAILABILITY -- B -- BEAUFORT ENCRYPTION -- BERLEKAMPÃ?MASSEY ALGORITHM -- BERLEKAMP Q-MATRIX -- BINARY EUCLIDEAN ALGORITHM -- BINARY EXPONENTIATION -- BINOMIAL DISTRIBUTION -- BIOMETRICS -- BIRTHDAY PARADOX -- BLIND SIGNATURE -- BLINDING TECHNIQUES -- BLOCK CIPHERS -- BLOWFISH -- BLS SHORT DIGITAL SIGNATURES -- BLUM INTEGER -- BLUMÃ?BLUMÃ?SHUB PSEUDORANDOM BIT GENERATOR -- BLUMÃ?GOLDWASSER PUBLIC KEY ENCRYPTION SYSTEM -- BOLERO.NET -- BOOLEAN FUNCTIONS -- BOOMERANG ATTACK -- BROADCAST ENCRYPTION |
|
C C SAR CIPHER CAMELLIACAST -- CBC-MAC AND VARIANTS -- CCIT2-CODE -- CEPS STANDARD -- CERTIFICATE -- CERTIFICATE MANAGEMENT -- CERTIFICATE OF PRIMALITY -- CERTIFICATE REVOCATION -- CERTIFICATION AUTHORITY -- CERTIFIED MAIL -- CHAFFING AND WINNOWING -- CHALLENGEÃ?RESPONSE IDENTIFICATION -- CHAUM BLIND SIGNATURE SCHEME -- CHINESE REMAINDER THEOREM -- CHOSEN CIPHERTEXT ATTACK -- CHOSEN PLAINTEXT ATTACK -- CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- CIPHERTEXT-ONLY ATTACK -- CLAW-FREE -- CLIP SCHEME -- CLOCK-CONTROLLED GENERATOR |
|
CLOSEST VECTOR PROBLEMCODEBOOK ATTACK -- COLLISION ATTACK -- COLLISION RESISTANCE -- COMBINATION GENERATOR -- COMMITMENT -- COMMON CRITERIA -- COMMUNICATION CHANNEL ANONYMITY -- COMPROMISING EMANATIONS -- COMPUTATIONAL COMPLEXITY -- CONTRACT SIGNING -- CONTROL VECTORS -- COPY PROTECTION -- CORRECTING-BLOCK ATTACK -- CORRELATION ATTACK FOR STREAM CIPHERS -- CORRELATION IMMUNE AND RESILIENT BOOLEAN FUNCTIONS -- COVERT CHANNELS -- CPS, CERTIFICATE PRACTICE STATEMENT -- CRAMERÃ?SHOUP PUBLIC KEY SYSTEM -- CREDENTIALS -- CROSS-CORRELATION |
|
CRYPTANALYSISCRYPTO MACHINES -- CRYPTOLOGY -- CRYPTOSYSTEM -- CRYPTREC -- CUT-AND-CHOOSE PROTOCOL -- CYCLIC CODES -- D -- DATA ENCRYPTION STANDARD (DES) -- DATA REMANENCE -- DAVIESÃ?MEYER HASH FUNCTION -- DC NETWORK -- DEBRUIJN SEQUENCE -- DECISIONAL DIFFIEÃ? HELLMAN ASSUMPTION -- DECRYPTION EXPONENT -- DENIABLE ENCRYPTION -- DENIAL OF SERVICE -- DERIVED KEY -- DESIGNATED CONFIRMER SIGNATURE -- DES-X (OR DESX) -- DICTIONARY ATTACK (I) -- DICTIONARY ATTACK (II) -- DIFFERENTIAL CRYPTANALYSIS |
Summary |
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification.- Block ciphers and stream ciphers.- Computational issues.- Copy protection.- Cryptanalysis and security.- Cryptographic protocols.- Electronic payment and digital certificates.- Elliptic curve cryptography.- Factorization algorithms and primality tests.- Hash functions and MACs.- Historical systems.- Identity-based cryptography.- Implementation aspects for smart cards and standards.- Key management.- Multiparty computations like voting schemes.- Public key cryptography.- Quantum cryptography.- Secret sharing schemes.- Sequences.- Web security. The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject |
Bibliography |
Includes bibliographical references and index |
Notes |
English |
|
Print version record |
In |
Springer Nature eReference |
Subject |
Cryptography -- Encyclopedias
|
|
Data protection -- Encyclopedias
|
|
Data protection.
|
|
Cryptographie.
|
|
Protection de l'information (Informatique)
|
|
Cryptografie.
|
|
Computerbeveiliging.
|
|
Databescherming.
|
|
Cryptographie (Informatique)
|
|
Sécurité des données.
|
|
Cryptography.
|
|
Informatique.
|
|
Cryptography
|
|
Data protection
|
|
Cryptografie.
|
|
Computerbeveiliging.
|
|
Databescherming.
|
|
Cryptographie (Informatique)
|
|
Sécurité des données.
|
|
Kryptologi -- uppslagsverk.
|
|
IT-säkerhet -- uppslagsverk.
|
Genre/Form |
encyclopedias.
|
|
Encyclopedias
|
|
Encyclopedias.
|
|
Encyclopédies.
|
Form |
Electronic book
|
Author |
Tilborg, Henk C. A. van, 1947-
|
ISBN |
9780387234830 |
|
0387234837 |
|
038723473X |
|
9780387234731 |
|