


default search action
Encyclopedia of Cryptography and Security 2005
- Henk C. A. van Tilborg:

Encyclopedia of Cryptography and Security. Springer 2005, ISBN 978-0-387-23473-1
A
- Anne Canteaut:

A5/1. - Peter Landrock:

ABA digital signature guidelines. - Gerald Brose:

Access Control. - Yvo Desmedt:

Access structure. - Peter Landrock:

Acquirer. - Alex Biryukov:

Adaptive Chosen Ciphertext Attack. - Alex Biryukov:

Adaptive Chosen Plaintext and Chosen Ciphertext Attack. - Alex Biryukov:

Adaptive Chosen Plaintext Attack. - Friedrich L. Bauer:

Alberti encryption. - Friedrich L. Bauer:

Alphabet. - Gerrit Bleumer:

Anonymity. - Burton S. Kaliski Jr.:

Asymmetric Cryptosystem. - Peter Landrock:

Attribute certificate. - Carlisle Adams:

Attributes management. - John Black:

Authenticated encryption. - Gregory A. Kabatiansky, Ben J. M. Smeets:

Authentication. - Robert J. Zuccherato:

Authentication token. - Carlisle Adams:

Authorization architecture. - Carlisle Adams:

Authorization Policy. - Carlisle Adams:

Authorizations management. - Tor Helleseth:

Autocorrelation. - Eric Cronin:

Availability.
B
- Friedrich L. Bauer:

Beaufort Encryption. - Burton S. Kaliski Jr.:

Berlekamp Q-matrix. - Anne Canteaut:

Berlekamp-Massey algorithm. - Berk Sunar:

Binary Euclidean Algorithm. - Bodo Möller:

Binary exponentiation. - Burton S. Kaliski Jr.:

Binomial Distribution. - Arun Ross, Anil K. Jain:

Biometrics. - Arjen K. Lenstra:

Birthday Paradox. - Gerrit Bleumer:

Blind Signature. - Gerrit Bleumer:

Blinding Techniques. - Lars R. Knudsen:

Block ciphers. - Christophe De Cannière:

Blowfish. - Dan Boneh:

BLS Short Digital Signatures. - Burton S. Kaliski Jr.:

Blum Integer. - Dan Boneh:

Blum-Blum-Shub Pseudorandom Bit Generator. - Dan Boneh:

Blum-Goldwasser Public Key Encryption System. - Peter Landrock:

Bolero.net. - Claude Carlet:

Boolean Functions. - Alex Biryukov:

Boomerang Attack. - Dalit Naor:

Broadcast Encryption.
C
- Christophe De Cannière:

Camellia. - Christophe De Cannière:

CAST. - Bart Preneel:

CBC-MAC and Variants. - Friedrich L. Bauer:

CCIT2-code. - Peter Landrock:

CEPS Standard. - Carlisle Adams:

Certificate. - Carlisle Adams:

Certificate Management. - Anton Stiglic:

Certificate of Primality. - Carlisle Adams:

Certificate Revocation. - Carlisle Adams:

Certification Authority. - Matthias Schunter:

Certified Mail. - Gerrit Bleumer:

Chaffing and Winnowing. - Mike Just

:
Challenge-Response Identification. - Gerrit Bleumer:

Chaum Blind Signature Scheme. - Henk C. A. van Tilborg:

Chinese Remainder Theorem. - Alex Biryukov:

Chosen Ciphertext Attack. - Alex Biryukov:

Chosen Plaintext and Chosen Ciphertext Attack. - Alex Biryukov:

Chosen Plaintext Attack. - Alex Biryukov:

Ciphertext-Only Attack. - Burton S. Kaliski Jr.:

Claw-Free. - Peter Landrock:

Clip Scheme. - Caroline Fontaine:

Clock-Controlled Generator. - Daniele Micciancio

:
Closest Vector Problem. - Alex Biryukov:

Codebook Attack. - Bart Preneel:

Collision Attack. - Bart Preneel:

Collision resistance. - Anne Canteaut:

Combination generator. - Claude Crépeau:

Commitment. - Tom Caddy:

Common Criteria. - Gerrit Bleumer:

Communication Channel Anonymity. - Markus Kuhn:

compromising emanations. - Salil P. Vadhan:

Computational Complexity. - Matthias Schunter:

Contract Signing. - Peter Landrock:

Control Vectors. - Gerrit Bleumer:

Copy Protection. - Bart Preneel:

Correcting-block attack. - Anne Canteaut:

Correlation Attack for Stream Ciphers. - Claude Carlet:

Correlation Immune and Resilient Boolean Functions. - Yvo Desmedt:

Covert Channels. - Torben P. Pedersen:

CPS, Certificate Practice Statement. - Dan Boneh:

Cramer-Shoup Public Key System. - Gerrit Bleumer:

Credentials. - Tor Helleseth:

Cross-Correlation. - Friedrich L. Bauer:

Cryptanalysis. - Friedrich L. Bauer:

Crypto Machines. - Friedrich L. Bauer:

Cryptology. - Friedrich L. Bauer:

Cryptosystem. - Hideki Imai, Atsuhiro Yamagishi:

Cryptrec. - Claude Crépeau:

Cut-and-choose protocol. - Pascale Charpin:

Cyclic Codes. - Friedrich L. Bauer:

Cæsar cipher.
D
- Alex Biryukov, Christophe De Cannière:

Data encryption standard (DES). - Markus Kuhn:

Data Remanence. - Bart Preneel:

Davies-Meyer Hash Function. - Gerrit Bleumer:

DC Network. - Tor Helleseth:

DeBruijn sequence. - Ran Canetti:

Decisional Diffie-Hellman Assumption. - Burton S. Kaliski Jr.:

Decryption Exponent. - Yvo Desmedt:

Deniable encryption. - Eric Cronin:

Denial of Service. - Peter Landrock:

Derived key. - Alex Biryukov:

DES-X (or DESX). - Gerrit Bleumer:

Designated Confirmer Signature. - Alex Biryukov:

Dictionary Attack (I). - Carlisle Adams:

Dictionary Attack (II). - Eli Biham:

Differential Cryptanalysis. - Tom Caddy:

Differential Power Analysis. - Alex Biryukov:

Differential-Linear Attack. - Mike Just

:
Diffie-Hellman Key Agreement. - Igor E. Shparlinski:

Diffie-Hellman Problem. - Kazue Sako:

digital signature schemes. - Dan Boneh:

Digital Signature Standard. - Christian Cachin:

Digital Steganography. - Daniel Gordon:

Discrete Logarithm Problem.
E
- Caroline Fontaine:

E0 (Bluetooth). - Jean-Jacques Quisquater:

Eavesdropper. - Darrel Hankerson, Alfred Menezes:

ECC Challenges. - Jean-Jacques Quisquater, David Samyde:

Electromagnetic Attack. - Gerrit Bleumer:

Electronic Cash. - Peter Landrock:

Electronic Cheque. - Peter Landrock:

Electronic Negotiable Instruments. - Gerrit Bleumer:

Electronic payment. - Gerrit Bleumer:

Electronic Postage. - Kazue Sako:

Electronic Voting Schemes. - Gerrit Bleumer:

Electronic Wallet. - Dan Boneh:

Elgamal Digital Signature Scheme. - Yvo Desmedt:

ElGamal Public Key Encryption. - Darrel Hankerson, Alfred Menezes:

Elliptic Curve. - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Cryptography. - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Discrete Logarithm Problem. - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Key Agreement Schemes. - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Keys. - Paul Zimmermann:

Elliptic Curve Method. - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Point Multiplication Using Halving. - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Public-Key Encryption Schemes. - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Signature Schemes. - François Morain:

Elliptic Curves for Primality Proving. - Marijke De Soete, Michael Ward:

EMV. - Friedrich L. Bauer:

Encryption. - Burton S. Kaliski Jr.:

Encryption Exponent. - Carlisle Adams:

Entitlements Management. - Robert J. Zuccherato:

Entity Authentication. - Berk Sunar:

Euclidean Algorithm. - Burton S. Kaliski Jr.:

Euler's Totient Function. - Michael J. Wiener:

Exhaustive Key Search. - Gerrit Bleumer:

Existential Forgery. - Burton S. Kaliski Jr.:

Exponential Time. - Christof Paar:

Exponentiation Algorithms. - Burton S. Kaliski Jr.:

Extension Field.
F
- Burton S. Kaliski Jr.:

Factor Base. - Arjen K. Lenstra:

Factoring Circuits. - Gerrit Bleumer:

Fail-Stop Signature. - Matthias Schunter:

Fair Exchange. - Anne Canteaut:

Fast Correlation Attack. - Olivier Benoît:

Fault Attack. - Christophe De Cannière:

FEAL. - Alex Biryukov:

Feistel Cipher. - Moses D. Liskov:

Fermat Primality Test. - Moses D. Liskov:

Fermat's Little Theorem. - Yvo Desmedt:

Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme. - Burton S. Kaliski Jr.:

Field. - Burton S. Kaliski Jr.:

Field Polynomial. - Anne Canteaut:

Filter Generator. - Alexander Barg, Gregory A. Kabatiansky:

Fingerprinting. - Burton S. Kaliski Jr.:

Finite Field. - Tom Caddy:

FIPS 140-2. - Niels Provos:

Firewall. - André Weimerskirch:

Fixed-Base Exponentiation. - André Weimerskirch:

Fixed-Exponent Exponentiation. - Gerrit Bleumer:

Forgery.
G
- Tor Helleseth:

Gap. - Jerome A. Solinas:

Generalized Mersenne Prime. - Burton S. Kaliski Jr.:

Generator. - Gerrit Bleumer:

GMR Signature. - Kazue Sako:

Goldwasser-Micali Encryption Scheme. - Tor Helleseth:

Golomb'S Randomness Postulates. - Christophe De Cannière:

GOST. - Scott Contini:

Greatest Common Divisor. - Burton S. Kaliski Jr.:

Group. - Mike Burmester:

Group Key Agreement. - Gerrit Bleumer:

Group Signatures.
H
- Burton S. Kaliski Jr.:

Hard-Core Bit. - Laurent Sustek:

Hardware Security Module. - Bart Preneel:

Hash functions. - Bart Preneel:

HMAC. - Burton S. Kaliski Jr.:

Homomorphism. - Torben P. Pedersen:

HTTPS, Secure HTTPS.
I
- Alex Biryukov:

IDEA. - Carlisle Adams:

Identification. - Joe Pato:

Identity Management. - Robert J. Zuccherato:

Identity Verification Protocol. - Benoît Libert, Jean-Jacques Quisquater:

Identity-Based Cryptosystems. - Martin Gagné:

Identity-Based Encryption. - Carlisle Adams:

Impersonation Attack. - Alex Biryukov:

Impossible Differential Attack. - Kim Nguyen:

Index Calculus. - Friedrich L. Bauer:

Information Theory. - Arjen K. Lenstra:

Integer Factoring. - Berry Schoenmakers:

Interactive Argument. - Berry Schoenmakers:

Interactive Proof. - Christophe De Cannière:

Interpolation Attack. - Toni Farley, Jill Joseph:

Intrusion Detection. - Assia Tria, Hamid Choukri:

Invasive Attacks. - Anne Canteaut:

Inversion attack. - Christof Paar:

Inversion in Finite Fields and Rings. - Alex Biryukov:

IPES. - Patrick D. McDaniel:

IPsec. - Burton S. Kaliski Jr.:

Irreducible Polynomial. - Peter Landrock:

Issuer. - Jorge Guajardo:

Itoh-Tsujii Inversion Algorithm.
J
- Burton S. Kaliski Jr.:

Jacobi Symbol.
K
- André Weimerskirch:

Karatsuba algorithm. - Christophe De Cannière:

Kasumi/Misty1. - Carlisle Adams:

Kerberos Authentication Protocol. - Friedrich L. Bauer:

Key. - Mike Just

:
Key agreement. - Robert J. Zuccherato:

Key Authentication. - Peter Landrock:

Key Encryption Key. - Miles E. Smid:

Key escrow. - Steve Lloyd:

Key management. - Yvo Desmedt:

Knapsack cryptographic schemes. - Alex Biryukov:

Known plaintext attack.
L
- Arjen K. Lenstra:

L-Notation. - Phong Q. Nguyen:

Lattice. - Daniele Micciancio

:
Lattice Based Cryptography. - Phong Q. Nguyen:

Lattice Reduction. - Scott Contini:

Least Common Multiple. - Burton S. Kaliski Jr.:

Legendre Symbol. - Anne Canteaut:

Linear Complexity. - Caroline Fontaine:

Linear Congruential Generator. - Anne Canteaut:

Linear Consistency Attack. - Alex Biryukov, Christophe De Cannière:

Linear Cryptanalysis for Block Ciphers. - Anne Canteaut:

Linear Cryptanalysis for Stream Ciphers. - Anne Canteaut:

Linear Feedback Shift Register. - Anne Canteaut:

Linear Syndrome Attack. - Lars R. Knudsen:

Luby-Rackoff Ciphers.
M
- Bart Preneel:

Maa. - Bart Preneel:

MAC Algorithms. - Yvo Desmedt:

Man-in-the-Middle Attack. - Christophe De Cannière:

Mars. - Bart Preneel:

Mash Hash Functions (Modular Arithmetic Secure Hash). - Carlisle Adams:

Master Key. - Moses D. Liskov:

Maurer's Method. - Tor Helleseth:

Maximal-Length Linear Sequence. - Friedrich L. Bauer:

Maxims. - Nicolas Sendrier:

McEliece Public Key Cryptosystem. - Antoon Bosselaers:

Md4-Md5. - Bart Preneel:

MDC-2 and MDC-4. - Alex Biryukov:

Meet-in-the-Middle Attack. - Jerome A. Solinas:

Mersenne Prime. - Moses D. Liskov:

Miller-Rabin Probabilistic Primality Test. - Anne Canteaut:

Minimal Polynomial. - Burton S. Kaliski Jr.:

MIPS-Year. - Alex Biryukov:

Miss-in-the-Middle Attack. - Matthew K. Franklin:

Mix Networks. - Bart Preneel:

Modes of Operation of a Block Cipher. - Scott Contini, Çetin Kaya Koç, Colin D. Walter:

Modular Arithmetic. - Scott Contini:

Modular Root. - Scott Contini:

Modulus. - Peter Landrock:

Mondex. - Çetin Kaya Koç, Colin D. Walter:

Montgomery Arithmetic. - Burton S. Kaliski Jr.:

Moore's Law. - Berry Schoenmakers:

Multiparty Computation. - Alex Biryukov:

Multiple Encryption. - Berk Sunar:

Multiprecision Multiplication. - Berk Sunar:

Multiprecision Squaring. - Alex Biryukov:

Multiset Attack.
N
- Mike Just

:
Needham-Schroeder Protocols. - Bart Preneel:

NESSIE Project. - Nicolas Sendrier:

Niederreiter Encryption Scheme. - Berry Schoenmakers:

Noninteractive Proof. - Caroline Fontaine:

Nonlinear Feedback Shift Register. - Claude Carlet:

Nonlinearity of Boolean Functions. - Cynthia Dwork:

Nonmalleability. - Randy Sabett:

Nonrepudiation. - Gerrit Bleumer:

Nonsecret Encryption. - William Whyte:

Ntru. - Burton S. Kaliski Jr.:

Number Field. - Paul C. Leyland:

Number Field Sieve. - Scott Contini:

Number Theory. - Kazue Sako:

Nyberg-Rueppel Signature Scheme.
O
- Burton S. Kaliski Jr.:

O-Notation. - David Pointcheval:

OAEP: Optimal Asymmetric Encryption Padding. - Berry Schoenmakers:

Oblivious Transfer. - Carlisle Adams:

One-Time Password. - Matthew J. B. Robshaw:

One-Way Function. - Christof Paar:

Optimal Extension Fields (OEFs). - Burton S. Kaliski Jr.:

Order. - Gerrit Bleumer:

Overspender Detection. - Gerrit Bleumer:

Overspending Prevention.
P
- Pascal Paillier:

Paillier Encryption and Signature Schemes. - Gerald Brose:

Password. - Peter Landrock:

Payment card. - Torben P. Pedersen:

PEM, Privacy Enhanced Mail. - Tom Caddy:

Penetration Testing. - Hugo Krawczyk:

Perfect Forward Secrecy. - Carlisle Adams:

Personal Identification Number (PIN). - Kerstin Lemke, Christof Paar:

Physical Attacks. - Peter Landrock:

PKCS. - Torben P. Pedersen:

PKIX - Public Key Infrastructure (X.509). - Friedrich L. Bauer:

Playfair Cipher. - Bart Preneel:

PMAC. - Patrick D. McDaniel:

Policy. - Friedrich L. Bauer:

Polybios Square Encryption. - Burton S. Kaliski Jr.:

Polynomial Time. - Friedrich L. Bauer:

Porta Encryption. - Bart Preneel:

Preimage Resistance. - Clemens Heinrich:

Pretty Good Privacy (PGP). - Anton Stiglic:

Primality Proving Algorithm. - Anton Stiglic:

Primality Test. - Anton Stiglic:

Prime Generation. - Anton Stiglic:

Prime number. - Burton S. Kaliski Jr.:

Primitive Element. - Carlisle Adams:

Privacy. - Carlisle Adams:

Privilege Management. - Anton Stiglic:

Probabilistic Primality Test. - Kazue Sako:

Probabilistic Public-Key Encryption. - Alex Biryukov:

Product Cipher, Superencryption. - Berry Schoenmakers:

Proof of Knowledge vs. Proof of Membership. - Claude Carlet:

Propagation Characteristics of Boolean Functions. - Berry Schoenmakers:

Protocol. - Peter Landrock:

Proton. - Jerome A. Solinas:

Pseudo-Mersenne Prime. - Tor Helleseth:

Pseudo-Noise Sequence (PN-Sequence). - François Koeune:

Pseudo-random number generator. - Gerrit Bleumer:

Pseudonyms. - Anton Stiglic:

Pseudoprime. - Burton S. Kaliski Jr.:

Pseudorandom Function. - Kazue Sako:

Public Key Cryptography. - Peter Landrock:

Public Key Infrastructure. - Gerrit Bleumer:

Public Key Proxy Encryption. - Gerrit Bleumer:

Public Key Proxy Signatures.
Q
- Burton S. Kaliski Jr.:

Quadratic Residue. - Burton S. Kaliski Jr.:

Quadratic Residuosity Problem. - Robert Silverman:

Quadratic Sieve. - Gilles Brassard, Claude Crépeau:

Quantum Cryptography.
R
- David Pointcheval:

Rabin Cryptosystem. - Dan Boneh:

Rabin Digital Signature Scheme. - Jean-Jacques Quisquater, David Samyde:

Radio Frequency Attacks. - Marco Bucci:

Random Bit Generator. - Gerrit Bleumer:

Random Oracle Model. - Caroline Fontaine:

RC4. - Helena Handschuh:

RC5. - Helena Handschuh:

RC6. - Gerrit Bleumer:

Recipient Anonymity. - Pascale Charpin:

Reed-Muller Codes. - Peter Landrock:

Registration Authority. - Alex Biryukov:

Related Key Attack. - Burton S. Kaliski Jr.:

Relatively Prime. - Yvo Desmedt:

Relay Attack. - Carlisle Adams:

Replay Attack. - Carlisle Adams:

Response. - Alex Biryukov:

Resynchronization Attack. - Bodo Möller:

Right-to-Left Exponentiation. - Carlisle Adams:

Rights Management. - Joan Daemen, Vincent Rijmen:

Rijndael/AES. - Burton S. Kaliski Jr.:

Ring. - Antoon Bosselaers:

RIPEMD Family. - Burton S. Kaliski Jr.:

RSA Digital Signature Scheme. - Burton S. Kaliski Jr.:

RSA factoring challenge. - Ronald L. Rivest, Burton S. Kaliski Jr.:

RSA Problem. - David Pointcheval:

RSA Public-Key Encryption. - Tor Helleseth:

Run. - Anne Canteaut:

Running-key.
S
- Peter Landrock:

S/MIME. - Anton Stiglic:

Safe Prime. - Carlisle Adams:

Salt. - Dan Boneh:

Schnorr Digital Signature Scheme. - Mike Just

:
Schnorr Indentification Scheme. - Caroline Fontaine:

SEAL. - Bart Preneel:

Second preimage resistance. - Robert Blakley, Gregory A. Kabatiansky:

Secret Sharing Schemes. - Dan Boneh:

Secure signatures from the "strong RSA" assumption. - Clemens Heinrich:

Secure Socket Layer (SSL). - Friedrich L. Bauer:

Security. - Peter Landrock:

Security Architecture. - Tom Caddy, Gerrit Bleumer:

Security Evaluation Criteria. - Russell Housley:

Security Standards Activities. - Gerrit Bleumer:

Selective Forgery. - Caroline Fontaine:

Self-Shrinking Generator. - Caroline Fontaine:

Self-Synchronizing Stream Cipher. - Kazue Sako:

Semantic Security. - Gerrit Bleumer:

Sender Anonymity. - Tor Helleseth:

Sequences. - Christophe De Cannière:

Serpent. - Peter Landrock:

SET. - Helena Handschuh:

SHA Family (Secure Hash Algorithm). - Robert Blakley, Gregory A. Kabatiansky:

Shamir's Threshold Scheme. - Henk C. A. van Tilborg:

Shannon's Model. - Robert Blakley, Gregory A. Kabatiansky:

Share. - Daniele Micciancio

:
Shortest Vector Problem. - Caroline Fontaine:

Shrinking Generator. - Marc Joye, Francis Olivier:

Side-Channel Analysis. - Tom Caddy:

Side-Channel Attacks. - Burton S. Kaliski Jr.:

Sieving. - Sachar Paulus:

Sieving in Function Fields. - Yevgeniy Dodis:

Signcryption. - Bodo Möller:

Signed Digit Exponentiation. - Bodo Möller:

Simultaneous Exponentiation. - Alex Biryukov:

Skipjack. - Alex Biryukov:

Slide Attack. - Bodo Möller:

Sliding Window Exponentiation. - Markus Kuhn:

Smartcard tamper resistance. - Kim Nguyen:

Smoothness. - Arjen K. Lenstra:

Smoothness Probability. - Bruce Schneier:

Solitaire. - Carl M. Ellison:

SPKI/SDSI. - Peter Landrock:

SSH. - Yvo Desmedt:

Station-to-Station Protocol. - Anne Canteaut:

Stream Cipher. - Anton Stiglic:

Strong Prime. - Dan Boneh:

Strong RSA Assumption. - Alex Biryukov:

Structural Cryptanalysis. - Burton S. Kaliski Jr.:

Subexponential Time. - Burton S. Kaliski Jr.:

Subgroup. - Arjen K. Lenstra:

Subgroup Cryptosystems. - Friedrich L. Bauer:

Substitutions and permutations. - Alex Biryukov:

Substitution-Permutation (SP) Network. - Caroline Fontaine:

Summation generator. - Burton S. Kaliski Jr.:

Symmetric Cryptosystem. - Caroline Fontaine:

Synchronous Stream Cipher.
T
- Bodo Möller:

2k-Ary Exponentiation. - Tom Caddy:

Tamper Detection. - Tom Caddy:

Tamper Resistance. - Tom Caddy:

Tamper Response. - Markus Kuhn:

Tempest. - Yvo Desmedt:

Threshold Cryptography. - Gerrit Bleumer:

Threshold Signature. - Jean-Jacques Quisquater, François-Xavier Standaert

:
Time-memory tradeoffs. - Stuart Haber, Henri Massias:

Time-stamping. - François Koeune:

Timing attack. - Peter Landrock:

Token. - Benny Pinkas:

Traitor Tracing. - Clemens Heinrich:

Transport layer security (TLS). - Matthew J. B. Robshaw:

Trapdoor One-Way Function. - Christophe De Cannière:

Triple-DES. - Yvo Desmedt:

Trojan Horses, Computer Viruses and Worms. - Alex Biryukov:

Truncated Differentials. - Sharon Boeyen:

Trust Models. - Carlisle Adams:

Trusted Third Party. - Adi Shamir, Eran Tromer

:
TWIRL. - Peter Landrock:

Two-Factor Authentication. - Christophe De Cannière:

Twofish.
U
- Gerrit Bleumer:

Undeniable Signatures. - Bart Preneel:

Universal One-Way Hash Functions. - Gerrit Bleumer:

Unlinkability. - Gerrit Bleumer:

Untraceability. - Carlisle Adams:

User Authentication.
V
- Kazue Sako:

Verifiable Encryption. - Berry Schoenmakers:

Verifiable Secret Sharing. - Friedrich L. Bauer:

Vernam Cipher. - Friedrich L. Bauer:

Vigenére Encryption. - Pavan Verma:

Virus Protection. - Robert Blakley, Gregory A. Kabatiansky:

Visual Secret Sharing Schemes.
W
- Gerrit Bleumer:

Watermarking. - Alex Biryukov:

Weak keys. - Lukasz Opyrchal:

Web Security. - Glenn Durfee:

Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem. - Berry Schoenmakers:

Witness Hiding.
X
- Peter Landrock:

X.509.
Z
- Berry Schoenmakers:

Zero-knowledge.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














