incollection

# mdate key publtype author title pages year booktitle ee crossref url cite number publisher note cdrom chapter conf
1 2017-07-12 reference/crypt/Bhanu11 encyclopedia Bir Bhanu Ear Shape for Biometric Identification. 372-378 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_738 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bhanu11
2 2017-07-12 reference/crypt/X11w encyclopedia ARP Poisoning. 47 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1000 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11w
3 2017-07-12 reference/crypt/Soete11o encyclopedia Marijke De Soete Token. 1305-1306 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_309 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11o
4 2017-07-12 reference/crypt/Cheng11 encyclopedia Chen-Mou Cheng Multi-Threaded Implementation for Cryptography and Cryptanalysis. 823-824 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_439 reference/crypt/2011 db/reference/crypt/crypt2011.html#Cheng11
5 2017-09-06 reference/crypt/YuLR11 encyclopedia Shucheng Yu,Wenjing Lou,Kui Ren 0001 Privacy-Preserving Authentication in Wireless Access Networks. 972-974 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_51 reference/crypt/2011 db/reference/crypt/crypt2011.html#YuLR11
6 2017-07-12 reference/crypt/Soete11e encyclopedia Marijke De Soete Issuer. 650 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_290 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11e
7 2017-07-12 reference/crypt/X11hh encyclopedia Malware. 750 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1320 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hh
8 2017-07-12 reference/crypt/X11jr encyclopedia Private Key Cryptosystem. 976 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1139 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jr
9 2017-07-12 reference/crypt/X11id encyclopedia Multicast Stream Authentication. 808 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1099 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11id
10 2017-07-12 reference/crypt/Adams05o encyclopedia Carlisle Adams Personal Identification Number (PIN). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_299 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05o
11 2017-07-12 reference/crypt/Biryukov05k encyclopedia Alex Biryukov Differential-Linear Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_109 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05k
12 2017-07-12 reference/crypt/Bleumer11n encyclopedia Gerrit Bleumer Existential Forgery. 433-434 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_202 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11n
13 2017-07-12 reference/crypt/Ellison11 encyclopedia Carl M. Ellison Entropy Sources. 421-423 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_201 reference/crypt/2011 db/reference/crypt/crypt2011.html#Ellison11
14 2017-07-12 reference/crypt/X11gh encyclopedia Inversion in Galois Fields. 632 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1102 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gh
15 2017-07-12 reference/crypt/Naccache11i encyclopedia David Naccache Naccache-Stern Higher Residues Cryptosystem. 829 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_893 reference/crypt/2011 db/reference/crypt/crypt2011.html#Naccache11i
16 2017-07-12 reference/crypt/Boneh05b encyclopedia Dan Boneh Blum-Goldwasser Public Key Encryption System. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_38 reference/crypt/2005 db/reference/crypt/crypt2005.html#Boneh05b
17 2017-07-12 reference/crypt/Kaliski11k encyclopedia Burt Kaliski Field. 458 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_407 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11k
18 2017-07-12 reference/crypt/Kaliski05xe encyclopedia Burton S. Kaliski Jr. Relatively Prime. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_351 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05xe
19 2017-07-12 reference/crypt/Bauer05a encyclopedia Friedrich L. Bauer Alphabet. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_10 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05a
20 2017-07-12 reference/crypt/Landrock05h encyclopedia Peter Landrock Electronic Cheque. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_122 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05h
21 2017-07-12 reference/crypt/Knudsen11a encyclopedia Lars R. Knudsen CLEFIA. 210-211 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_561 reference/crypt/2011 db/reference/crypt/crypt2011.html#Knudsen11a
22 2017-07-12 reference/crypt/X11fc encyclopedia Higher Order Derivative Attack. 556 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1104 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fc
23 2017-07-12 reference/crypt/Li11 encyclopedia Stan Z. Li Biometrics in Video Surveillance. 139-142 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_733 reference/crypt/2011 db/reference/crypt/crypt2011.html#Li11
24 2017-07-12 reference/crypt/Kaliski05i encyclopedia Burton S. Kaliski Jr. Extension Field. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_151 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05i
25 2017-07-12 reference/crypt/Smith11c encyclopedia Sean W. Smith Logic Bomb. 734 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_708 reference/crypt/2011 db/reference/crypt/crypt2011.html#Smith11c
26 2017-07-12 reference/crypt/WongchaowartL11 encyclopedia Brian Wongchaowart,Adam J. Lee Trust Management. 1320-1323 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_832 reference/crypt/2011 db/reference/crypt/crypt2011.html#WongchaowartL11
27 2017-07-12 reference/crypt/Desmedt05i encyclopedia Yvo Desmedt Threshold Cryptography. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_428 reference/crypt/2005 db/reference/crypt/crypt2005.html#Desmedt05i
28 2017-07-12 reference/crypt/Schoenmakers05d encyclopedia Berry Schoenmakers Oblivious Transfer. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_285 reference/crypt/2005 db/reference/crypt/crypt2005.html#Schoenmakers05d
29 2017-07-12 reference/crypt/Canteaut11m encyclopedia Anne Canteaut Running-Key. 1073 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_368 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11m
30 2017-07-12 reference/crypt/Bleumer11ae encyclopedia Gerrit Bleumer Unlinkability. 1350 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_236 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11ae
31 2017-07-12 reference/crypt/Kaliski11s encyclopedia Burt Kaliski Legendre Symbol. 716 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_418 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11s
32 2017-07-12 reference/crypt/X11bv encyclopedia Computationally Sound Proof System. 245 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1198 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bv
33 2017-07-12 reference/crypt/X11bq encyclopedia Code Verification. 215 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1370 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bq
34 2017-07-12 reference/crypt/Sendrier11b encyclopedia Nicolas Sendrier Niederreiter Encryption Scheme. 842-843 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_385 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sendrier11b
35 2017-07-12 reference/crypt/ShamirT11 encyclopedia Adi Shamir,Eran Tromer TWIRL. 1338-1339 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_483 reference/crypt/2011 db/reference/crypt/crypt2011.html#ShamirT11
36 2017-07-12 reference/crypt/X11ih encyclopedia Near Field Communication. 829 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1080 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ih
37 2017-07-12 reference/crypt/Canniere05a encyclopedia Christophe De Cannière Camellia. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_44 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canniere05a
38 2017-07-12 reference/crypt/Meadows11d encyclopedia Catherine A. Meadows Theorem Proving and Security. 1285-1287 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_869 reference/crypt/2011 db/reference/crypt/crypt2011.html#Meadows11d
39 2017-07-12 reference/crypt/X11ln encyclopedia Secure Wireless Mesh Networks. 1143 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1194 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ln
40 2017-07-12 reference/crypt/Soete11q encyclopedia Marijke De Soete User Verification Method. 1352 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_311 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11q
41 2017-07-12 reference/crypt/Samarati11 encyclopedia Pierangela Samarati Administrative Policies. 21-23 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_808 reference/crypt/2011 db/reference/crypt/crypt2011.html#Samarati11
42 2017-07-12 reference/crypt/Plate11 encyclopedia Angelika Plate ISMS: A Management Framework for Information Security. 647-648 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_289 reference/crypt/2011 db/reference/crypt/crypt2011.html#Plate11
43 2017-07-12 reference/crypt/Heinrich05 encyclopedia Clemens Heinrich Pretty Good Privacy (PGP). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_310 reference/crypt/2005 db/reference/crypt/crypt2005.html#Heinrich05
44 2017-07-12 reference/crypt/Adams05l encyclopedia Carlisle Adams Kerberos Authentication Protocol. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_216 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05l
45 2017-07-12 reference/crypt/Kopsell11 encyclopedia Stefan Köpsell Anonymous Web Browsing and Publishing. 40-42 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_649 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kopsell11
46 2017-07-12 reference/crypt/Sako05g encyclopedia Kazue Sako Verifiable Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_451 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sako05g
47 2017-07-12 reference/crypt/Biryukov05z encyclopedia Alex Biryukov Structural Cryptanalysis. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_415 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05z
48 2017-07-12 reference/crypt/Moller11e encyclopedia Bodo Möller 2 1340-1341 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_48 reference/crypt/2011 db/reference/crypt/crypt2011.html#Moller11e
49 2017-07-12 reference/crypt/X11br encyclopedia Commercial Off-the-Shelf. 224 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1394 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11br
50 2017-07-12 reference/crypt/X11en encyclopedia Galois Message Authentication Code. 508 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1191 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11en
51 2017-07-12 reference/crypt/Kaliski05p encyclopedia Burton S. Kaliski Jr. Hard-Core Bit. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_184 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05p
52 2017-07-12 reference/crypt/Li11b encyclopedia Ninghui Li Trust Management. 1323-1325 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_840 reference/crypt/2011 db/reference/crypt/crypt2011.html#Li11b
53 2017-07-12 reference/crypt/X11ee encyclopedia File System Permissions. 458 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1314 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ee
54 2017-09-25 reference/crypt/Lange11c encyclopedia Tanja Lange 0001 Vector Space. 1356 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_484 reference/crypt/2011 db/reference/crypt/crypt2011.html#Lange11c
55 2017-07-12 reference/crypt/Biryukov05t encyclopedia Alex Biryukov Multiset Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_269 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05t
56 2017-07-12 reference/crypt/Bauer05f encyclopedia Friedrich L. Bauer Cryptology. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_89 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05f
57 2017-07-12 reference/crypt/X11me encyclopedia Software-Optimized Encryption Algorithm. 1229 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1111 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11me
58 2017-07-12 reference/crypt/X11an encyclopedia Biometric Information Ethics. 98 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1258 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11an
59 2017-07-12 reference/crypt/Adams05p encyclopedia Carlisle Adams Privacy. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_316 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05p
60 2017-07-12 reference/crypt/Sako11f encyclopedia Kazue Sako Semantic Security. 1176-1177 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_23 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sako11f
61 2017-07-12 reference/crypt/Ross11 encyclopedia Arun Ross Multibiometrics. 804-808 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_743 reference/crypt/2011 db/reference/crypt/crypt2011.html#Ross11
62 2017-07-12 reference/crypt/Bleumer11x encyclopedia Gerrit Bleumer Public Key Proxy Signatures. 999-1001 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_218 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11x
63 2017-07-12 reference/crypt/Kaliski05h encyclopedia Burton S. Kaliski Jr. Exponential Time. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_149 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05h
64 2017-07-12 reference/crypt/Alves-Foss11 encyclopedia Jim Alves-Foss Multiple Independent Levels of Security. 815-818 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_865 reference/crypt/2011 db/reference/crypt/crypt2011.html#Alves-Foss11
65 2017-07-12 reference/crypt/Desmedt05e encyclopedia Yvo Desmedt Knapsack cryptographic schemes. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_223 reference/crypt/2005 db/reference/crypt/crypt2005.html#Desmedt05e
66 2017-07-12 reference/crypt/Kaliski11g encyclopedia Burt Kaliski Euler's Totient Function. 430 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_403 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11g
67 2017-07-12 reference/crypt/Canetti05 encyclopedia Ran Canetti Decisional Diffie-Hellman Assumption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_99 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canetti05
68 2017-07-12 reference/crypt/Nita-RotaruC11 encyclopedia Cristina Nita-Rotaru,Reza Curtmola Secure Network Coding for Wireless Mesh Networks. 1123-1126 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_58 reference/crypt/2011 db/reference/crypt/crypt2011.html#Nita-RotaruC11
69 2017-07-12 reference/crypt/Preneel11m encyclopedia Bart Preneel MDC-2 and MDC-4. 771-772 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_596 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11m
70 2017-07-12 reference/crypt/Landrock05s encyclopedia Peter Landrock Security Architecture. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_377 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05s
71 2017-07-12 reference/crypt/X11h encyclopedia AES. 26 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1207 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11h
72 2017-07-12 reference/crypt/Bauer11 encyclopedia Friedrich L. Bauer Alberti Encryption. 29-31 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_159 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11
73 2017-07-12 reference/crypt/Campi11 encyclopedia Alessandro Campi Roles in SQL. 1055-1057 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_685 reference/crypt/2011 db/reference/crypt/crypt2011.html#Campi11
74 2017-07-12 reference/crypt/X11ak encyclopedia Biometric Cryptosystem. 90 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1378 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ak
75 2017-07-12 reference/crypt/Nguyen05 encyclopedia Kim Nguyen Index Calculus. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_198 reference/crypt/2005 db/reference/crypt/crypt2005.html#Nguyen05
76 2017-07-12 reference/crypt/X11ml encyclopedia SSL. 1253 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1042 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ml
77 2017-07-12 reference/crypt/Whyte05 encyclopedia William Whyte Ntru. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_279 reference/crypt/2005 db/reference/crypt/crypt2005.html#Whyte05
78 2017-07-12 reference/crypt/Biryukov11aa encyclopedia Alex Biryukov Substitution-Permutation (SP) Network. 1268 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_619 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11aa
79 2017-07-12 reference/crypt/Fontaine05i encyclopedia Caroline Fontaine Summation generator. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_421 reference/crypt/2005 db/reference/crypt/crypt2005.html#Fontaine05i
80 2017-07-12 reference/crypt/X11nd encyclopedia TCP SYN Cookies. 1283 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1070 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nd
81 2017-07-12 reference/crypt/Brose11b encyclopedia Gerald Brose Rainbow Tables. 1021-1022 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_219 reference/crypt/2011 db/reference/crypt/crypt2011.html#Brose11b
82 2017-07-12 reference/crypt/Moller11a encyclopedia Bodo Möller Right-to-Left Exponentiation. 1045-1046 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_43 reference/crypt/2011 db/reference/crypt/crypt2011.html#Moller11a
83 2017-07-12 reference/crypt/Biryukov11a encyclopedia Alex Biryukov Adaptive Chosen Plaintext and Chosen Ciphertext Attack. 21 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_544 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11a
84 2017-07-12 reference/crypt/Schunter05a encyclopedia Matthias Schunter Contract Signing. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_76 reference/crypt/2005 db/reference/crypt/crypt2005.html#Schunter05a
85 2017-07-12 reference/crypt/Cronin05 encyclopedia Eric Cronin Availability. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_22 reference/crypt/2005 db/reference/crypt/crypt2005.html#Cronin05
86 2017-07-12 reference/crypt/X11jw encyclopedia Protection. 988 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1026 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jw
87 2017-07-12 reference/crypt/X11ol encyclopedia Web SSO and Security Assertion Markup Language. 1382 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1393 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ol
88 2017-07-12 reference/crypt/Kuhn05c encyclopedia Markus Kuhn Tempest. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_427 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kuhn05c
89 2017-07-12 reference/crypt/Boneh11b encyclopedia Dan Boneh Blum-Blum-Shub Pseudorandom Bit Generator. 160-161 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_141 reference/crypt/2011 db/reference/crypt/crypt2011.html#Boneh11b
90 2017-07-12 reference/crypt/Nguyen05c encyclopedia Kim Nguyen Smoothness. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_406 reference/crypt/2005 db/reference/crypt/crypt2005.html#Nguyen05c
91 2017-07-12 reference/crypt/ZurkoS11 encyclopedia Mary Ellen Zurko,Richard T. Simon Separation of Duties. 1182-1185 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_830 reference/crypt/2011 db/reference/crypt/crypt2011.html#ZurkoS11
92 2017-07-12 reference/crypt/Bleumer05q encyclopedia Gerrit Bleumer GMR Signature. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_176 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05q
93 2017-07-12 reference/crypt/X11dw encyclopedia Euclidean Lattice. 430 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1152 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dw
94 2017-07-12 reference/crypt/Desmedt11 encyclopedia Yvo Desmedt Access Structure. 20 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_313 reference/crypt/2011 db/reference/crypt/crypt2011.html#Desmedt11
95 2017-07-12 reference/crypt/X11ip encyclopedia NSS. 857 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1160 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ip
96 2017-07-12 reference/crypt/Vimercati11b encyclopedia Sabrina De Capitani di Vimercati Authorizations. 65-68 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_810 reference/crypt/2011 db/reference/crypt/crypt2011.html#Vimercati11b
97 2017-07-12 reference/crypt/Handschuh05b encyclopedia Helena Handschuh SHA Family (Secure Hash Algorithm). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_388 reference/crypt/2005 db/reference/crypt/crypt2005.html#Handschuh05b
98 2017-07-12 reference/crypt/Preneel05p encyclopedia Bart Preneel Universal One-Way Hash Functions. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_447 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05p
99 2017-07-12 reference/crypt/Bleumer05j encyclopedia Gerrit Bleumer Electronic Cash. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_121 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05j
100 2017-07-12 reference/crypt/X11gd encyclopedia Intellectual Property. 618 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1397 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gd
101 2017-07-12 reference/crypt/Kuhn05b encyclopedia Markus Kuhn Smartcard tamper resistance. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_404 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kuhn05b
102 2017-07-12 reference/crypt/Sunar11c encyclopedia Berk Sunar Multiprecision Squaring. 821-822 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_40 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sunar11c
103 2017-07-12 reference/crypt/Soete11k encyclopedia Marijke De Soete SEPA. 1181-1182 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_305 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11k
104 2017-07-12 reference/crypt/CrosbyW11 encyclopedia Scott A. Crosby,Dan S. Wallach Algorithmic DoS. 32-33 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_261 reference/crypt/2011 db/reference/crypt/crypt2011.html#CrosbyW11
105 2017-07-12 reference/crypt/X11dl encyclopedia Electronic Check. 387 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1077 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dl
106 2017-07-12 reference/crypt/X11mo encyclopedia Stack (Buffer) Overrun. 1253 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1173 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mo
107 2017-07-12 reference/crypt/Cachin11 encyclopedia Christian Cachin Digital Steganography. 348-352 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_317 reference/crypt/2011 db/reference/crypt/crypt2011.html#Cachin11
108 2017-07-12 reference/crypt/Bleumer05w encyclopedia Gerrit Bleumer Public Key Proxy Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_333 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05w
109 2017-07-12 reference/crypt/Biryukov11t encyclopedia Alex Biryukov Multiset Attack. 822 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_601 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11t
110 2017-07-12 reference/crypt/Schoenmakers05 encyclopedia Berry Schoenmakers Interactive Argument. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_201 reference/crypt/2005 db/reference/crypt/crypt2005.html#Schoenmakers05
111 2017-07-12 reference/crypt/Culnan11 encyclopedia Mary J. Culnan Social Perspectives on Information Privacy. 1228-1229 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_903 reference/crypt/2011 db/reference/crypt/crypt2011.html#Culnan11
112 2017-07-12 reference/crypt/Biryukov11d encyclopedia Alex Biryukov Chosen Ciphertext Attack. 205 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_556 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11d
113 2017-07-12 reference/crypt/X11oa encyclopedia Voiceprint Recognition. 1364 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1277 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11oa
114 2017-07-12 reference/crypt/Alturi11 encyclopedia Vijay Alturi HRU. 562-564 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_819 reference/crypt/2011 db/reference/crypt/crypt2011.html#Alturi11
115 2017-07-12 reference/crypt/Moller11b encyclopedia Bodo Möller Signed Digit Exponentiation. 1215-1216 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_44 reference/crypt/2011 db/reference/crypt/crypt2011.html#Moller11b
116 2017-07-12 reference/crypt/Adams05c encyclopedia Carlisle Adams Authorizations management. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_19 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05c
117 2017-07-12 reference/crypt/Kaliski11h encyclopedia Burt Kaliski Exponential Time. 434 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_404 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11h
118 2017-07-12 reference/crypt/Bleumer05s encyclopedia Gerrit Bleumer Nonsecret Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_278 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05s
119 2017-07-12 reference/crypt/Kaliski11n encyclopedia Burt Kaliski Group. 519-520 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_411 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11n
120 2017-07-12 reference/crypt/Bleumer11j encyclopedia Gerrit Bleumer Electronic Cash. 385-387 2011 Encyclopedia of Cryptography and Security (2nd Ed.) reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11j
121 2017-07-12 reference/crypt/X11cn encyclopedia DAC. 295 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1328 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11cn
122 2017-07-12 reference/crypt/Bosselaers05a encyclopedia Antoon Bosselaers RIPEMD Family. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_360 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bosselaers05a
123 2017-07-12 reference/crypt/Carlet05a encyclopedia Claude Carlet Correlation Immune and Resilient Boolean Functions. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_81 reference/crypt/2005 db/reference/crypt/crypt2005.html#Carlet05a
124 2017-07-12 reference/crypt/Adams05g encyclopedia Carlisle Adams Certification Authority. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_53 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05g
125 2017-07-12 reference/crypt/Bauer11g encyclopedia Friedrich L. Bauer Cryptosystem. 284-285 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_167 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11g
126 2017-07-12 reference/crypt/Contini05b encyclopedia Scott Contini Modular Root. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_260 reference/crypt/2005 db/reference/crypt/crypt2005.html#Contini05b
127 2017-07-12 reference/crypt/StolfoBS11 encyclopedia Salvatore J. Stolfo,Brian M. Bowen,Malek Ben Salem Insider Threat Defense. 609-611 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_904 reference/crypt/2011 db/reference/crypt/crypt2011.html#StolfoBS11
128 2017-07-12 reference/crypt/Bleumer11o encyclopedia Gerrit Bleumer Fail-Stop Signature. 446-447 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_203 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11o
129 2018-11-14 reference/crypt/RichiardiK11 encyclopedia Jonas Richiardi,Krzysztof Kryszczuk Biometric Systems Evaluation. 117-124 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_729,https://www.wikidata.org/entity/Q57840439 reference/crypt/2011 db/reference/crypt/crypt2011.html#RichiardiK11
130 2017-07-12 reference/crypt/X11aq encyclopedia Biometric Passport Security. 101 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1016 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11aq
131 2017-07-12 reference/crypt/X11ne encyclopedia TCP SYN Flooding. 1283 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1071 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ne
132 2017-07-12 reference/crypt/JoyeO11 encyclopedia Marc Joye,Francis Olivier Side-Channel Analysis. 1198-1204 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_516 reference/crypt/2011 db/reference/crypt/crypt2011.html#JoyeO11
133 2017-07-12 reference/crypt/Bauer05d encyclopedia Friedrich L. Bauer Cryptanalysis. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_87 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05d
134 2017-07-12 reference/crypt/X11as encyclopedia Biometric Recognition. 104 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1251 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11as
135 2017-07-12 reference/crypt/Black11 encyclopedia J. Black Authenticated Encryption. 52-61 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_548 reference/crypt/2011 db/reference/crypt/crypt2011.html#Black11
136 2017-07-12 reference/crypt/Preneel05m encyclopedia Bart Preneel PMAC. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_304 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05m
137 2017-07-12 reference/crypt/X11ld encyclopedia Secure Computer System Model. 1102 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1336 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ld
138 2017-07-12 reference/crypt/X11fs encyclopedia Identity Proof. 587 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1301 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fs
139 2017-07-12 reference/crypt/Thornton11 encyclopedia Mitchell A. Thornton Keyboard Dynamics. 688-691 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_783 reference/crypt/2011 db/reference/crypt/crypt2011.html#Thornton11
140 2017-07-12 reference/crypt/Soete11c encyclopedia Marijke De Soete Derived Key. 328 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_284 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11c
141 2017-07-12 reference/crypt/Pedersen05c encyclopedia Torben P. Pedersen PKIX - Public Key Infrastructure (X.509). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_302 reference/crypt/2005 db/reference/crypt/crypt2005.html#Pedersen05c
142 2017-07-12 reference/crypt/Subramanian11 encyclopedia Nary Subramanian Biometric Authentication. 86-90 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_775 reference/crypt/2011 db/reference/crypt/crypt2011.html#Subramanian11
143 2017-07-12 reference/crypt/Bleumer05h encyclopedia Gerrit Bleumer DC Network. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_97 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05h
144 2017-07-12 reference/crypt/X11gb encyclopedia Integrated Circuit Card. 618 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1075 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gb
145 2017-07-12 reference/crypt/X11lg encyclopedia Secure Hash Algorithm. 1116 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1209 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lg
146 2017-07-12 reference/crypt/Soete11h encyclopedia Marijke De Soete Payment Card. 918-919 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_296 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11h
147 2017-07-12 reference/crypt/Bucci11 encyclopedia Marco Bucci Random Bit Generator. 1022-1026 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_514 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bucci11
148 2017-07-12 reference/crypt/X11ks encyclopedia Rivest Cipher 5. 1053 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1201 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ks
149 2017-07-12 reference/crypt/Desmedt05g encyclopedia Yvo Desmedt Relay Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_352 reference/crypt/2005 db/reference/crypt/crypt2005.html#Desmedt05g
150 2017-07-12 reference/crypt/Bleumer11l encyclopedia Gerrit Bleumer Electronic Postage. 389-391 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_199 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11l
151 2017-07-12 reference/crypt/Moller11c encyclopedia Bodo Möller Simultaneous Exponentiation. 1218-1220 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_45 reference/crypt/2011 db/reference/crypt/crypt2011.html#Moller11c
152 2017-07-12 reference/crypt/Schoenmakers11g encyclopedia Berry Schoenmakers Proof of Knowledge Versus Proof of Membership. 983-984 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_10 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schoenmakers11g
153 2017-07-12 reference/crypt/Stiglic11f encyclopedia Anton Stiglic Pseudoprime. 994-995 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_473 reference/crypt/2011 db/reference/crypt/crypt2011.html#Stiglic11f
154 2017-07-12 reference/crypt/Nguyen11b encyclopedia Phong Q. Nguyen Lattice Reduction. 711-713 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_457 reference/crypt/2011 db/reference/crypt/crypt2011.html#Nguyen11b
155 2017-07-12 reference/crypt/X11kt encyclopedia Rivest Cipher 6. 1053 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1203 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kt
156 2017-07-12 reference/crypt/PetitQ11 encyclopedia Christophe Petit,Jean-Jacques Quisquater Cayley Hash Functions. 183-184 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_126 reference/crypt/2011 db/reference/crypt/crypt2011.html#PetitQ11
157 2017-07-12 reference/crypt/X11nr encyclopedia Typing Patterns. 1343 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1311 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nr
158 2017-07-12 reference/crypt/Bleumer05x encyclopedia Gerrit Bleumer Public Key Proxy Signatures. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_334 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05x
159 2017-07-12 reference/crypt/Kaliski11v encyclopedia Burt Kaliski Number Field. 861 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_422 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11v
160 2017-07-12 reference/crypt/X11hi encyclopedia Maurer's Algorithm. 762 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1158 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hi
161 2017-07-12 reference/crypt/Zuccherato11 encyclopedia Robert J. Zuccherato Authentication Token. 62-63 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_68 reference/crypt/2011 db/reference/crypt/crypt2011.html#Zuccherato11
162 2017-07-12 reference/crypt/Vadhan11 encyclopedia Salil P. Vadhan Computational Complexity. 235-240 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_442 reference/crypt/2011 db/reference/crypt/crypt2011.html#Vadhan11
163 2017-07-12 reference/crypt/Kaliski11l encyclopedia Burt Kaliski Finite Field. 468 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_409 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11l
164 2017-07-12 reference/crypt/X11ib encyclopedia Multi-Exponentiation. 808 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1156 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ib
165 2017-07-12 reference/crypt/Vauclair11d encyclopedia Marc Vauclair SWP. 1270-1271 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_908 reference/crypt/2011 db/reference/crypt/crypt2011.html#Vauclair11d
166 2017-07-12 reference/crypt/HankersonM11i encyclopedia Darrel Hankerson,Alfred Menezes Koblitz Elliptic Curves. 705-706 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_872 reference/crypt/2011 db/reference/crypt/crypt2011.html#HankersonM11i
167 2017-07-12 reference/crypt/X11he encyclopedia Macrodata Disclosure Limitation. 748 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1286 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11he
168 2017-07-12 reference/crypt/Caddy05d encyclopedia Tom Caddy Side-Channel Attacks. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_395 reference/crypt/2005 db/reference/crypt/crypt2005.html#Caddy05d
169 2017-07-12 reference/crypt/X11ah encyclopedia Binary Functions. 86 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1101 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ah
170 2017-07-12 reference/crypt/X11du encyclopedia Error-Correction Decoding. 426 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1114 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11du
171 2017-07-12 reference/crypt/X11ec encyclopedia Feige-Fiat-Shamir Signature Scheme. 455 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1408 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ec
172 2017-07-12 reference/crypt/Sion11 encyclopedia Radu Sion Secure Data Outsourcing: A Brief Overview. 1105-1111 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_675 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sion11
173 2017-07-12 reference/crypt/Dodis05 encyclopedia Yevgeniy Dodis Signcryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_398 reference/crypt/2005 db/reference/crypt/crypt2005.html#Dodis05
174 2017-07-12 reference/crypt/X11fq encyclopedia ID-Based Encryption. 583 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1022 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fq
175 2017-07-12 reference/crypt/Adams05b encyclopedia Carlisle Adams Authorization Policy. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_20 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05b
176 2017-07-12 reference/crypt/X11fd encyclopedia History-Based Separation of Duties. 559 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1342 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fd
177 2017-07-12 reference/crypt/X11ep encyclopedia GCM. 509 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1148 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ep
178 2018-08-10 reference/crypt/Wang11a encyclopedia XiaoFeng Wang 0001 Memory and State Exhaustion Denial of Service. 773-774 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_270 reference/crypt/2011 db/reference/crypt/crypt2011.html#Wang11a
179 2017-07-12 reference/crypt/Gabidulin11 encyclopedia Ernst M. Gabidulin Rank Codes. 1028-1031 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_387 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gabidulin11
180 2017-07-12 reference/crypt/Canteaut11g encyclopedia Anne Canteaut Linear Complexity. 720 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_353 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11g
181 2017-07-12 reference/crypt/Thome11a encyclopedia Emmanuel Thomé Sieving in Function Fields. 1205-1206 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_476 reference/crypt/2011 db/reference/crypt/crypt2011.html#Thome11a
182 2017-07-12 reference/crypt/X11na encyclopedia Talker Recognition. 1277 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1275 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11na
183 2017-07-12 reference/crypt/X11ky encyclopedia Run-Time Malware Analysis. 1073 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1359 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ky
184 2017-07-12 reference/crypt/Pedersen11c encyclopedia Torben Pedersen PEM, Privacy-Enhanced Mail. 919-920 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_297 reference/crypt/2011 db/reference/crypt/crypt2011.html#Pedersen11c
185 2017-07-12 reference/crypt/Sako05c encyclopedia Kazue Sako Nyberg-Rueppel Signature Scheme. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_283 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sako05c
186 2017-07-12 reference/crypt/X11eb encyclopedia False Data Filtering. 448 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1216 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11eb
187 2017-07-12 reference/crypt/Desmedt05c encyclopedia Yvo Desmedt ElGamal Public Key Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_129 reference/crypt/2005 db/reference/crypt/crypt2005.html#Desmedt05c
188 2017-07-12 reference/crypt/Vadhan05 encyclopedia Salil P. Vadhan Computational Complexity. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_75 reference/crypt/2005 db/reference/crypt/crypt2005.html#Vadhan05
189 2017-07-12 reference/crypt/Desmedt11b encyclopedia Yvo Desmedt Deniable Encryption. 322-323 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_316 reference/crypt/2011 db/reference/crypt/crypt2011.html#Desmedt11b
190 2017-07-12 reference/crypt/Bleumer05v encyclopedia Gerrit Bleumer Pseudonyms. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_327 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05v
191 2017-07-12 reference/crypt/Moller11d encyclopedia Bodo Möller Sliding Window Exponentiation. 1222-1224 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_46 reference/crypt/2011 db/reference/crypt/crypt2011.html#Moller11d
192 2017-07-12 reference/crypt/X11fh encyclopedia Human Ear Biometrics. 570 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1264 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fh
193 2017-07-12 reference/crypt/X11nq encyclopedia Typing Dynamics. 1343 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1310 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nq
194 2017-07-12 reference/crypt/Jaeger11 encyclopedia Trent Jaeger Reference Monitor. 1038-1040 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_646 reference/crypt/2011 db/reference/crypt/crypt2011.html#Jaeger11
195 2017-07-12 reference/crypt/X11ff encyclopedia HTTP Cookie. 565 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1004 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ff
196 2017-07-12 reference/crypt/Morain05 encyclopedia François Morain 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_139 reference/crypt/2005 db/reference/crypt/crypt2005.html#Morain05
197 2017-07-12 reference/crypt/Preneel11p encyclopedia Bart Preneel PMAC. 941-942 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_603 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11p
198 2017-07-12 reference/crypt/X11lt encyclopedia Sensor Key Establishment and Maintenance. 1179 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1219 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lt
199 2017-07-12 reference/crypt/Knudsen05a encyclopedia Lars R. Knudsen Luby-Rackoff Ciphers. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_238 reference/crypt/2005 db/reference/crypt/crypt2005.html#Knudsen05a
200 2017-07-12 reference/crypt/Brose11a encyclopedia Gerald Brose Password. 916-918 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_213 reference/crypt/2011 db/reference/crypt/crypt2011.html#Brose11a
201 2017-07-12 reference/crypt/BlakleyK11c encyclopedia G. R. Blakley,Gregory A. Kabatiansky Visual Secret Sharing Schemes. 1363-1364 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_393 reference/crypt/2011 db/reference/crypt/crypt2011.html#BlakleyK11c
202 2017-07-12 reference/crypt/Franklin11 encyclopedia Matthew K. Franklin Mix Networks. 786-788 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_209 reference/crypt/2011 db/reference/crypt/crypt2011.html#Franklin11
203 2017-07-12 reference/crypt/Biryukov05c encyclopedia Alex Biryukov Boomerang Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_41 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05c
204 2017-07-12 reference/crypt/Helleseth11a encyclopedia Tor Helleseth Cross-Correlation. 277 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_341 reference/crypt/2011 db/reference/crypt/crypt2011.html#Helleseth11a
205 2017-07-12 reference/crypt/Biryukov11l encyclopedia Alex Biryukov Feistel Cipher. 455 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_577 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11l
206 2019-12-27 reference/crypt/LabatiS11 encyclopedia Ruggero Donida Labati,Fabio Scotti Fingerprint. 460-465 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_740 reference/crypt/2011 db/reference/crypt/crypt2011.html#LabatiS11
207 2017-07-12 reference/crypt/Bleumer11s encyclopedia Gerrit Bleumer Nonsecret Encryption. 854-857 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_210 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11s
208 2017-07-12 reference/crypt/Silverman05 encyclopedia Robert Silverman Quadratic Sieve. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_337 reference/crypt/2005 db/reference/crypt/crypt2005.html#Silverman05
209 2017-07-12 reference/crypt/X11cw encyclopedia Diffie-Hellman Key Exchange. 342 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1293 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11cw
210 2017-07-12 reference/crypt/Adams05u encyclopedia Carlisle Adams Salt. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_368 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05u
211 2017-07-12 reference/crypt/Smith11f encyclopedia Sean W. Smith Zeroization. 1401 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_723 reference/crypt/2011 db/reference/crypt/crypt2011.html#Smith11f books/aw/Smith2008,...,conf/ches/Weingart00
212 2017-07-12 reference/crypt/X11ny encyclopedia Voice Biometrics. 1364 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1276 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ny
213 2017-07-12 reference/crypt/X11ge encyclopedia Interactive Proof Systems. 619 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1249 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ge
214 2017-07-12 reference/crypt/X11eu encyclopedia Group Key Distribution. 526 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1095 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11eu
215 2017-07-12 reference/crypt/Biryukov11g encyclopedia Alex Biryukov Ciphertext-Only Attack. 207 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_560 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11g
216 2017-07-12 reference/crypt/Stiglic05a encyclopedia Anton Stiglic Primality Proving Algorithm. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_311 reference/crypt/2005 db/reference/crypt/crypt2005.html#Stiglic05a
217 2017-07-12 reference/crypt/Gabidulin11a encyclopedia Ernst M. Gabidulin Schemes Based on Rank Codes. 1079-1082 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_388 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gabidulin11a
218 2017-07-12 reference/crypt/Biryukov11j encyclopedia Alex Biryukov Dictionary Attack (I). 332 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_571 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11j
219 2017-07-12 reference/crypt/Biryukov11v encyclopedia Alex Biryukov Related Key Attack. 1040-1041 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_609 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11v
220 2017-07-12 reference/crypt/Nguyen11c encyclopedia Kim Nguyen Smoothness. 1227 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_477 reference/crypt/2011 db/reference/crypt/crypt2011.html#Nguyen11c
221 2017-07-12 reference/crypt/Naor05 encyclopedia Dalit Naor Broadcast Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_42 reference/crypt/2005 db/reference/crypt/crypt2005.html#Naor05
222 2017-07-12 reference/crypt/Kaliski05w encyclopedia Burton S. Kaliski Jr. Number Field. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_280 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05w
223 2017-07-12 reference/crypt/X11cv encyclopedia Diffie-Hellman Problem. 342 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1384 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11cv
224 2017-07-12 reference/crypt/OhLCR11 encyclopedia Tae Hwan Oh,Shinyoung Lim,Young B. Choi,Jungwoo Ryoo Security Implication in Virtualization. 1148-1156 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_797 reference/crypt/2011 db/reference/crypt/crypt2011.html#OhLCR11
225 2017-07-12 reference/crypt/Guneysu11 encyclopedia Tim Güneysu FPGAs in Cryptography. 499-501 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_31 reference/crypt/2011 db/reference/crypt/crypt2011.html#Guneysu11
226 2017-07-12 reference/crypt/Biryukov05v encyclopedia Alex Biryukov Related Key Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_350 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05v
227 2018-11-14 reference/crypt/X11li encyclopedia Secure Logging. 1121 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1246,https://www.wikidata.org/entity/Q57717545 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11li
228 2017-07-12 reference/crypt/Kaliski11x encyclopedia Burt Kaliski Order. 890-891 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_424 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11x
229 2017-09-25 reference/crypt/Lange11a encyclopedia Tanja Lange 0001 Hash-Based Signatures. 540-542 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_413 reference/crypt/2011 db/reference/crypt/crypt2011.html#Lange11a
230 2017-07-12 reference/crypt/Knudsen11b encyclopedia Lars R. Knudsen Luby-Rackoff Ciphers. 736-737 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_590 reference/crypt/2011 db/reference/crypt/crypt2011.html#Knudsen11b
231 2017-07-12 reference/crypt/YanushkevichP11 encyclopedia Svetlana N. Yanushkevich,Denis V. Popel DNA. 359-362 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_737 reference/crypt/2011 db/reference/crypt/crypt2011.html#YanushkevichP11
232 2017-07-12 reference/crypt/Abu-Nimeh11 encyclopedia Saeed Abu-Nimeh Three-Factor Authentication. 1287-1288 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_793 reference/crypt/2011 db/reference/crypt/crypt2011.html#Abu-Nimeh11
233 2017-07-12 reference/crypt/X11oq encyclopedia Zeta Function Computation. 1403 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1052 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11oq
234 2017-07-12 reference/crypt/Kaliski05n encyclopedia Burton S. Kaliski Jr. Generator. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_175 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05n
235 2017-07-12 reference/crypt/TriaC11 encyclopedia Assia Tria,Hamid Choukri Invasive Attacks. 623-629 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_511 reference/crypt/2011 db/reference/crypt/crypt2011.html#TriaC11
236 2017-07-12 reference/crypt/QuisquaterS05 encyclopedia Jean-Jacques Quisquater,David Samyde Electromagnetic Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_120 reference/crypt/2005 db/reference/crypt/crypt2005.html#QuisquaterS05
237 2017-07-12 reference/crypt/KangS11b encyclopedia Brent ByungHoon Kang,Greg Sinclair Unpacking Malware. 1350-1351 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_851 reference/crypt/2011 db/reference/crypt/crypt2011.html#KangS11b
238 2017-07-12 reference/crypt/Fontaine05a encyclopedia Caroline Fontaine E0 (Bluetooth). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_117 reference/crypt/2005 db/reference/crypt/crypt2005.html#Fontaine05a
239 2017-07-12 reference/crypt/Bleumer05b encyclopedia Gerrit Bleumer Blinding Techniques. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_32 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05b
240 2017-07-12 reference/crypt/Kaliski05xf encyclopedia Burton S. Kaliski Jr. Ring. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_359 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05xf
241 2017-07-12 reference/crypt/KangS11 encyclopedia Brent ByungHoon Kang,Anurag Srivastava Dynamic Malware Analysis. 367-368 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_846 reference/crypt/2011 db/reference/crypt/crypt2011.html#KangS11
242 2017-07-12 reference/crypt/X11da encyclopedia DPA. 365 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1032 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11da
243 2017-07-12 reference/crypt/Ellison05 encyclopedia Carl M. Ellison SPKI/SDSI. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_409 reference/crypt/2005 db/reference/crypt/crypt2005.html#Ellison05
244 2017-07-12 reference/crypt/Caddy11f encyclopedia Tom Caddy Side-Channel Attacks. 1204 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_227 reference/crypt/2011 db/reference/crypt/crypt2011.html#Caddy11f
245 2017-07-12 reference/crypt/Bleumer11d encyclopedia Gerrit Bleumer Chaum Blind Signature Scheme. 199-200 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_185 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11d
246 2017-07-12 reference/crypt/Caddy05g encyclopedia Tom Caddy Tamper Response. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_426 reference/crypt/2005 db/reference/crypt/crypt2005.html#Caddy05g
247 2017-07-12 reference/crypt/X11nt encyclopedia Universal Integrated Circuit Card. 1348 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1088 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nt
248 2017-07-12 reference/crypt/BarretoR11 encyclopedia Paulo S. L. M. Barreto,Vincent Rijmen Whirlpool. 1384-1385 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_626 reference/crypt/2011 db/reference/crypt/crypt2011.html#BarretoR11
249 2017-07-12 reference/crypt/Schoenmakers11c encyclopedia Berry Schoenmakers Interactive Proof. 619 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_6 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schoenmakers11c
250 2019-10-25 reference/crypt/Liskov11c encyclopedia Moses D. Liskov Miller-Rabin Probabilistic Primality Test. 784-785 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_461 reference/crypt/2011 db/reference/crypt/crypt2011.html#Liskov11c
251 2017-07-12 reference/crypt/X11hj encyclopedia MD4 Hash Function. 768 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1196 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hj
252 2017-07-12 reference/crypt/Preneel11g encyclopedia Bart Preneel GMAC. 513-514 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_578 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11g
253 2017-07-12 reference/crypt/Weaver11 encyclopedia Nicholas C. Weaver TCP Reset Injection. 1282-1283 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_119 reference/crypt/2011 db/reference/crypt/crypt2011.html#Weaver11
254 2017-07-12 reference/crypt/Zhang11 encyclopedia Wensheng Zhang False Data Injection Defense. 448-450 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_630 reference/crypt/2011 db/reference/crypt/crypt2011.html#Zhang11
255 2017-07-12 reference/crypt/X11ig encyclopedia Multiparty Computation (MPC). 815 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1294 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ig
256 2017-07-12 reference/crypt/Bleumer05g encyclopedia Gerrit Bleumer Credentials. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_85 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05g
257 2017-07-12 reference/crypt/Kaliski05k encyclopedia Burton S. Kaliski Jr. Field. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_163 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05k
258 2017-07-12 reference/crypt/VimercatiS11 encyclopedia Sabrina De Capitani di Vimercati,Pierangela Samarati Chinese Wall. 202-203 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_813 reference/crypt/2011 db/reference/crypt/crypt2011.html#VimercatiS11
259 2017-07-12 reference/crypt/Quisquater05 encyclopedia Jean-Jacques Quisquater Eavesdropper. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_118 reference/crypt/2005 db/reference/crypt/crypt2005.html#Quisquater05
260 2017-07-12 reference/crypt/Tilborg11a encyclopedia Henk C. A. van Tilborg Shannon's Model. 1194-1195 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_3 reference/crypt/2011 db/reference/crypt/crypt2011.html#Tilborg11a
261 2017-07-12 reference/crypt/TohT11 encyclopedia Kar-Ann Toh,Andrew Beng Jin Teoh Vascular Patterns. 1353-1356 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_748 reference/crypt/2011 db/reference/crypt/crypt2011.html#TohT11
262 2017-07-12 reference/crypt/Bauer05 encyclopedia Friedrich L. Bauer Alberti encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_9 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05
263 2017-07-12 reference/crypt/BiryukovC11 encyclopedia Alex Biryukov,Christophe De Cannière Data Encryption Standard (DES). 295-301 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_568 reference/crypt/2011 db/reference/crypt/crypt2011.html#BiryukovC11
264 2017-07-12 reference/crypt/X11km encyclopedia RBAC. 1031 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1244 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11km
265 2017-07-12 reference/crypt/BlakleyK05a encyclopedia Robert Blakley,Gregory A. Kabatiansky Shamir's Threshold Scheme. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_389 reference/crypt/2005 db/reference/crypt/crypt2005.html#BlakleyK05a
266 2017-07-12 reference/crypt/X11mn encyclopedia Stack (Buffer) Overflow. 1253 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1172 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mn
267 2017-07-12 reference/crypt/Lanet11 encyclopedia Jean-Louis Lanet Bytecode Verification. 177-178 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_486 reference/crypt/2011 db/reference/crypt/crypt2011.html#Lanet11
268 2017-07-12 reference/crypt/Venkatakrishnan11 encyclopedia V. N. Venkatakrishnan Applications of Formal Methods to Web Application Security. 45-46 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_856 reference/crypt/2011 db/reference/crypt/crypt2011.html#Venkatakrishnan11
269 2017-07-12 reference/crypt/Canniere11h encyclopedia Christophe De Cannière SERPENT. 1188-1189 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_614 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canniere11h
270 2017-07-12 reference/crypt/X11dm encyclopedia Electronic Purse. 391 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1033 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dm
271 2017-07-12 reference/crypt/X11hz encyclopedia MPKC. 804 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1133 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hz
272 2017-07-12 reference/crypt/QuisquaterS11 encyclopedia Jean-Jacques Quisquater,David Samyde Electromagnetic Attack. 382-385 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_125 reference/crypt/2011 db/reference/crypt/crypt2011.html#QuisquaterS11
273 2017-07-12 reference/crypt/Bleumer05xg encyclopedia Gerrit Bleumer Watermarking. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_457 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05xg
274 2017-07-12 reference/crypt/Adams11a encyclopedia Carlisle Adams Certificate Management. 189 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_70 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11a
275 2017-07-12 reference/crypt/Heinrich11a encyclopedia Clemens Heinrich Secure Socket Layer (SSL). 1135-1139 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_223 reference/crypt/2011 db/reference/crypt/crypt2011.html#Heinrich11a
276 2017-07-12 reference/crypt/X11bx encyclopedia Conference Key Agreement. 248 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1093 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bx
277 2017-07-12 reference/crypt/X11aa encyclopedia Bank Card. 71 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1081 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11aa
278 2017-07-12 reference/crypt/Kaliski05xl encyclopedia Burton S. Kaliski Jr. Symmetric Cryptosystem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_422 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05xl
279 2017-07-12 reference/crypt/Adams11b encyclopedia Carlisle Adams Certificate Revocation. 190-192 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_71 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11b
280 2017-07-12 reference/crypt/X11er encyclopedia Genetic Code. 513 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1261 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11er
281 2017-07-12 reference/crypt/Venkatakrishnan11a encyclopedia V. N. Venkatakrishnan Web Browser Security and Privacy. 1372-1373 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_665 reference/crypt/2011 db/reference/crypt/crypt2011.html#Venkatakrishnan11a
282 2017-07-12 reference/crypt/Kaliski11aa encyclopedia Burt Kaliski Pseudorandom Function. 995 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_427 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11aa
283 2017-07-12 reference/crypt/Bettini11 encyclopedia Claudio Bettini Temporal Access Control. 1284-1285 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_831 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bettini11
284 2017-07-12 reference/crypt/X11bc encyclopedia Cascade Revoke. 182 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1243 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bc
285 2017-07-12 reference/crypt/Adams11f encyclopedia Carlisle Adams Kerberos Authentication Protocol. 674-675 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_81 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11f
286 2017-07-12 reference/crypt/Al-Shaer11 encyclopedia Ehab Al-Shaer Firewalls. 474-482 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_911 reference/crypt/2011 db/reference/crypt/crypt2011.html#Al-Shaer11
287 2017-07-12 reference/crypt/X11kp encyclopedia Remote Attestation. 1042 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1389 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kp
288 2017-07-12 reference/crypt/Kuhn05 encyclopedia Markus Kuhn compromising emanations. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_74 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kuhn05
289 2017-10-27 reference/crypt/RossJ05 encyclopedia Arun Ross,Anil K. Jain 0001 Biometrics. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_29 reference/crypt/2005 db/reference/crypt/crypt2005.html#RossJ05
290 2017-07-12 reference/crypt/Schoenmakers11e encyclopedia Berry Schoenmakers Noninteractive Proof. 846 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_8 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schoenmakers11e
291 2017-07-12 reference/crypt/Stavrou11 encyclopedia Angelos Stavrou Overlay-Based DoS Defenses. 891-897 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_273 reference/crypt/2011 db/reference/crypt/crypt2011.html#Stavrou11
292 2017-07-12 reference/crypt/Steel11 encyclopedia Graham Steel Formal Analysis of Security APIs. 492-494 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_873 reference/crypt/2011 db/reference/crypt/crypt2011.html#Steel11
293 2017-07-12 reference/crypt/Canteaut11f encyclopedia Anne Canteaut Inversion Attack. 629-630 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_352 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11f
294 2017-07-12 reference/crypt/Cankaya11c encyclopedia Ebru Celikel Cankaya Bell-LaPadula Confidentiality Model. 71-74 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_773 reference/crypt/2011 db/reference/crypt/crypt2011.html#Cankaya11c
295 2017-07-12 reference/crypt/Bleumer05xc encyclopedia Gerrit Bleumer Threshold Signature. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_429 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05xc
296 2017-07-12 reference/crypt/Biryukov05n encyclopedia Alex Biryukov Impossible Differential Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_197 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05n
297 2017-07-12 reference/crypt/Contini05 encyclopedia Scott Contini Greatest Common Divisor. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_180 reference/crypt/2005 db/reference/crypt/crypt2005.html#Contini05
298 2017-07-12 reference/crypt/X11ad encyclopedia Biba Mandatory Integrity Policy. 81 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1303 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ad
299 2017-07-12 reference/crypt/Mouha11 encyclopedia Nicky Mouha MD4-MD5. 768-771 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_595 reference/crypt/2011 db/reference/crypt/crypt2011.html#Mouha11
300 2017-07-12 reference/crypt/Guajardo11a encyclopedia Jorge Guajardo Physical Unclonable Functions (PUFs). 929-934 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_912 reference/crypt/2011 db/reference/crypt/crypt2011.html#Guajardo11a
301 2017-07-12 reference/crypt/Meadows11a encyclopedia Catherine A. Meadows Formal Analysis of Cryptographic Protocols. 490-492 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_876 reference/crypt/2011 db/reference/crypt/crypt2011.html#Meadows11a
302 2017-07-12 reference/crypt/Contini11c encyclopedia Scott Contini Modulus. 798-799 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_463 reference/crypt/2011 db/reference/crypt/crypt2011.html#Contini11c
303 2017-07-12 reference/crypt/Kaliski05x encyclopedia Burton S. Kaliski Jr. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_288 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05x
304 2017-07-12 reference/crypt/X11hw encyclopedia Minimal Privilege. 785 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1339 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hw
305 2017-07-12 reference/crypt/X11am encyclopedia Biometric Identification in Video Surveillance. 98 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1256 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11am
306 2017-07-12 reference/crypt/Cranor11 encyclopedia Lorrie Faith Cranor Platform for Privacy Preferences (P3P). 940-941 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_759 reference/crypt/2011 db/reference/crypt/crypt2011.html#Cranor11
307 2017-07-12 reference/crypt/X11bl encyclopedia Chroot Prison. 207 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1307 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bl
308 2017-07-12 reference/crypt/X11l encyclopedia Anonymity in Data Mining. 39 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1282 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11l
309 2017-07-12 reference/crypt/Stiglic05h encyclopedia Anton Stiglic Strong Prime. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_413 reference/crypt/2005 db/reference/crypt/crypt2005.html#Stiglic05h
310 2017-07-12 reference/crypt/Canteaut05k encyclopedia Anne Canteaut Linear Syndrome Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_236 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canteaut05k
311 2017-07-12 reference/crypt/X11iu encyclopedia Nym. 879 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1041 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11iu
312 2017-07-12 reference/crypt/Cronin05a encyclopedia Eric Cronin Denial of Service. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_102 reference/crypt/2005 db/reference/crypt/crypt2005.html#Cronin05a
313 2017-07-12 reference/crypt/Smid05 encyclopedia Miles E. Smid Key escrow. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_221 reference/crypt/2005 db/reference/crypt/crypt2005.html#Smid05
314 2017-07-12 reference/crypt/X11mf encyclopedia Space-Time Trade-Off. 1231 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1020 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mf
315 2017-07-12 reference/crypt/X11gi encyclopedia IPSec Policy Analysis. 638 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1402 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gi
316 2017-07-12 reference/crypt/Gruteser11 encyclopedia Marco Gruteser Location Privacy in Wireless Networks. 732-734 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_57 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gruteser11
317 2017-07-12 reference/crypt/Boneh05h encyclopedia Dan Boneh Secure signatures from the "strong RSA" assumption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_374 reference/crypt/2005 db/reference/crypt/crypt2005.html#Boneh05h
318 2017-07-12 reference/crypt/X11gk encyclopedia ISO 19790 2006 Security Requirements for Cryptographic Modules. 648 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1038 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gk
319 2017-07-12 reference/crypt/AvanziT11a encyclopedia Roberto Avanzi,Nicolas Thériault Hyperelliptic Curves. 576-580 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_258 reference/crypt/2011 db/reference/crypt/crypt2011.html#AvanziT11a
320 2017-07-12 reference/crypt/X11kl encyclopedia Rank-Matric Codes. 1031 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1116 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kl
321 2017-07-12 reference/crypt/Nguyen11a encyclopedia Phong Q. Nguyen Lattice. 710-711 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_456 reference/crypt/2011 db/reference/crypt/crypt2011.html#Nguyen11a
322 2017-07-12 reference/crypt/Bleumer05xa encyclopedia Gerrit Bleumer Selective Forgery. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_380 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05xa
323 2017-07-12 reference/crypt/Shparlinski11 encyclopedia Igor E. Shparlinski Computational Diffie-Hellman Problem. 240-244 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_882 reference/crypt/2011 db/reference/crypt/crypt2011.html#Shparlinski11
324 2017-07-12 reference/crypt/Biryukov05g encyclopedia Alex Biryukov Ciphertext-Only Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_62 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05g
325 2017-07-12 reference/crypt/Adams05h encyclopedia Carlisle Adams Dictionary Attack (II). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_107 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05h
326 2017-07-12 reference/crypt/Stavrou11a encyclopedia Angelos Stavrou TCP Modulation Attacks. 1279-1281 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_277 reference/crypt/2011 db/reference/crypt/crypt2011.html#Stavrou11a
327 2017-07-12 reference/crypt/Lloyd05 encyclopedia Steve Lloyd Key management. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_222 reference/crypt/2005 db/reference/crypt/crypt2005.html#Lloyd05
328 2017-07-12 reference/crypt/X11it encyclopedia Number Field Sieve. 861 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1351 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11it
329 2017-07-12 reference/crypt/Bleumer05l encyclopedia Gerrit Bleumer Electronic Postage. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_125 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05l
330 2017-07-12 reference/crypt/X11af encyclopedia Big Number Squaring. 82 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1129 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11af
331 2017-07-12 reference/crypt/Schunter05 encyclopedia Matthias Schunter Certified Mail. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_54 reference/crypt/2005 db/reference/crypt/crypt2005.html#Schunter05
332 2017-07-12 reference/crypt/Subramanian11a encyclopedia Nary Subramanian Spyware. 1246-1248 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_792 reference/crypt/2011 db/reference/crypt/crypt2011.html#Subramanian11a
333 2017-07-12 reference/crypt/Adams05e encyclopedia Carlisle Adams Certificate Management. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_50 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05e
334 2017-07-12 reference/crypt/Brose05a encyclopedia Gerald Brose Password. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_294 reference/crypt/2005 db/reference/crypt/crypt2005.html#Brose05a
335 2017-07-12 reference/crypt/QuisquaterS11a encyclopedia Jean-Jacques Quisquater,David Samyde Radio Frequency Attacks. 1015-1021 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_133 reference/crypt/2011 db/reference/crypt/crypt2011.html#QuisquaterS11a
336 2017-07-12 reference/crypt/Helleseth05 encyclopedia Tor Helleseth Autocorrelation. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_21 reference/crypt/2005 db/reference/crypt/crypt2005.html#Helleseth05
337 2017-07-12 reference/crypt/Carlet05b encyclopedia Claude Carlet Nonlinearity of Boolean Functions. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_275 reference/crypt/2005 db/reference/crypt/crypt2005.html#Carlet05b
338 2017-07-12 reference/crypt/X11y encyclopedia Attack by Summation Over an Hypercube. 50 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1103 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11y
339 2017-07-12 reference/crypt/X11ik encyclopedia Network Flooding Attack. 840 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1067 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ik
340 2017-07-12 reference/crypt/X11kj encyclopedia Radiometrics. 1021 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1182 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kj
341 2017-07-12 reference/crypt/Sendrier11 encyclopedia Nicolas Sendrier Code-Based Cryptography. 215-216 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_378 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sendrier11
342 2017-07-12 reference/crypt/Kaliski05o encyclopedia Burton S. Kaliski Jr. Group. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_181 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05o
343 2017-07-12 reference/crypt/Xiao11 encyclopedia Xiaokui Xiao M-Invariance. 739-741 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_901 reference/crypt/2011 db/reference/crypt/crypt2011.html#Xiao11
344 2017-07-12 reference/crypt/X11gu encyclopedia Lamport One-Time Signatures. 710 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1131 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gu
345 2017-07-12 reference/crypt/McDaniel05a encyclopedia Patrick D. McDaniel Policy. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_305 reference/crypt/2005 db/reference/crypt/crypt2005.html#McDaniel05a
346 2017-07-12 reference/crypt/Adams11d encyclopedia Carlisle Adams Identification. 584-585 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_77 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11d
347 2017-07-12 reference/crypt/Boneh11i encyclopedia Dan Boneh Secure Signatures from the "Strong RSA" Assumption. 1134-1135 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_155 reference/crypt/2011 db/reference/crypt/crypt2011.html#Boneh11i
348 2017-07-12 reference/crypt/Jackson11 encyclopedia Collin Jackson Web 2.0 Security and Privacy. 1367-1368 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_663 reference/crypt/2011 db/reference/crypt/crypt2011.html#Jackson11
349 2017-07-12 reference/crypt/X11mv encyclopedia Strong Authentication. 1265 2011 https://doi.org/10.1007/978-1-4419-5906-5_1270 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mv
350 2017-07-12 reference/crypt/Naor11 encyclopedia Dalit Naor Broadcast Encryption. 171-174 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_143 reference/crypt/2011 db/reference/crypt/crypt2011.html#Naor11
351 2018-08-02 reference/crypt/SunN11 encyclopedia Kun Sun 0001,Peng Ning Secure Time Synchronization. 1139-1140 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_642 reference/crypt/2011 db/reference/crypt/crypt2011.html#SunN11
352 2019-12-27 reference/crypt/Ardagna11b encyclopedia Claudio Agostino Ardagna XML-Based Access Control Languages. 1395-1399 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_833 reference/crypt/2011 db/reference/crypt/crypt2011.html#Ardagna11b
353 2017-07-12 reference/crypt/Carlet11a encyclopedia Claude Carlet Boolean Functions. 162-165 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_336 reference/crypt/2011 db/reference/crypt/crypt2011.html#Carlet11a
354 2017-07-12 reference/crypt/Bleumer11y encyclopedia Gerrit Bleumer Random Oracle Model. 1027-1028 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_220 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11y
355 2017-07-12 reference/crypt/X11ey encyclopedia Header Injections. 553 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1227 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ey
356 2017-07-12 reference/crypt/Fontaine05f encyclopedia Caroline Fontaine Self-Shrinking Generator. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_381 reference/crypt/2005 db/reference/crypt/crypt2005.html#Fontaine05f
357 2017-07-12 reference/crypt/HankersonM05g encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curve Public-Key Encryption Schemes. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_137 reference/crypt/2005 db/reference/crypt/crypt2005.html#HankersonM05g
358 2017-07-12 reference/crypt/Kurosawa11 encyclopedia Kaoru Kurosawa Hybrid Encryption. 570-572 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_321 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kurosawa11
359 2017-07-12 reference/crypt/Gagne05 encyclopedia Martin Gagné Identity-Based Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_193 reference/crypt/2005 db/reference/crypt/crypt2005.html#Gagne05
360 2017-07-12 reference/crypt/Carlet05c encyclopedia Claude Carlet Propagation Characteristics of Boolean Functions. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_322 reference/crypt/2005 db/reference/crypt/crypt2005.html#Carlet05c
361 2017-07-12 reference/crypt/Kaliski05xb encyclopedia Burton S. Kaliski Jr. Pseudorandom Function. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_329 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05xb
362 2017-07-12 reference/crypt/Petitcolas11 encyclopedia Fabien A. P. Petitcolas Kerckhoffs' Principle. 675 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_487 reference/crypt/2011 db/reference/crypt/crypt2011.html#Petitcolas11
363 2017-07-12 reference/crypt/Kaliski05j encyclopedia Burton S. Kaliski Jr. Factor Base. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_152 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05j
364 2017-07-12 reference/crypt/Bauer05b encyclopedia Friedrich L. Bauer Beaufort Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_23 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05b
365 2017-07-12 reference/crypt/Kaliski11p encyclopedia Burt Kaliski Homomorphism. 562 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_414 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11p
366 2017-07-12 reference/crypt/DesmedtY11 encyclopedia Yvo Desmedt,Qiushi Yang Perfectly Secure Message Transmission. 922-924 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_326 reference/crypt/2011 db/reference/crypt/crypt2011.html#DesmedtY11
367 2017-07-12 reference/crypt/X11dz encyclopedia Exponential Key Exchange. 434 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1340 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dz
368 2019-10-25 reference/crypt/Liskov05 encyclopedia Moses D. Liskov Fermat Primality Test. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_160 reference/crypt/2005 db/reference/crypt/crypt2005.html#Liskov05
369 2017-07-12 reference/crypt/Forte11 encyclopedia Dario V. Forte Web Security Auditing. 1374-1375 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_667 reference/crypt/2011 db/reference/crypt/crypt2011.html#Forte11
370 2017-07-12 reference/crypt/Zhang11b encyclopedia Wensheng Zhang Source Location Privacy. 1230-1231 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_645 reference/crypt/2011 db/reference/crypt/crypt2011.html#Zhang11b
371 2017-07-12 reference/crypt/Biryukov05h encyclopedia Alex Biryukov Codebook Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_67 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05h
372 2017-07-12 reference/crypt/Naccache11c encyclopedia David Naccache Chemical Combinatorial Attack. 200-201 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_890 reference/crypt/2011 db/reference/crypt/crypt2011.html#Naccache11c
373 2017-07-12 reference/crypt/Horne11 encyclopedia Dwight Horne Hash Chain. 542-543 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_780 reference/crypt/2011 db/reference/crypt/crypt2011.html#Horne11
374 2017-07-12 reference/crypt/Just11 encyclopedia Mike Just Challenge-Response Identification. 198-199 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_73 reference/crypt/2011 db/reference/crypt/crypt2011.html#Just11
375 2017-07-12 reference/crypt/KabatianskyS11 encyclopedia Gregory A. Kabatiansky,Ben J. M. Smeets Authentication, From an Information Theoretic Perspective. 63-65 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_377 reference/crypt/2011 db/reference/crypt/crypt2011.html#KabatianskyS11
376 2017-07-12 reference/crypt/X11gr encyclopedia Keystream. 691 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1110 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gr
377 2017-07-12 reference/crypt/Bleumer05z encyclopedia Gerrit Bleumer Recipient Anonymity. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_347 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05z
378 2017-07-12 reference/crypt/X11ao encyclopedia Biometric Key Generation. 98 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1379 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ao
379 2017-07-12 reference/crypt/X11kn encyclopedia Record Linkage. 1035 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1281 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kn
380 2017-07-12 reference/crypt/Solinas11a encyclopedia Jerome A. Solinas Mersenne Prime. 774-775 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_37 reference/crypt/2011 db/reference/crypt/crypt2011.html#Solinas11a
381 2017-07-12 reference/crypt/England11 encyclopedia Paul England Sealed Storage. 1087-1088 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_494 reference/crypt/2011 db/reference/crypt/crypt2011.html#England11
382 2017-07-12 reference/crypt/Canniere11i encyclopedia Christophe De Cannière Triple DES. 1318-1319 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_621 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canniere11i
383 2017-07-12 reference/crypt/Koeune05a encyclopedia François Koeune Timing attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_432 reference/crypt/2005 db/reference/crypt/crypt2005.html#Koeune05a
384 2017-07-12 reference/crypt/Bauer11a encyclopedia Friedrich L. Bauer Alphabet. 33-34 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_160 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11a
385 2017-07-12 reference/crypt/Fontaine11d encyclopedia Caroline Fontaine RC4. 1031-1032 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_365 reference/crypt/2011 db/reference/crypt/crypt2011.html#Fontaine11d
386 2017-07-12 reference/crypt/Schunter11b encyclopedia Matthias Schunter Fair Exchange. 447-448 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_204 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schunter11b
387 2017-07-12 reference/crypt/Samarati11c encyclopedia Pierangela Samarati Recursive Revoke. 1035-1037 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_684 reference/crypt/2011 db/reference/crypt/crypt2011.html#Samarati11c
388 2017-07-12 reference/crypt/Liu11a encyclopedia Donggang Liu Node Clone Defense. 844-846 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_634 reference/crypt/2011 db/reference/crypt/crypt2011.html#Liu11a
389 2017-07-12 reference/crypt/X11kk encyclopedia Random Key Predistribution. 1026 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1221 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kk
390 2017-07-12 reference/crypt/X11gm encyclopedia ISO/IEC 27001. 649 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1079 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gm
391 2017-07-12 reference/crypt/Heinrich05b encyclopedia Clemens Heinrich Transport layer security (TLS). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_435 reference/crypt/2005 db/reference/crypt/crypt2005.html#Heinrich05b
392 2017-07-12 reference/crypt/HacigumusHM11 encyclopedia Hakan Hacigümüs,Bijit Hore,Sharad Mehrotra Privacy of Outsourced Data. 965-969 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_761 reference/crypt/2011 db/reference/crypt/crypt2011.html#HacigumusHM11
393 2017-07-12 reference/crypt/X11lw encyclopedia Shannon's Maxim. 1194 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1167 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lw
394 2017-07-12 reference/crypt/Biryukov11e encyclopedia Alex Biryukov Chosen Plaintext and Chosen Ciphertext Attack. 205 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_558 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11e
395 2017-07-12 reference/crypt/X11ju encyclopedia Project Athena. 983 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1011 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ju
396 2017-07-12 reference/crypt/Schoenmakers05a encyclopedia Berry Schoenmakers Interactive Proof. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_202 reference/crypt/2005 db/reference/crypt/crypt2005.html#Schoenmakers05a
397 2017-07-12 reference/crypt/Adams11k encyclopedia Carlisle Adams Response. 1042 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_93 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11k
398 2019-10-25 reference/crypt/Liskov11 encyclopedia Moses D. Liskov Fermat Primality Test. 455-456 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_448 reference/crypt/2011 db/reference/crypt/crypt2011.html#Liskov11
399 2017-07-12 reference/crypt/X11og encyclopedia Web Initial Authentication. 1374 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1391 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11og
400 2017-07-12 reference/crypt/Helleseth05g encyclopedia Tor Helleseth Run. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_365 reference/crypt/2005 db/reference/crypt/crypt2005.html#Helleseth05g
401 2017-07-12 reference/crypt/X11hn encyclopedia Memory Overflow. 774 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1171 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hn
402 2017-07-12 reference/crypt/Stiglic11g encyclopedia Anton Stiglic Strong Prime. 1265-1266 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_480 reference/crypt/2011 db/reference/crypt/crypt2011.html#Stiglic11g
403 2017-07-12 reference/crypt/X11oo encyclopedia Wiretapping. 1391 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1008 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11oo
404 2017-07-12 reference/crypt/Bleumer11q encyclopedia Gerrit Bleumer GMR Signature. 514-515 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_207 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11q
405 2017-07-12 reference/crypt/Desmedt05j encyclopedia Yvo Desmedt Trojan Horses, Computer Viruses and Worms. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_438 reference/crypt/2005 db/reference/crypt/crypt2005.html#Desmedt05j
406 2017-07-12 reference/crypt/X11mq encyclopedia Standard Basis. 1253 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1175 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mq
407 2017-07-12 reference/crypt/Lee11 encyclopedia Adam J. Lee Credential-Based Access Control. 271-272 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_898 reference/crypt/2011 db/reference/crypt/crypt2011.html#Lee11
408 2017-07-12 reference/crypt/Brose11 encyclopedia Gerald Brose Access Control. 2-7 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_179 reference/crypt/2011 db/reference/crypt/crypt2011.html#Brose11 journals/pieee/SaltzerS75,conf/sp/ClarkW87,conf/sp/BrewerN89,journals/csur/Landwehr81,journals/sigops/Lampson74,journals/cacm/HarrisonRU76,journals/tods/GriffithsW76,journals/tods/Fagin78,journals/tocs/LampsonABW92,journals/cacm/DennisH66,journals/cacm/Fabry74,journals/csur/Linden76,...,...,journals/computer/SandhuCFY96,journals/computer/Sandhu93,...,...,journals/cacm/Denning76
409 2017-07-12 reference/crypt/Kuhn11a encyclopedia Markus Kuhn Data Remanence. 306 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_193 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kuhn11a
410 2017-07-12 reference/crypt/Kaliski05g encyclopedia Burton S. Kaliski Jr. Euler's Totient Function. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_146 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05g
411 2017-07-12 reference/crypt/X11la encyclopedia Secret Key Cryptosystem. 1095 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1140 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11la
412 2017-07-12 reference/crypt/Handschuh11 encyclopedia Helena Handschuh RC5. 1032-1033 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_607 reference/crypt/2011 db/reference/crypt/crypt2011.html#Handschuh11
413 2017-07-12 reference/crypt/Crepeau11a encyclopedia Claude Crépeau Cut-and-Choose Protocol. 290-291 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_240 reference/crypt/2011 db/reference/crypt/crypt2011.html#Crepeau11a
414 2017-07-12 reference/crypt/Landrock05e encyclopedia Peter Landrock Clip Scheme. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_64 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05e
415 2018-01-26 reference/crypt/YangZ11a encyclopedia Yi Yang 0002,Sencun Zhu Sensor Code Attestation. 1178-1179 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_644 reference/crypt/2011 db/reference/crypt/crypt2011.html#YangZ11a
416 2017-07-12 reference/crypt/AlturiF11 encyclopedia Vijay Alturi,David F. Ferraiolo Role-Based Access Control. 1053-1055 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_829 reference/crypt/2011 db/reference/crypt/crypt2011.html#AlturiF11
417 2017-07-12 reference/crypt/Bleumer11r encyclopedia Gerrit Bleumer Group Signatures. 526-528 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_208 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11r
418 2017-07-12 reference/crypt/Caddy05c encyclopedia Tom Caddy Penetration Testing. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_297 reference/crypt/2005 db/reference/crypt/crypt2005.html#Caddy05c
419 2017-07-12 reference/crypt/Polychronakis11 encyclopedia Michalis Polychronakis Reverse Engineering of Malware Emulators. 1043-1044 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_849 reference/crypt/2011 db/reference/crypt/crypt2011.html#Polychronakis11
420 2017-07-12 reference/crypt/Charpin05 encyclopedia Pascale Charpin Cyclic Codes. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_93 reference/crypt/2005 db/reference/crypt/crypt2005.html#Charpin05
421 2017-07-12 reference/crypt/X11ci encyclopedia Cryptographic Algorithm Evaluation. 283 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1188 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ci
422 2017-07-12 reference/crypt/Adams11l encyclopedia Carlisle Adams Salt. 1075 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_94 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11l
423 2017-07-12 reference/crypt/Provos11 encyclopedia Niels Provos Firewall. 471-474 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_506 reference/crypt/2011 db/reference/crypt/crypt2011.html#Provos11
424 2017-07-12 reference/crypt/X11bf encyclopedia 192 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1358 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bf
425 2017-07-12 reference/crypt/Domingo-Ferrer11 encyclopedia Josep Domingo-Ferrer Microdata Masking Techniques. 778-781 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_757 reference/crypt/2011 db/reference/crypt/crypt2011.html#Domingo-Ferrer11
426 2017-07-12 reference/crypt/BiswasC11 encyclopedia Soma Biswas,Rama Chellappa Face Recognition from Still Images and Video. 437-444 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_739 reference/crypt/2011 db/reference/crypt/crypt2011.html#BiswasC11
427 2017-07-12 reference/crypt/X11ev encyclopedia Group Key Exchange. 526 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1096 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ev
428 2017-07-12 reference/crypt/Adams11j encyclopedia Carlisle Adams Replay Attack. 1042 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_92 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11j
429 2017-07-12 reference/crypt/Preneel05k encyclopedia Bart Preneel Modes of Operation of a Block Cipher. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_258 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05k
430 2017-07-12 reference/crypt/X11gs encyclopedia Keystroke Logging. 695 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1309 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gs
431 2017-07-12 reference/crypt/X11ka encyclopedia Public-Key Authenticated Encryption. 1001 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1023 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ka
432 2017-07-12 reference/crypt/Kaliski05y encyclopedia Burton S. Kaliski Jr. Order. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_290 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05y
433 2017-07-12 reference/crypt/X11nu encyclopedia Virtualization Security. 1362 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1327 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nu
434 2017-07-12 reference/crypt/Kaliski05d encyclopedia Burton S. Kaliski Jr. Claw-Free. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_63 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05d
435 2017-07-12 reference/crypt/X11io encyclopedia Nonrepudiation Protocol. 854 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1027 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11io
436 2017-07-12 reference/crypt/Preneel05n encyclopedia Bart Preneel Preimage Resistance. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_309 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05n
437 2017-07-12 reference/crypt/Capkun11b encyclopedia Srdjan Capkun Uncoordinated Direct Sequence Spread Spectrum. 1345-1346 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_64 reference/crypt/2011 db/reference/crypt/crypt2011.html#Capkun11b
438 2017-07-12 reference/crypt/Pato05 encyclopedia Joe Pato Identity Management. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_194 reference/crypt/2005 db/reference/crypt/crypt2005.html#Pato05
439 2017-07-12 reference/crypt/Bucci05 encyclopedia Marco Bucci Random Bit Generator. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_342 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bucci05
440 2017-07-12 reference/crypt/Bleumer11ag encyclopedia Gerrit Bleumer Watermarking. 1365-1366 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_238 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11ag
441 2017-07-12 reference/crypt/Schoenmakers05i encyclopedia Berry Schoenmakers Zero-knowledge. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_463 reference/crypt/2005 db/reference/crypt/crypt2005.html#Schoenmakers05i
442 2017-07-12 reference/crypt/Canniere11c encyclopedia Christophe De Cannière FEAL. 454-455 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_576 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canniere11c
443 2017-07-12 reference/crypt/X11lf encyclopedia Secure Function Evaluation. 1116 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1331 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lf
444 2017-07-12 reference/crypt/Sustek11 encyclopedia Laurent Sustek Hardware Security Module. 535-538 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_509 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sustek11
445 2017-07-12 reference/crypt/X11iq encyclopedia NTRUEncrypt. 861 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1161 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11iq
446 2017-07-12 reference/crypt/Sako05f encyclopedia Kazue Sako Semantic Security. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_383 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sako05f
447 2017-07-12 reference/crypt/Horne11a encyclopedia Dwight Horne Permissions. 924-927 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_786 reference/crypt/2011 db/reference/crypt/crypt2011.html#Horne11a
448 2017-07-12 reference/crypt/Kumar11 encyclopedia B. V. K. Vijaya Kumar Biometric Matching. 98-101 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_726 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kumar11
449 2017-07-12 reference/crypt/Fontaine11j encyclopedia Caroline Fontaine Synchronous Stream Cipher. 1274-1275 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_376 reference/crypt/2011 db/reference/crypt/crypt2011.html#Fontaine11j
450 2017-07-12 reference/crypt/Vimercati11e encyclopedia Sabrina De Capitani di Vimercati Policy Composition. 944-945 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_826 reference/crypt/2011 db/reference/crypt/crypt2011.html#Vimercati11e
451 2017-07-12 reference/crypt/Kaliski11ac encyclopedia Burt Kaliski Quadratic Residuosity Problem. 1003 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_429 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11ac
452 2017-07-12 reference/crypt/Handschuh11b encyclopedia Helena Handschuh SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). 1190-1193 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_615 reference/crypt/2011 db/reference/crypt/crypt2011.html#Handschuh11b
453 2017-07-12 reference/crypt/Carlet11c encyclopedia Claude Carlet Nonlinearity of Boolean Functions. 848-849 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_362 reference/crypt/2011 db/reference/crypt/crypt2011.html#Carlet11c
454 2017-07-12 reference/crypt/Foresti11 encyclopedia Sara Foresti Macrodata Protection. 749-750 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_756 reference/crypt/2011 db/reference/crypt/crypt2011.html#Foresti11
455 2017-07-12 reference/crypt/Canteaut05a encyclopedia Anne Canteaut Berlekamp-Massey algorithm. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_24 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canteaut05a
456 2017-07-12 reference/crypt/Bauer11h encyclopedia Friedrich L. Bauer Cæsar Cipher. 180 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_162 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11h
457 2017-07-12 reference/crypt/SalvaneschiS11 encyclopedia Guido Salvaneschi,Paolo Salvaneschi Metrics of Software Security. 775-778 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_680 reference/crypt/2011 db/reference/crypt/crypt2011.html#SalvaneschiS11
458 2017-07-12 reference/crypt/Landrock05c encyclopedia Peter Landrock Bolero.net. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_39 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05c
459 2017-07-12 reference/crypt/Adams11m encyclopedia Carlisle Adams Trusted Third Party. 1335 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_98 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11m
460 2017-07-12 reference/crypt/X11hg encyclopedia Maliciously Modified Set of Administrative Tools. 750 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1318 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hg
461 2017-07-12 reference/crypt/KruppaL11 encyclopedia Alexander Kruppa,Paul Leyland Number Field Sieve for Factoring. 862-867 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_465 reference/crypt/2011 db/reference/crypt/crypt2011.html#KruppaL11
462 2017-07-12 reference/crypt/X11cz encyclopedia DLP. 359 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1144 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11cz
463 2017-07-12 reference/crypt/SoeteW05 encyclopedia Marijke De Soete,Michael Ward EMV. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_140 reference/crypt/2005 db/reference/crypt/crypt2005.html#SoeteW05
464 2017-07-12 reference/crypt/X11oc encyclopedia Weak Collision Resistance. 1366 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1208 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11oc
465 2017-07-12 reference/crypt/Bauer05s encyclopedia Friedrich L. Bauer Vigenére Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_454 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05s
466 2017-07-12 reference/crypt/Foresti11a encyclopedia Sara Foresti Microdata Protection. 781-783 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_758 reference/crypt/2011 db/reference/crypt/crypt2011.html#Foresti11a
467 2017-07-12 reference/crypt/Biryukov05f encyclopedia Alex Biryukov Chosen Plaintext Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_60 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05f
468 2017-07-12 reference/crypt/Benoit11 encyclopedia Olivier Benoît Fault Attack. 452-453 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_505 reference/crypt/2011 db/reference/crypt/crypt2011.html#Benoit11
469 2017-07-12 reference/crypt/Wiley11 encyclopedia Jeffrey J. Wiley Protection Rings. 988-990 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_788 reference/crypt/2011 db/reference/crypt/crypt2011.html#Wiley11
470 2017-07-12 reference/crypt/X11 encyclopedia Access Control Rules. 14 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1333 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11
471 2017-07-12 reference/crypt/Handschuh11a encyclopedia Helena Handschuh RC6. 1033-1034 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_608 reference/crypt/2011 db/reference/crypt/crypt2011.html#Handschuh11a
472 2018-11-14 reference/crypt/Pelosi11 encyclopedia Gerardo Pelosi Secure Audit Logs. 1097-1099 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_688,https://www.wikidata.org/entity/Q57717541 reference/crypt/2011 db/reference/crypt/crypt2011.html#Pelosi11
473 2017-07-12 reference/crypt/Peters11 encyclopedia Christiane Peters Decoding Algorithms. 319-322 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_382 reference/crypt/2011 db/reference/crypt/crypt2011.html#Peters11
474 2017-07-12 reference/crypt/Bleumer11af encyclopedia Gerrit Bleumer Untraceability. 1351-1352 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_237 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11af
475 2017-07-12 reference/crypt/KabatianskyS05 encyclopedia Gregory A. Kabatiansky,Ben J. M. Smeets Authentication. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_16 reference/crypt/2005 db/reference/crypt/crypt2005.html#KabatianskyS05
476 2017-07-12 reference/crypt/Helleseth11b encyclopedia Tor Helleseth De Bruijn Sequence. 315-316 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_344 reference/crypt/2011 db/reference/crypt/crypt2011.html#Helleseth11b
477 2017-07-12 reference/crypt/Bauer05j encyclopedia Friedrich L. Bauer Information Theory. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_199 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05j
478 2017-07-12 reference/crypt/Durfee05 encyclopedia Glenn Durfee Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_460 reference/crypt/2005 db/reference/crypt/crypt2005.html#Durfee05
479 2017-07-12 reference/crypt/Biryukov05j encyclopedia Alex Biryukov Dictionary Attack (I). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_106 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05j
480 2017-07-12 reference/crypt/Biryukov05xa encyclopedia Alex Biryukov Substitution-Permutation (SP) Network. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_420 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05xa
481 2017-07-12 reference/crypt/Preneel05c encyclopedia Bart Preneel Correcting-block attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_79 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05c
482 2017-07-12 reference/crypt/Rayes11 encyclopedia Mohamed Omar Rayes One-Time Password. 885-887 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_785 reference/crypt/2011 db/reference/crypt/crypt2011.html#Rayes11
483 2017-07-12 reference/crypt/X11no encyclopedia Trust Anchor. 1320 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1002 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11no
484 2017-07-12 reference/crypt/Stiglic05c encyclopedia Anton Stiglic Prime Generation. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_313 reference/crypt/2005 db/reference/crypt/crypt2005.html#Stiglic05c
485 2017-07-12 reference/crypt/X11kr encyclopedia Resistance to the Standard Algebraic Attack. 1042 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1100 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kr
486 2017-07-12 reference/crypt/Helleseth05d encyclopedia Tor Helleseth Golomb'S Randomness Postulates. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_178 reference/crypt/2005 db/reference/crypt/crypt2005.html#Helleseth05d
487 2017-07-12 reference/crypt/Kuhn11c encyclopedia Markus Kuhn Tempest. 1283-1284 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_232 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kuhn11c
488 2017-07-12 reference/crypt/Paar05b encyclopedia Christof Paar Optimal Extension Fields (OEFs). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_289 reference/crypt/2005 db/reference/crypt/crypt2005.html#Paar05b
489 2017-07-12 reference/crypt/Sunar05 encyclopedia Berk Sunar Binary Euclidean Algorithm. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_26 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sunar05
490 2017-07-12 reference/crypt/X11nb encyclopedia Target Collision Resistant Hash Function. 1279 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1212 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nb
491 2017-07-12 reference/crypt/Gu11 encyclopedia Guofei Gu Botnet Detection in Enterprise Networks. 166-168 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_842 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gu11
492 2017-07-12 reference/crypt/X11mc encyclopedia Smart/Algorithmic Denial of Service. 1225 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1057 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mc
493 2017-07-12 reference/crypt/X11iy encyclopedia Operational Separation of Duties. 888 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1343 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11iy
494 2017-07-12 reference/crypt/Nguyen05b encyclopedia Phong Q. Nguyen Lattice Reduction. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_226 reference/crypt/2005 db/reference/crypt/crypt2005.html#Nguyen05b
495 2017-07-12 reference/crypt/X11kg encyclopedia Radio Interference Attack Defense. 1021 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1218 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kg
496 2017-07-12 reference/crypt/X11db encyclopedia Dynamic Program Analysis. 368 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1352 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11db
497 2017-07-12 reference/crypt/Locasto11 encyclopedia Michael E. Locasto CPU Denial of Service. 268-269 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_265 reference/crypt/2011 db/reference/crypt/crypt2011.html#Locasto11
498 2017-07-12 reference/crypt/X11mz encyclopedia Subscriber Identity Module. 1268 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1086 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mz
499 2017-07-12 reference/crypt/X11cq encyclopedia Decentralized Trust Management. 316 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1350 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11cq
500 2017-07-12 reference/crypt/Bleumer05xe encyclopedia Gerrit Bleumer Unlinkability. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_448 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05xe
501 2017-07-12 reference/crypt/X11fr encyclopedia Identity Authentication. 585 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1297 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fr
502 2017-07-12 reference/crypt/X11z encyclopedia Authorization. 65 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1025 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11z
503 2017-07-12 reference/crypt/X11ea encyclopedia Extended Euclidean Algorithm. 436 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1073 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ea
504 2017-07-12 reference/crypt/TriaC05 encyclopedia Assia Tria,Hamid Choukri Invasive Attacks. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_205 reference/crypt/2005 db/reference/crypt/crypt2005.html#TriaC05
505 2017-07-12 reference/crypt/X11oj encyclopedia Web Security. 1374 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1235 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11oj
506 2017-07-12 reference/crypt/X11e encyclopedia Advanced Encryption Standard. 24 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1206 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11e
507 2017-07-12 reference/crypt/Meadows11 encyclopedia Catherine A. Meadows Applications of Formal Methods to Intrusion Detection. 44-45 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_855 reference/crypt/2011 db/reference/crypt/crypt2011.html#Meadows11
508 2017-07-12 reference/crypt/X11lm encyclopedia Secure Shell. 1134 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1089 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lm
509 2017-07-12 reference/crypt/X11cd encyclopedia Coprime. 256 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1136 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11cd
510 2017-07-12 reference/crypt/Adams05 encyclopedia Carlisle Adams Attributes management. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_14 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05
511 2017-07-12 reference/crypt/Helleseth05h encyclopedia Tor Helleseth Sequences. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_385 reference/crypt/2005 db/reference/crypt/crypt2005.html#Helleseth05h
512 2018-01-26 reference/crypt/YangZ11 encyclopedia Yi Yang 0002,Sencun Zhu Anonymous Routing. 39-40 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_628 reference/crypt/2011 db/reference/crypt/crypt2011.html#YangZ11
513 2017-07-12 reference/crypt/X11jh encyclopedia Physical Obfuscated Key. 927 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1403 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jh
514 2017-07-12 reference/crypt/Bleumer11h encyclopedia Gerrit Bleumer DC Network. 313-315 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_194 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11h
515 2017-07-12 reference/crypt/CavoukianS11 encyclopedia Ann Cavoukian,Alex Stoianov Biometric Encryption. 90-98 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_880 reference/crypt/2011 db/reference/crypt/crypt2011.html#CavoukianS11
516 2017-07-12 reference/crypt/Burmester05 encyclopedia Mike Burmester Group Key Agreement. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_182 reference/crypt/2005 db/reference/crypt/crypt2005.html#Burmester05
517 2017-07-12 reference/crypt/Desmedt11a encyclopedia Yvo Desmedt Covert Channels. 265-266 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_315 reference/crypt/2011 db/reference/crypt/crypt2011.html#Desmedt11a
518 2017-07-12 reference/crypt/X11je encyclopedia Penmanship. 921 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1387 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11je
519 2017-07-12 reference/crypt/X11hq encyclopedia Microdata Anonymization Techniques. 778 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1288 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hq
520 2017-07-12 reference/crypt/Fontaine05c encyclopedia Caroline Fontaine Nonlinear Feedback Shift Register. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_274 reference/crypt/2005 db/reference/crypt/crypt2005.html#Fontaine05c
521 2017-07-12 reference/crypt/Sako05 encyclopedia Kazue Sako digital signature schemes. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_113 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sako05
522 2018-01-26 reference/crypt/YangZ11b encyclopedia Yi Yang 0002,Sencun Zhu Sensor Key Management. 1179-1181 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_633 reference/crypt/2011 db/reference/crypt/crypt2011.html#YangZ11b
523 2017-07-12 reference/crypt/X11ew encyclopedia Hand Geometry Verification. 531 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1377 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ew
524 2017-07-12 reference/crypt/Preneel11n encyclopedia Bart Preneel Modes of Operation of a Block Cipher. 789-794 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_599 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11n
525 2018-11-24 reference/crypt/QuisquaterS05b encyclopedia Jean-Jacques Quisquater,François-Xavier Standaert Time-memory tradeoffs. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_430,https://www.wikidata.org/entity/Q58765370 reference/crypt/2005 db/reference/crypt/crypt2005.html#QuisquaterS05b
526 2019-06-06 reference/crypt/Nita-RotaruCD11 encyclopedia Cristina Nita-Rotaru,Reza Curtmola,Jing Dong 0006 Security of Group Communication in Wireless Mesh Networks. 1159-1163 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_60 reference/crypt/2011 db/reference/crypt/crypt2011.html#Nita-RotaruCD11
527 2017-07-12 reference/crypt/Biryukov05 encyclopedia Alex Biryukov Adaptive Chosen Ciphertext Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_6 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05
528 2017-07-12 reference/crypt/X11ax encyclopedia BLP Model. 158 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1334 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ax
529 2017-07-12 reference/crypt/Tibouchi11a encyclopedia Mehdi Tibouchi Security Reduction. 1167-1168 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_515 reference/crypt/2011 db/reference/crypt/crypt2011.html#Tibouchi11a
530 2017-07-12 reference/crypt/Tilborg05 encyclopedia Henk C. A. van Tilborg Chinese Remainder Theorem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_58 reference/crypt/2005 db/reference/crypt/crypt2005.html#Tilborg05
531 2017-07-12 reference/crypt/Biryukov05l encyclopedia Alex Biryukov Feistel Cipher. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_159 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05l
532 2017-07-12 reference/crypt/Canteaut05h encyclopedia Anne Canteaut Linear Consistency Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_232 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canteaut05h
533 2017-07-12 reference/crypt/Canteaut11k encyclopedia Anne Canteaut Linear Syndrome Attack. 729 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_358 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11k
534 2017-07-12 reference/crypt/Weimerskirch11a encyclopedia André Weimerskirch Fixed-Exponent Exponentiation. 485-486 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_30 reference/crypt/2011 db/reference/crypt/crypt2011.html#Weimerskirch11a
535 2018-11-14 reference/crypt/KryszczukR11 encyclopedia Krzysztof Kryszczuk,Jonas Richiardi Biometric Sample Quality. 104-110 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_883,https://www.wikidata.org/entity/Q57840436 reference/crypt/2011 db/reference/crypt/crypt2011.html#KryszczukR11
536 2017-07-12 reference/crypt/X11ed encyclopedia Fermat Test. 456 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1146 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ed
537 2017-07-12 reference/crypt/Enck11 encyclopedia William Enck Android's Security Framework-Understanding the Security of Mobile Phone Platforms. 34-37 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_121 reference/crypt/2011 db/reference/crypt/crypt2011.html#Enck11
538 2017-07-12 reference/crypt/Boneh05c encyclopedia Dan Boneh Cramer-Shoup Public Key System. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_84 reference/crypt/2005 db/reference/crypt/crypt2005.html#Boneh05c
539 2017-07-12 reference/crypt/Charpin05a encyclopedia Pascale Charpin Reed-Muller Codes. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_348 reference/crypt/2005 db/reference/crypt/crypt2005.html#Charpin05a
540 2017-07-12 reference/crypt/Coull11 encyclopedia Scott E. Coull Traffic Analysis. 1311-1313 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_120 reference/crypt/2011 db/reference/crypt/crypt2011.html#Coull11
541 2017-07-12 reference/crypt/ThomasG11 encyclopedia Achint Thomas,Venu Govindaraju Biometric Sensors. 110-113 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_727 reference/crypt/2011 db/reference/crypt/crypt2011.html#ThomasG11
542 2017-07-12 reference/crypt/X11ii encyclopedia Nearest Vector Problem. 829 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1122 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ii
543 2017-07-12 reference/crypt/ChristodorescuG11 encyclopedia Mihai Christodorescu,Vinod Ganapathy Dynamic Analysis. 365-367 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_836 reference/crypt/2011 db/reference/crypt/crypt2011.html#ChristodorescuG11
544 2017-07-12 reference/crypt/AdamsHT11 encyclopedia Carlisle Adams,Russ Housley,Sean Turner Certification Authority. 193-195 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_103 reference/crypt/2011 db/reference/crypt/crypt2011.html#AdamsHT11
545 2017-07-12 reference/crypt/Wiener05 encyclopedia Michael J. Wiener Exhaustive Key Search. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_147 reference/crypt/2005 db/reference/crypt/crypt2005.html#Wiener05
546 2017-07-12 reference/crypt/Sako11a encyclopedia Kazue Sako Electronic Voting Schemes. 391-393 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_18 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sako11a
547 2017-07-12 reference/crypt/Biryukov05u encyclopedia Alex Biryukov Product Cipher, Superencryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_320 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05u
548 2017-07-12 reference/crypt/Bleumer11ad encyclopedia Gerrit Bleumer Undeniable Signatures. 1347-1348 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_235 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11ad
549 2017-07-12 reference/crypt/Canteaut11b encyclopedia Anne Canteaut Combination Generator. 222-224 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_338 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11b
550 2017-07-12 reference/crypt/X11dj encyclopedia Efficiency of Hyperelliptic Curve Cryptosystems. 382 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1049 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dj
551 2017-07-12 reference/crypt/Bernstein11a encyclopedia Daniel J. Bernstein Post-Quantum Cryptography. 949-950 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_386 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bernstein11a
552 2017-07-12 reference/crypt/Kaliski11y encyclopedia Burt Kaliski Polynomial Time. 948-949 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_425 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11y
553 2017-07-12 reference/crypt/Landrock05d encyclopedia Peter Landrock CEPS Standard. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_48 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05d
554 2017-07-12 reference/crypt/Kaliski11 encyclopedia Burt Kaliski Asymmetric Cryptosystem. 49-50 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_394 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11
555 2017-07-12 reference/crypt/Just11f encyclopedia Mike Just Nonrepudiation of Digital Signatures. 852-854 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_88 reference/crypt/2011 db/reference/crypt/crypt2011.html#Just11f
556 2017-07-12 reference/crypt/X11hf encyclopedia Macrodata Disclosure Protection. 748 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1287 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hf
557 2017-07-12 reference/crypt/Fontaine11g encyclopedia Caroline Fontaine Self-Synchronizing Stream Cipher. 1175-1176 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_371 reference/crypt/2011 db/reference/crypt/crypt2011.html#Fontaine11g
558 2017-07-12 reference/crypt/X11q encyclopedia Anti-DoS Cookies. 42 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1069 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11q
559 2017-07-12 reference/crypt/BrassardC11 encyclopedia Gilles Brassard,Claude Crépeau Quantum Cryptography. 1005-1010 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_241 reference/crypt/2011 db/reference/crypt/crypt2011.html#BrassardC11
560 2017-07-12 reference/crypt/Preneel05g encyclopedia Bart Preneel Maa. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_239 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05g
561 2017-07-12 reference/crypt/X11c encyclopedia Access Rights. 20 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1313 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11c
562 2017-07-12 reference/crypt/Bleumer05r encyclopedia Gerrit Bleumer Group Signatures. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_183 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05r
563 2017-07-12 reference/crypt/Biryukov11s encyclopedia Alex Biryukov Multiple Encryption. 815 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_600 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11s
564 2017-07-12 reference/crypt/Carlet11 encyclopedia Claude Carlet Algebraic Immunity of Boolean Functions. 31-32 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_333 reference/crypt/2011 db/reference/crypt/crypt2011.html#Carlet11
565 2017-07-12 reference/crypt/X11hr encyclopedia Microdata Disclosure Limitation. 778 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1290 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hr
566 2017-07-12 reference/crypt/Schoenmakers11i encyclopedia Berry Schoenmakers Threshold Homomorphic Cryptosystems. 1293-1294 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_13 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schoenmakers11i
567 2017-07-12 reference/crypt/X11t encyclopedia Antivirus. 42 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1354 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11t
568 2017-07-12 reference/crypt/X11oh encyclopedia Web Initial Sign on. 1374 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1392 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11oh
569 2017-07-12 reference/crypt/X11iz encyclopedia Outbound Authentication. 891 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1248 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11iz
570 2019-10-25 reference/crypt/Liskov11a encyclopedia Moses D. Liskov Fermat's Little Theorem. 456 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_449 reference/crypt/2011 db/reference/crypt/crypt2011.html#Liskov11a
571 2017-07-12 reference/crypt/Kuhn11b encyclopedia Markus Kuhn Smartcard Tamper Resistance. 1225-1227 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_228 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kuhn11b
572 2017-07-12 reference/crypt/Bleumer11 encyclopedia Gerrit Bleumer Anonymity. 37-38 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_180 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11
573 2017-07-12 reference/crypt/Carlet11d encyclopedia Claude Carlet Propagation Characteristics of Boolean Functions. 986-987 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_363 reference/crypt/2011 db/reference/crypt/crypt2011.html#Carlet11d
574 2017-07-12 reference/crypt/Soete11d encyclopedia Marijke De Soete Electronic Cheque. 387 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_285 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11d
575 2017-07-12 reference/crypt/Salvaneschi11 encyclopedia Paolo Salvaneschi Common Criteria, From a Security Policies Perspective. 229-232 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_815 reference/crypt/2011 db/reference/crypt/crypt2011.html#Salvaneschi11
576 2017-07-12 reference/crypt/Naccache11f encyclopedia David Naccache Gröbner Basis. 519 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_508 reference/crypt/2011 db/reference/crypt/crypt2011.html#Naccache11f
577 2017-07-12 reference/crypt/Bleumer05n encyclopedia Gerrit Bleumer Existential Forgery. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_148 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05n
578 2017-07-12 reference/crypt/X11cg encyclopedia Credential Verification. 270 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1300 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11cg
579 2017-07-12 reference/crypt/Biryukov05d encyclopedia Alex Biryukov Chosen Ciphertext Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_59 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05d
580 2017-07-12 reference/crypt/Bauer11f encyclopedia Friedrich L. Bauer Cryptology. 283-284 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_166 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11f
581 2017-07-12 reference/crypt/Kaliski11d encyclopedia Burt Kaliski Claw-Free. 209-210 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_398 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11d
582 2017-07-12 reference/crypt/Bleumer11p encyclopedia Gerrit Bleumer Forgery. 489-490 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_206 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11p
583 2017-07-12 reference/crypt/HankersonM11d encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curve Keys. 401 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_248 reference/crypt/2011 db/reference/crypt/crypt2011.html#HankersonM11d
584 2017-07-12 reference/crypt/Bauer11q encyclopedia Friedrich L. Bauer Substitutions and Permutations. 1268-1270 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_176 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11q
585 2017-07-12 reference/crypt/X11jy encyclopedia Public Key Encryption. 997 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1039 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jy
586 2017-07-12 reference/crypt/X11jt encyclopedia Program Integrity Verification. 981 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1224 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jt
587 2017-07-12 reference/crypt/Caddy11e encyclopedia Tom Caddy Security Evaluation Criteria. 1144-1146 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_224 reference/crypt/2011 db/reference/crypt/crypt2011.html#Caddy11e
588 2017-07-12 reference/crypt/X11jc encyclopedia Parallelizable Message Authentication Code. 913 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1199 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jc
589 2017-07-12 reference/crypt/Verma05 encyclopedia Pavan Verma Virus Protection. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_455 reference/crypt/2005 db/reference/crypt/crypt2005.html#Verma05
590 2017-07-12 reference/crypt/Biryukov11w encyclopedia Alex Biryukov Resynchronization Attack. 1042-1043 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_610 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11w
591 2017-07-12 reference/crypt/Bauer11j encyclopedia Friedrich L. Bauer Information Theory. 608-609 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_169 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11j
592 2017-07-12 reference/crypt/Kaliski11u encyclopedia Burt Kaliski Moore's Law. 803 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_420 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11u
593 2017-07-12 reference/crypt/Canteaut11 encyclopedia Anne Canteaut A5/1. 1-2 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_332 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11 conf/crypto/BarkanBK03,conf/sacrypt/BarkanB05,journals/joc/BarkanBK08,conf/indocrypt/BihamD00,conf/fse/BiryukovSW00,journals/tit/EkdahlJ03,conf/sacrypt/MaximovJB04,...,...
594 2017-07-12 reference/crypt/Just05c encyclopedia Mike Just Needham-Schroeder Protocols. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_270 reference/crypt/2005 db/reference/crypt/crypt2005.html#Just05c
595 2017-07-12 reference/crypt/Preneel05d encyclopedia Bart Preneel Davies-Meyer Hash Function. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_96 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05d
596 2017-07-12 reference/crypt/Naccache11j encyclopedia David Naccache Phenotyping. 927 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_894 reference/crypt/2011 db/reference/crypt/crypt2011.html#Naccache11j
597 2017-07-12 reference/crypt/X11kz encyclopedia Runtime Analysis. 1073 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1353 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kz
598 2017-07-12 reference/crypt/Durfee11 encyclopedia Glenn Durfee Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem. 1387-1388 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_260 reference/crypt/2011 db/reference/crypt/crypt2011.html#Durfee11
599 2017-07-12 reference/crypt/Robshaw05a encyclopedia Matthew J. B. Robshaw Trapdoor One-Way Function. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_436 reference/crypt/2005 db/reference/crypt/crypt2005.html#Robshaw05a
600 2017-07-12 reference/crypt/Morris11 encyclopedia Thomas Morris Trusted Platform Module. 1332-1335 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_796 reference/crypt/2011 db/reference/crypt/crypt2011.html#Morris11
601 2017-07-12 reference/crypt/X11nz encyclopedia Voice Recognition. 1364 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1278 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nz
602 2017-07-12 reference/crypt/X11fw encyclopedia Information Flow Security. 607 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1375 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fw
603 2017-07-12 reference/crypt/X11jk encyclopedia POK. 944 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1405 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jk
604 2017-07-12 reference/crypt/Bauer05g encyclopedia Friedrich L. Bauer Cryptosystem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_90 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05g
605 2019-10-31 reference/crypt/CampisiMN11 encyclopedia Patrizio Campisi,Emanuele Maiorana,Alessandro Neri 0001 Signature Biometrics. 1208-1210 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_746 reference/crypt/2011 db/reference/crypt/crypt2011.html#CampisiMN11
606 2017-07-12 reference/crypt/Soete11i encyclopedia Marijke De Soete PKI. 935-936 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_301 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11i
607 2017-07-12 reference/crypt/X11ba encyclopedia BSP Board Support Package. 174 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1325 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ba
608 2017-07-12 reference/crypt/Landrock05q encyclopedia Peter Landrock Registration Authority. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_349 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05q
609 2017-07-12 reference/crypt/Canniere11j encyclopedia Christophe De Cannière TWOFISH. 1339-1340 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_623 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canniere11j
610 2017-07-12 reference/crypt/Kaliski11ag encyclopedia Burt Kaliski RSA Factoring Challenge. 1064-1065 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_433 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11ag
611 2017-07-12 reference/crypt/Bleumer05e encyclopedia Gerrit Bleumer Communication Channel Anonymity. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_73 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05e
612 2017-07-12 reference/crypt/X11ex encyclopedia Hash-Based Message Authentication Code. 553 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1193 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ex
613 2019-10-25 reference/crypt/Liskov05a encyclopedia Moses D. Liskov Fermat's Little Theorem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_161 reference/crypt/2005 db/reference/crypt/crypt2005.html#Liskov05a
614 2017-07-12 reference/crypt/Fontaine05 encyclopedia Caroline Fontaine Clock-Controlled Generator. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_65 reference/crypt/2005 db/reference/crypt/crypt2005.html#Fontaine05
615 2017-07-12 reference/crypt/Sako11d encyclopedia Kazue Sako Probabilistic Public-Key Encryption. 980 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_21 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sako11d
616 2017-07-12 reference/crypt/Kaliski11m encyclopedia Burt Kaliski Generator. 510 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_410 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11m
617 2017-07-12 reference/crypt/Cook11 encyclopedia Debbie Cook Protocol Cookies. 990-991 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_274 reference/crypt/2011 db/reference/crypt/crypt2011.html#Cook11
618 2017-07-12 reference/crypt/Bleumer05m encyclopedia Gerrit Bleumer Electronic Wallet. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_127 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05m
619 2017-07-12 reference/crypt/Gagne11 encyclopedia Martin Gagné Identity-Based Encryption. 594-596 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_148 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gagne11
620 2017-07-12 reference/crypt/Crepeau11 encyclopedia Claude Crépeau Commitment. 224-227 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_239 reference/crypt/2011 db/reference/crypt/crypt2011.html#Crepeau11
621 2017-07-12 reference/crypt/Contini11b encyclopedia Scott Contini Modular Root. 798 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_462 reference/crypt/2011 db/reference/crypt/crypt2011.html#Contini11b
622 2018-11-14 reference/crypt/Solinas11 encyclopedia Jerome A. Solinas Generalized Mersenne Prime. 509-510 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_32,https://www.wikidata.org/entity/Q56051143 reference/crypt/2011 db/reference/crypt/crypt2011.html#Solinas11
623 2017-07-12 reference/crypt/Smith11d encyclopedia Sean W. Smith Secure Coprocessor. 1102-1103 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_495 reference/crypt/2011 db/reference/crypt/crypt2011.html#Smith11d
624 2017-07-12 reference/crypt/Canteaut05c encyclopedia Anne Canteaut Correlation Attack for Stream Ciphers. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_80 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canteaut05c
625 2017-07-12 reference/crypt/Paar11 encyclopedia Christof Paar Exponentiation Algorithms. 434-436 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_28 reference/crypt/2011 db/reference/crypt/crypt2011.html#Paar11
626 2017-07-12 reference/crypt/Vimercati11a encyclopedia Sabrina De Capitani di Vimercati Access Matrix. 14-17 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_807 reference/crypt/2011 db/reference/crypt/crypt2011.html#Vimercati11a
627 2017-07-12 reference/crypt/X11eg encyclopedia Firewall Policy Analysis. 474 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1401 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11eg
628 2017-07-12 reference/crypt/Teske11 encyclopedia Edlyn Teske Pairing-Friendly Elliptic Curves. 904-907 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_256 reference/crypt/2011 db/reference/crypt/crypt2011.html#Teske11
629 2017-07-12 reference/crypt/HankersonM05d encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curve Key Agreement Schemes. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_133 reference/crypt/2005 db/reference/crypt/crypt2005.html#HankersonM05d
630 2017-07-12 reference/crypt/Caddy11i encyclopedia Tom Caddy Tamper Response. 1278-1279 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_231 reference/crypt/2011 db/reference/crypt/crypt2011.html#Caddy11i
631 2017-07-12 reference/crypt/Canniere11f encyclopedia Christophe De Cannière Kasumi/Misty1. 669-670 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_586 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canniere11f
632 2017-07-12 reference/crypt/Biryukov05x encyclopedia Alex Biryukov Skipjack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_401 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05x
633 2017-07-12 reference/crypt/Pointcheval05 encyclopedia David Pointcheval OAEP: Optimal Asymmetric Encryption Padding. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_284 reference/crypt/2005 db/reference/crypt/crypt2005.html#Pointcheval05
634 2017-07-12 reference/crypt/Kaliski11ae encyclopedia Burt Kaliski Ring. 1049-1050 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_431 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11ae
635 2017-07-12 reference/crypt/Biryukov11x encyclopedia Alex Biryukov Skipjack. 1220-1221 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_616 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11x
636 2017-07-12 reference/crypt/JoyeO05 encyclopedia Marc Joye,Francis Olivier Side-Channel Analysis. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_394 reference/crypt/2005 db/reference/crypt/crypt2005.html#JoyeO05
637 2017-07-12 reference/crypt/Landrock05l encyclopedia Peter Landrock Mondex. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_262 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05l
638 2017-07-12 reference/crypt/Biryukov11u encyclopedia Alex Biryukov Product Cipher, Superencryption. 980-981 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_606 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11u
639 2017-07-12 reference/crypt/X11gf encyclopedia Interactive Theorem Proving and Security. 619 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1373 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gf
640 2017-07-12 reference/crypt/X11my encyclopedia Subgroup Cryptosystems. 1267 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1165 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11my
641 2017-07-12 reference/crypt/Schwenk11 encyclopedia Jörg Schwenk HTTP Authentication. 564-565 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_653 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schwenk11
642 2017-07-12 reference/crypt/X11fn encyclopedia IC Integrated Circuit. 583 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1323 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fn
643 2017-07-12 reference/crypt/Crepeau05a encyclopedia Claude Crépeau Cut-and-choose protocol. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_92 reference/crypt/2005 db/reference/crypt/crypt2005.html#Crepeau05a
644 2017-07-12 reference/crypt/Smith11 encyclopedia Sean W. Smith Attestation. 50-51 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_697 reference/crypt/2011 db/reference/crypt/crypt2011.html#Smith11
645 2017-07-12 reference/crypt/X11lz encyclopedia Simultaneous Transactions. 1220 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1036 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lz
646 2017-07-12 reference/crypt/Schoenmakers11f encyclopedia Berry Schoenmakers Oblivious Transfer. 884-885 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_9 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schoenmakers11f
647 2017-07-12 reference/crypt/Preneel11b encyclopedia Bart Preneel CMAC. 214-215 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_562 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11b
648 2019-12-27 reference/crypt/Ardagna11 encyclopedia Claudio Agostino Ardagna Location Information (Privacy of). 729-732 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_755 reference/crypt/2011 db/reference/crypt/crypt2011.html#Ardagna11
649 2017-07-12 reference/crypt/Kaliski11aj encyclopedia Burt Kaliski Subgroup. 1267 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_437 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11aj
650 2017-07-12 reference/crypt/Caddy11b encyclopedia Tom Caddy FIPS 140-2. 468-471 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_205 reference/crypt/2011 db/reference/crypt/crypt2011.html#Caddy11b
651 2017-07-12 reference/crypt/X11lu encyclopedia SHA. 1190 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1210 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lu
652 2017-07-12 reference/crypt/Boneh05i encyclopedia Dan Boneh 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_414 reference/crypt/2005 db/reference/crypt/crypt2005.html#Boneh05i
653 2017-07-12 reference/crypt/McDaniel05 encyclopedia Patrick D. McDaniel IPsec. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_209 reference/crypt/2005 db/reference/crypt/crypt2005.html#McDaniel05
654 2017-07-12 reference/crypt/Solinas11b encyclopedia Jerome A. Solinas Pseudo-Mersenne Prime. 992 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_42 reference/crypt/2011 db/reference/crypt/crypt2011.html#Solinas11b
655 2017-07-12 reference/crypt/Just11c encyclopedia Mike Just Key Agreement. 677-678 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_82 reference/crypt/2011 db/reference/crypt/crypt2011.html#Just11c
656 2017-07-12 reference/crypt/CasperP11 encyclopedia William D. Casper,Stephen M. Papa Root of Trust. 1057-1060 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_789 reference/crypt/2011 db/reference/crypt/crypt2011.html#CasperP11
657 2017-07-12 reference/crypt/X11bk encyclopedia Chromosome. 206 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1259 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bk
658 2017-07-12 reference/crypt/Boneh05 encyclopedia Dan Boneh BLS Short Digital Signatures. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_35 reference/crypt/2005 db/reference/crypt/crypt2005.html#Boneh05
659 2017-07-12 reference/crypt/Preneel11j encyclopedia Bart Preneel MAA. 741-742 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_591 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11j
660 2017-07-12 reference/crypt/Preneel11d encyclopedia Bart Preneel Collision Resistance. 221-222 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_565 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11d
661 2017-07-12 reference/crypt/X11np encyclopedia Two-Key Cryptosystem. 1342 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1121 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11np
662 2017-07-12 reference/crypt/Shparlinski05 encyclopedia Igor E. Shparlinski Diffie-Hellman Problem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_112 reference/crypt/2005 db/reference/crypt/crypt2005.html#Shparlinski05
663 2017-07-12 reference/crypt/Kaliski05e encyclopedia Burton S. Kaliski Jr. Decryption Exponent. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_100 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05e
664 2017-07-12 reference/crypt/Fontaine11f encyclopedia Caroline Fontaine Self-Shrinking Generator. 1175 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_370 reference/crypt/2011 db/reference/crypt/crypt2011.html#Fontaine11f
665 2017-07-12 reference/crypt/Adams11n encyclopedia Carlisle Adams User Authentication. 1352 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_99 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11n
666 2017-07-12 reference/crypt/X11bp encyclopedia CMVP - Cryptographic Module Validation Program. 215 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1037 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bp
667 2017-07-12 reference/crypt/Orlowski11 encyclopedia Arkadiusz Orlowski Enigma. 417-420 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_504 reference/crypt/2011 db/reference/crypt/crypt2011.html#Orlowski11
668 2017-07-12 reference/crypt/Vauclair11c encyclopedia Marc Vauclair Secure Element. 1115-1116 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_303 reference/crypt/2011 db/reference/crypt/crypt2011.html#Vauclair11c
669 2017-07-12 reference/crypt/HyunN11 encyclopedia Sangwon Hyun,Peng Ning Secure Code Dissemination in Wireless Sensor Networks. 1099-1102 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_637 reference/crypt/2011 db/reference/crypt/crypt2011.html#HyunN11
670 2017-07-12 reference/crypt/X11iw encyclopedia One-way property. 888 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1200 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11iw
671 2017-07-12 reference/crypt/X11el encyclopedia Forward Secrecy. 499 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1399 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11el
672 2017-07-12 reference/crypt/Canteaut11i encyclopedia Anne Canteaut Linear Cryptanalysis for Stream Ciphers. 725-726 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_356 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11i
673 2017-07-12 reference/crypt/X11ck encyclopedia Cryptographic Protocol Verification. 283 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1376 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ck
674 2019-06-06 reference/crypt/CurtmolaDN11 encyclopedia Reza Curtmola,Jing Dong 0006,Cristina Nita-Rotaru Security of Wireless Mesh Networks (General Overview). 1163-1167 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_56 reference/crypt/2011 db/reference/crypt/crypt2011.html#CurtmolaDN11
675 2017-07-12 reference/crypt/Bauer11k encyclopedia Friedrich L. Bauer Key. 676-677 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_170 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11k
676 2017-07-12 reference/crypt/X11dd encyclopedia e-Government. 372 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1189 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dd
677 2017-07-12 reference/crypt/Sendrier05 encyclopedia Nicolas Sendrier McEliece Public Key Cryptosystem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_248 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sendrier05
678 2017-07-12 reference/crypt/X11ie encyclopedia Multidimensional Databases. 808 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1295 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ie
679 2017-07-12 reference/crypt/Kaliski05u encyclopedia Burton S. Kaliski Jr. MIPS-Year. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_255 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05u
680 2017-07-12 reference/crypt/X11hk encyclopedia MD5 Hash Function. 771 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1197 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hk
681 2017-07-12 reference/crypt/Johns11 encyclopedia Martin Johns Session Hijacking Attacks. 1189-1190 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_661 reference/crypt/2011 db/reference/crypt/crypt2011.html#Johns11
682 2017-07-12 reference/crypt/Biryukov05i encyclopedia Alex Biryukov DES-X (or DESX). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_105 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05i
683 2017-07-12 reference/crypt/X11ia encyclopedia 804 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1134 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ia
684 2017-07-12 reference/crypt/Canniere05h encyclopedia Christophe De Cannière Serpent. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_386 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canniere05h
685 2017-07-12 reference/crypt/Brose05 encyclopedia Gerald Brose Access Control. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_3 reference/crypt/2005 db/reference/crypt/crypt2005.html#Brose05
686 2017-07-12 reference/crypt/Xu11 encyclopedia Wenyuan Xu Jamming Attack Defense. 655-661 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_632 reference/crypt/2011 db/reference/crypt/crypt2011.html#Xu11
687 2017-07-12 reference/crypt/Smith11b encyclopedia Sean W. Smith Dynamic Root of Trust. 368-369 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_703 reference/crypt/2011 db/reference/crypt/crypt2011.html#Smith11b
688 2017-07-12 reference/crypt/X11gp encyclopedia Key Recovery. 688 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1362 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gp
689 2017-07-12 reference/crypt/BargK11 encyclopedia Alexander Barg,Gregory A. Kabatiansky Fingerprinting. 465-467 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_381 reference/crypt/2011 db/reference/crypt/crypt2011.html#BargK11
690 2018-11-24 reference/crypt/StandaertQ11 encyclopedia François-Xavier Standaert,Jean-Jacques Quisquater Physical Security. 928-929 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_130,https://www.wikidata.org/entity/Q58765158 reference/crypt/2011 db/reference/crypt/crypt2011.html#StandaertQ11
691 2017-07-12 reference/crypt/X11nc encyclopedia TCG Trusted Computing Group. 1279 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1316 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nc
692 2017-07-12 reference/crypt/Gordon05 encyclopedia Daniel Gordon Discrete Logarithm Problem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_116 reference/crypt/2005 db/reference/crypt/crypt2005.html#Gordon05
693 2017-07-12 reference/crypt/X11lq encyclopedia Security Token. 1174 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1247 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lq
694 2017-07-12 reference/crypt/HankersonM11f encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curve Public-Key Encryption Schemes. 406-407 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_250 reference/crypt/2011 db/reference/crypt/crypt2011.html#HankersonM11f
695 2017-07-12 reference/crypt/X11kd encyclopedia PUF. 1001 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1406 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kd
696 2017-07-12 reference/crypt/QuisquaterS05a encyclopedia Jean-Jacques Quisquater,David Samyde Radio Frequency Attacks. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_341 reference/crypt/2005 db/reference/crypt/crypt2005.html#QuisquaterS05a
697 2017-07-12 reference/crypt/Lenstra05a encyclopedia Arjen K. Lenstra Factoring Circuits. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_153 reference/crypt/2005 db/reference/crypt/crypt2005.html#Lenstra05a
698 2017-07-12 reference/crypt/BiryukovC05 encyclopedia Alex Biryukov,Christophe De Cannière Data encryption standard (DES). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_94 reference/crypt/2005 db/reference/crypt/crypt2005.html#BiryukovC05
699 2017-07-12 reference/crypt/Canteaut11j encyclopedia Anne Canteaut Linear Feedback Shift Register. 726-729 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_357 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11j
700 2017-07-12 reference/crypt/Moller11 encyclopedia Bodo Möller Binary Exponentiation. 84-86 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_26 reference/crypt/2011 db/reference/crypt/crypt2011.html#Moller11
701 2017-07-12 reference/crypt/X11em encyclopedia FPGA Field Programmable Gate Array. 499 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1326 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11em
702 2017-07-12 reference/crypt/Millen11 encyclopedia Jonathan K. Millen Biba Model. 81-82 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_812 reference/crypt/2011 db/reference/crypt/crypt2011.html#Millen11
703 2017-07-12 reference/crypt/Kaliski11ad encyclopedia Burt Kaliski Relatively Prime. 1041 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_430 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11ad
704 2017-09-25 reference/crypt/Lange11 encyclopedia Tanja Lange 0001 Edwards Curves. 380-382 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_243 reference/crypt/2011 db/reference/crypt/crypt2011.html#Lange11
705 2017-07-12 reference/crypt/Indesteege11 encyclopedia Sebastiaan Indesteege ARIA. 47 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_547 reference/crypt/2011 db/reference/crypt/crypt2011.html#Indesteege11
706 2017-07-12 reference/crypt/Soete11l encyclopedia Marijke De Soete SIM/UICC. 1217-1218 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_307 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11l
707 2017-07-12 reference/crypt/Preneel11 encyclopedia Bart Preneel AHS Competition/SHA-3. 27-29 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_546 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11
708 2017-07-12 reference/crypt/Bauer11p encyclopedia Friedrich L. Bauer Security. 1143-1144 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_175 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11p
709 2017-07-12 reference/crypt/Stiglic11a encyclopedia Anton Stiglic Primality Proving Algorithm. 958 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_468 reference/crypt/2011 db/reference/crypt/crypt2011.html#Stiglic11a
710 2017-07-12 reference/crypt/PernulR11 encyclopedia Günther Pernul,Moritz Riesner Conceptual Design of Secure Databases. 245-248 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_673 reference/crypt/2011 db/reference/crypt/crypt2011.html#PernulR11
711 2017-07-12 reference/crypt/X11by encyclopedia Conference Keying. 248 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1094 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11by
712 2017-07-12 reference/crypt/Bauer11r encyclopedia Friedrich L. Bauer Vernam Cipher. 1359-1360 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_177 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11r
713 2017-07-12 reference/crypt/Zimmermann05 encyclopedia Paul Zimmermann Elliptic Curve Method. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_135 reference/crypt/2005 db/reference/crypt/crypt2005.html#Zimmermann05
714 2017-07-12 reference/crypt/X11lk encyclopedia Secure Networks Design. 1126 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1190 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lk
715 2017-07-12 reference/crypt/Kaliski11q encyclopedia Burt Kaliski Irreducible Polynomial. 646 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_415 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11q
716 2017-07-12 reference/crypt/X11hu encyclopedia Miller-Rabin Test. 785 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1159 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hu
717 2017-07-12 reference/crypt/X11fo encyclopedia IC-Integrated Circuit. 583 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1315 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fo
718 2017-07-12 reference/crypt/Moller05b encyclopedia Bodo Möller Signed Digit Exponentiation. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_399 reference/crypt/2005 db/reference/crypt/crypt2005.html#Moller05b
719 2017-07-12 reference/crypt/Landrock05r encyclopedia Peter Landrock S/MIME. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_405 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05r
720 2017-07-12 reference/crypt/X11jo encyclopedia Privacy-Enabled Database. 972 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1241 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jo
721 2017-07-12 reference/crypt/Moller05e encyclopedia Bodo Möller 2 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_445 reference/crypt/2005 db/reference/crypt/crypt2005.html#Moller05e
722 2017-07-12 reference/crypt/Damiani11 encyclopedia Ernesto Damiani Web Service Security. 1375-1377 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_668 reference/crypt/2011 db/reference/crypt/crypt2011.html#Damiani11
723 2017-07-12 reference/crypt/Biryukov11n encyclopedia Alex Biryukov Impossible Differential Attack. 597 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_583 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11n
724 2017-07-12 reference/crypt/Clark11 encyclopedia Andrew Clark HTTP Session Security. 567-569 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_654 reference/crypt/2011 db/reference/crypt/crypt2011.html#Clark11
725 2017-07-12 reference/crypt/Preneel11r encyclopedia Bart Preneel Second Preimage Resistance. 1093 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_613 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11r
726 2017-07-12 reference/crypt/Frikken11 encyclopedia Keith B. Frikken Secure Multiparty Computation (SMC). 1121-1123 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_766 reference/crypt/2011 db/reference/crypt/crypt2011.html#Frikken11
727 2017-07-12 reference/crypt/Hunter11 encyclopedia Michael T. Hunter Cookie. 254-256 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_105 reference/crypt/2011 db/reference/crypt/crypt2011.html#Hunter11
728 2017-07-12 reference/crypt/Koc11 encyclopedia Çetin Kaya Koç Montgomery Arithmetic. 799-803 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_38 reference/crypt/2011 db/reference/crypt/crypt2011.html#Koc11
729 2017-07-12 reference/crypt/Rayes11a encyclopedia Mohamed Omar Rayes Protected Mode. 987 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_787 reference/crypt/2011 db/reference/crypt/crypt2011.html#Rayes11a
730 2017-07-12 reference/crypt/Caddy11g encyclopedia Tom Caddy Tamper Detection. 1277 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_229 reference/crypt/2011 db/reference/crypt/crypt2011.html#Caddy11g
731 2017-07-12 reference/crypt/X11bn encyclopedia Client Puzzles. 211 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1058 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bn
732 2017-07-12 reference/crypt/Kaliski11r encyclopedia Burt Kaliski Jacobi Symbol. 655 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_416 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11r
733 2017-07-12 reference/crypt/ShamirT05 encyclopedia Adi Shamir,Eran Tromer TWIRL. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_442 reference/crypt/2005 db/reference/crypt/crypt2005.html#ShamirT05
734 2017-07-12 reference/crypt/Landrock05k encyclopedia Peter Landrock Key Encryption Key. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_220 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05k
735 2017-07-12 reference/crypt/Landrock05 encyclopedia Peter Landrock ABA digital signature guidelines. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_2 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05
736 2017-09-16 reference/crypt/ZhangYZ11 encyclopedia David Zhang 0001,Feng Yue,Wangmeng Zuo Palmprint Recognition. 909-913 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_744 reference/crypt/2011 db/reference/crypt/crypt2011.html#ZhangYZ11
737 2017-07-12 reference/crypt/Preneel11c encyclopedia Bart Preneel Collision Attack. 220-221 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_564 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11c
738 2017-07-12 reference/crypt/X11ll encyclopedia Secure Remote Programming. 1126 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1222 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ll
739 2017-07-12 reference/crypt/Biennier11 encyclopedia Frédérique Biennier Web Single Sign On and SAML. 1377-1382 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_906 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biennier11
740 2017-07-12 reference/crypt/Preneel05a encyclopedia Bart Preneel Collision Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_68 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05a
741 2017-07-12 reference/crypt/X11gz encyclopedia List Decoding. 729 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1115 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gz
742 2017-07-12 reference/crypt/Rotondo11a encyclopedia Scott A. Rotondo Trusted Computing Platform Alliance. 1332 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_499 reference/crypt/2011 db/reference/crypt/crypt2011.html#Rotondo11a
743 2017-07-12 reference/crypt/Capkun11a encyclopedia Srdjan Capkun Security of Distance Bounding Protocols. 1158-1159 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_62 reference/crypt/2011 db/reference/crypt/crypt2011.html#Capkun11a
744 2017-07-12 reference/crypt/Preneel05l encyclopedia Bart Preneel NESSIE Project. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_271 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05l
745 2017-07-12 reference/crypt/Boneh05d encyclopedia Dan Boneh Digital Signature Standard. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_114 reference/crypt/2005 db/reference/crypt/crypt2005.html#Boneh05d
746 2017-07-12 reference/crypt/Landrock05p encyclopedia Peter Landrock Public Key Infrastructure. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_332 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05p
747 2017-07-12 reference/crypt/Biryukov11y encyclopedia Alex Biryukov Slide Attack. 1221-1222 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_617 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11y
748 2017-07-12 reference/crypt/X11im encyclopedia Node Replication. 846 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1220 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11im
749 2017-07-12 reference/crypt/Kaliski05l encyclopedia Burton S. Kaliski Jr. Field Polynomial. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_164 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05l
750 2017-07-12 reference/crypt/X11lr encyclopedia Security Verification. 1174 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1368 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lr
751 2017-07-12 reference/crypt/LeFevreC11 encyclopedia Kristen LeFevre,Bee-Chung Chen Adversarial/External Knowledge (Privacy in the Presence of). 24-26 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_902 reference/crypt/2011 db/reference/crypt/crypt2011.html#LeFevreC11
752 2017-07-12 reference/crypt/Kaliski11af encyclopedia Burt Kaliski RSA Digital Signature Scheme. 1061-1064 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_432 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11af
753 2017-07-12 reference/crypt/X11fu encyclopedia Indistinguishability of Encryptions. 600 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1045 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fu
754 2017-07-12 reference/crypt/X11lc encyclopedia Secure Computation. 1102 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1330 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11lc
755 2017-07-12 reference/crypt/Boeyen05 encyclopedia Sharon Boeyen Trust Models. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_440 reference/crypt/2005 db/reference/crypt/crypt2005.html#Boeyen05
756 2017-07-12 reference/crypt/Canniere05i encyclopedia Christophe De Cannière Triple-DES. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_437 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canniere05i
757 2017-07-12 reference/crypt/Lenstra05b encyclopedia Arjen K. Lenstra Integer Factoring. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_200 reference/crypt/2005 db/reference/crypt/crypt2005.html#Lenstra05b
758 2017-07-12 reference/crypt/Bleumer11w encyclopedia Gerrit Bleumer Public Key Proxy Encryption. 997-999 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_217 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11w
759 2017-07-12 reference/crypt/Stiglic05d encyclopedia Anton Stiglic Prime number. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_314 reference/crypt/2005 db/reference/crypt/crypt2005.html#Stiglic05d
760 2018-11-02 reference/crypt/Micciancio05b encyclopedia Daniele Micciancio Shortest Vector Problem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_392 reference/crypt/2005 db/reference/crypt/crypt2005.html#Micciancio05b
761 2017-07-12 reference/crypt/Meadows11b encyclopedia Catherine A. Meadows Formal Methods in Certification and Evaluation. 498-499 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_858 reference/crypt/2011 db/reference/crypt/crypt2011.html#Meadows11b
762 2017-07-12 reference/crypt/Bauer11i encyclopedia Friedrich L. Bauer Encryption. 416 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_168 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11i
763 2017-07-12 reference/crypt/X11bo encyclopedia Cloud Computing. 214 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1239 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bo
764 2017-07-12 reference/crypt/HankersonM05b encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curve Cryptography. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_131 reference/crypt/2005 db/reference/crypt/crypt2005.html#HankersonM05b
765 2017-07-12 reference/crypt/Gorla11 encyclopedia Elisa Gorla Torus-Based Cryptography. 1306-1308 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_481 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gorla11
766 2017-07-12 reference/crypt/Bauer05i encyclopedia Friedrich L. Bauer Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_141 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05i
767 2017-07-12 reference/crypt/Handschuh05 encyclopedia Helena Handschuh RC5. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_345 reference/crypt/2005 db/reference/crypt/crypt2005.html#Handschuh05
768 2017-07-12 reference/crypt/Fenet11 encyclopedia Serge Fenet Header-Based Attacks. 553-556 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_652 reference/crypt/2011 db/reference/crypt/crypt2011.html#Fenet11
769 2017-07-12 reference/crypt/Helleseth11f encyclopedia Tor Helleseth Pseudo-Noise Sequences (PN-Sequences). 992 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_364 reference/crypt/2011 db/reference/crypt/crypt2011.html#Helleseth11f
770 2017-07-12 reference/crypt/Landrock05a encyclopedia Peter Landrock Acquirer. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_5 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05a
771 2017-07-12 reference/crypt/X11bd encyclopedia CDH. 188 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1382 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bd
772 2017-07-12 reference/crypt/Schoenmakers11l encyclopedia Berry Schoenmakers Zero-Knowledge. 1401-1403 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_16 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schoenmakers11l conf/stoc/BlumFM88,journals/siamcomp/BlumSMP91,conf/stoc/CanettiGGM00,conf/eurocrypt/Damgard00,conf/stoc/DworkNS98,journals/siamcomp/GoldwasserMR89,journals/jacm/GoldreichMW91,books/cu/Goldreich2001
773 2017-07-12 reference/crypt/X11do encyclopedia Elliptic Curve Trace Computation. 408 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1051 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11do
774 2017-07-12 reference/crypt/Kaliski05 encyclopedia Burton S. Kaliski Jr. Asymmetric Cryptosystem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_12 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05
775 2017-07-12 reference/crypt/Bleumer05xb encyclopedia Gerrit Bleumer Sender Anonymity. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_384 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05xb
776 2017-07-12 reference/crypt/X11f encyclopedia Advanced Hash Competition. 24 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1185 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11f
777 2017-07-12 reference/crypt/Canniere05f encyclopedia Christophe De Cannière Kasumi/Misty1. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_215 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canniere05f
778 2017-07-12 reference/crypt/Handschuh05a encyclopedia Helena Handschuh RC6. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_346 reference/crypt/2005 db/reference/crypt/crypt2005.html#Handschuh05a
779 2017-07-12 reference/crypt/SamaratiL11 encyclopedia Pierangela Samarati,Giovanni Livraga Multilevel Database. 809-811 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_681 reference/crypt/2011 db/reference/crypt/crypt2011.html#SamaratiL11
780 2017-07-12 reference/crypt/Bleumer11u encyclopedia Gerrit Bleumer Overspending Prevention. 898 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_212 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11u
781 2017-07-12 reference/crypt/X11g encyclopedia Adware. 26 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1319 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11g
782 2017-07-12 reference/crypt/Provos05 encyclopedia Niels Provos Firewall. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_169 reference/crypt/2005 db/reference/crypt/crypt2005.html#Provos05
783 2017-07-12 reference/crypt/McFearin11 encyclopedia Lee D. McFearin Chroot Jail. 206-207 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_778 reference/crypt/2011 db/reference/crypt/crypt2011.html#McFearin11
784 2017-07-12 reference/crypt/X11dq encyclopedia Entity Resolution. 421 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1280 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dq
785 2017-07-12 reference/crypt/Canniere11d encyclopedia Christophe De Cannière GOST. 517-518 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_579 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canniere11d
786 2017-07-12 reference/crypt/X11aj encyclopedia Binding Pattern. 86 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1237 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11aj
787 2017-07-12 reference/crypt/Bleumer05c encyclopedia Gerrit Bleumer Chaffing and Winnowing. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_55 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05c
788 2017-07-12 reference/crypt/Desmedt11d encyclopedia Yvo Desmedt Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme. 457-458 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_319 reference/crypt/2011 db/reference/crypt/crypt2011.html#Desmedt11d
789 2017-07-12 reference/crypt/Kuhn11 encyclopedia Markus Kuhn Compromising Emanations. 232-235 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_188 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kuhn11
790 2017-07-12 reference/crypt/Canteaut11d encyclopedia Anne Canteaut Fast Correlation Attack. 450-452 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_348 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11d
791 2017-07-12 reference/crypt/Gordon11a encyclopedia Daniel M. Gordon Generic Attacks Against DLP. 510-512 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_452 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gordon11a
792 2017-07-12 reference/crypt/Kaliski11ai encyclopedia Burt Kaliski Subexponential Time. 1267 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_436 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11ai
793 2017-07-12 reference/crypt/Naccache11k encyclopedia David Naccache Reverse Public Key Encryption. 1044 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_895 reference/crypt/2011 db/reference/crypt/crypt2011.html#Naccache11k
794 2017-07-12 reference/crypt/Desmedt11j encyclopedia Yvo Desmedt Trojan Horses, Computer Viruses, and Worms. 1319-1320 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_331 reference/crypt/2011 db/reference/crypt/crypt2011.html#Desmedt11j
795 2017-07-12 reference/crypt/Fontaine05j encyclopedia Caroline Fontaine Synchronous Stream Cipher. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_423 reference/crypt/2005 db/reference/crypt/crypt2005.html#Fontaine05j
796 2017-07-12 reference/crypt/Sunar05c encyclopedia Berk Sunar Multiprecision Squaring. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_268 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sunar05c
797 2017-07-12 reference/crypt/X11jv encyclopedia Proof of Work. 984 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1060 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jv
798 2017-07-12 reference/crypt/Helleseth05b encyclopedia Tor Helleseth DeBruijn sequence. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_98 reference/crypt/2005 db/reference/crypt/crypt2005.html#Helleseth05b
799 2017-07-12 reference/crypt/Adams05v encyclopedia Carlisle Adams Trusted Third Party. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_441 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05v
800 2017-07-12 reference/crypt/X11fa encyclopedia Heredity. 556 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1262 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fa
801 2017-07-12 reference/crypt/Bleumer05f encyclopedia Gerrit Bleumer Copy Protection. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_78 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05f
802 2017-07-12 reference/crypt/Pointcheval11a encyclopedia David Pointcheval Rabin Cryptosystem. 1013-1014 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_151 reference/crypt/2011 db/reference/crypt/crypt2011.html#Pointcheval11a
803 2017-07-12 reference/crypt/Helleseth11c encyclopedia Tor Helleseth Gap. 508-509 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_350 reference/crypt/2011 db/reference/crypt/crypt2011.html#Helleseth11c
804 2017-07-12 reference/crypt/Cankaya11d encyclopedia Ebru Celikel Cankaya Chinese Wall Model. 203-205 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_777 reference/crypt/2011
805 2017-07-12 reference/crypt/Pedersen05 encyclopedia Torben P. Pedersen CPS, Certificate Practice Statement. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_83 reference/crypt/2005 db/reference/crypt/crypt2005.html#Pedersen05
806 2017-07-12 reference/crypt/Soete11p encyclopedia Marijke De Soete Two-Factor Authentication. 1341 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_310 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11p
807 2017-07-12 reference/crypt/Soete11a encyclopedia Marijke De Soete Attribute Certificate. 51-52 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_279 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11a
808 2017-07-12 reference/crypt/X11eq encyclopedia Gene. 509 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1260 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11eq
809 2017-07-12 reference/crypt/X11di encyclopedia Edwards Coordinates. 380 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1046 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11di
810 2017-07-12 reference/crypt/Adams05w encyclopedia Carlisle Adams User Authentication. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_450 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05w
811 2017-07-12 reference/crypt/X11at encyclopedia Biometric Testing. 130 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1253 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11at
812 2017-07-12 reference/crypt/Moller05 encyclopedia Bodo Möller Binary exponentiation. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_27 reference/crypt/2005 db/reference/crypt/crypt2005.html#Moller05
813 2017-07-12 reference/crypt/X11n encyclopedia Anthropometric Authentication. 42 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1304 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11n
814 2017-07-12 reference/crypt/Capkun11 encyclopedia Srdjan Capkun Jamming Resistance. 661-662 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_54 reference/crypt/2011 db/reference/crypt/crypt2011.html#Capkun11
815 2017-07-12 reference/crypt/Gu11a encyclopedia Qijun Gu Intrusion Detection in Ad Hoc Networks. 620-623 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_631 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gu11a
816 2017-07-12 reference/crypt/Just05a encyclopedia Mike Just Diffie-Hellman Key Agreement. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_111 reference/crypt/2005 db/reference/crypt/crypt2005.html#Just05a
817 2017-07-12 reference/crypt/X11b encyclopedia Access Lists. 14 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1298 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11b
818 2017-07-12 reference/crypt/HankersonM11h encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curves. 408-410 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_244 reference/crypt/2011 db/reference/crypt/crypt2011.html#HankersonM11h
819 2017-07-12 reference/crypt/Vimercati11c encyclopedia Sabrina De Capitani di Vimercati Discretionary Access Control Policies (DAC). 356-358 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_817 reference/crypt/2011 db/reference/crypt/crypt2011.html#Vimercati11c
820 2017-07-12 reference/crypt/Biryukov05r encyclopedia Alex Biryukov Miss-in-the-Middle Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_256 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05r
821 2017-07-12 reference/crypt/GoubinPY11 encyclopedia Louis Goubin,Jacques Patarin,Bo-Yin Yang Multivariate Cryptography. 824-828 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_421 reference/crypt/2011 db/reference/crypt/crypt2011.html#GoubinPY11
822 2017-07-12 reference/crypt/X11mm encyclopedia SSS. 1253 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1118 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mm
823 2017-07-12 reference/crypt/VimercatiS11c encyclopedia Sabrina De Capitani di Vimercati,Pierangela Samarati Polyinstantiation. 946-948 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_682 reference/crypt/2011 db/reference/crypt/crypt2011.html#VimercatiS11c
824 2017-07-12 reference/crypt/Moller05c encyclopedia Bodo Möller Simultaneous Exponentiation. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_400 reference/crypt/2005 db/reference/crypt/crypt2005.html#Moller05c
825 2017-07-12 reference/crypt/Landrock05f encyclopedia Peter Landrock Control Vectors. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_77 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05f
826 2017-07-12 reference/crypt/Contini11a encyclopedia Scott Contini Least Common Multiple. 715 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_458 reference/crypt/2011 db/reference/crypt/crypt2011.html#Contini11a
827 2017-07-12 reference/crypt/X11jg encyclopedia Phi Function. 927 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1128 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jg
828 2017-07-12 reference/crypt/Landrock05n encyclopedia Peter Landrock PKCS. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_301 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05n
829 2017-07-12 reference/crypt/Biryukov11f encyclopedia Alex Biryukov Chosen Plaintext Attack. 205-206 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_557 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11f
830 2017-07-12 reference/crypt/PapaC11 encyclopedia Stephen M. Papa,William D. Casper Levels of Trust. 716-720 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_907 reference/crypt/2011 db/reference/crypt/crypt2011.html#PapaC11
831 2017-07-12 reference/crypt/CampiP11 encyclopedia Alessandro Campi,Stefano Paraboschi Administrative Policies in SQL. 23 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_671 reference/crypt/2011 db/reference/crypt/crypt2011.html#CampiP11
832 2017-07-12 reference/crypt/X11mi encyclopedia Specific Emitter Identification (SEI). 1243 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1183 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mi
833 2017-07-12 reference/crypt/Bauer11l encyclopedia Friedrich L. Bauer Maxims. 766 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_171 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bauer11l
834 2017-07-12 reference/crypt/Helleseth11 encyclopedia Tor Helleseth Autocorrelation. 68 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_334 reference/crypt/2011 db/reference/crypt/crypt2011.html#Helleseth11
835 2017-07-12 reference/crypt/Sako05e encyclopedia Kazue Sako Public Key Cryptography. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_331 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sako05e
836 2017-07-12 reference/crypt/Adams05k encyclopedia Carlisle Adams Impersonation Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_196 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05k
837 2017-07-12 reference/crypt/HankersonM11k encyclopedia Darrel Hankerson,Alfred Menezes NSA Suite B. 857 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_648 reference/crypt/2011 db/reference/crypt/crypt2011.html#HankersonM11k
838 2017-07-12 reference/crypt/Pointcheval11 encyclopedia David Pointcheval OAEP: Optimal Asymmetric Encryption Padding. 882-884 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_150 reference/crypt/2011 db/reference/crypt/crypt2011.html#Pointcheval11
839 2017-07-12 reference/crypt/Keromytis11a encyclopedia Angelos D. Keromytis Network Bandwidth Denial of Service (DoS). 836-838 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_271 reference/crypt/2011 db/reference/crypt/crypt2011.html#Keromytis11a
840 2017-07-12 reference/crypt/VimercatiL11 encyclopedia Sabrina De Capitani di Vimercati,Giovanni Livraga Grant Option. 518 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_678 reference/crypt/2011 db/reference/crypt/crypt2011.html#VimercatiL11
841 2017-07-12 reference/crypt/RivestK05 encyclopedia Ronald L. Rivest,Burton S. Kaliski Jr. RSA Problem. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_363 reference/crypt/2005 db/reference/crypt/crypt2005.html#RivestK05
842 2017-07-12 reference/crypt/BiryukovC05a encyclopedia Alex Biryukov,Christophe De Cannière Linear Cryptanalysis for Block Ciphers. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_233 reference/crypt/2005 db/reference/crypt/crypt2005.html#BiryukovC05a
843 2017-07-12 reference/crypt/Carlet05 encyclopedia Claude Carlet Boolean Functions. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_40 reference/crypt/2005 db/reference/crypt/crypt2005.html#Carlet05
844 2017-07-12 reference/crypt/Heninger11 encyclopedia Nadia Heninger Cold-Boot Attacks. 216-217 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_124 reference/crypt/2011 db/reference/crypt/crypt2011.html#Heninger11
845 2017-07-12 reference/crypt/X11hy encyclopedia Monitoring. 799 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1007 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hy
846 2017-07-12 reference/crypt/Meadows11e encyclopedia Catherine A. Meadows Type Checking and Security. 1342-1343 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_867 reference/crypt/2011 db/reference/crypt/crypt2011.html#Meadows11e
847 2017-07-12 reference/crypt/X11ng encyclopedia Time-Based Access Control. 1297 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1349 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ng
848 2017-07-12 reference/crypt/Boneh05f encyclopedia Dan Boneh Rabin Digital Signature Scheme. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_340 reference/crypt/2005 db/reference/crypt/crypt2005.html#Boneh05f
849 2017-07-12 reference/crypt/Kaliski05c encyclopedia Burton S. Kaliski Jr. Blum Integer. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_36 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05c
850 2017-07-12 reference/crypt/Kaliski05xg encyclopedia Burton S. Kaliski Jr. RSA Digital Signature Scheme. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_361 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05xg
851 2017-07-12 reference/crypt/Dwork05 encyclopedia Cynthia Dwork Nonmalleability. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_276 reference/crypt/2005 db/reference/crypt/crypt2005.html#Dwork05
852 2017-07-12 reference/crypt/X11hd encyclopedia Machine Readable Travel Document Security. 748 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1018 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11hd
853 2017-07-12 reference/crypt/Fontaine05h encyclopedia Caroline Fontaine Shrinking Generator. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_393 reference/crypt/2005 db/reference/crypt/crypt2005.html#Fontaine05h
854 2017-07-12 reference/crypt/Helleseth05f encyclopedia Tor Helleseth Pseudo-Noise Sequence (PN-Sequence). 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_326 reference/crypt/2005 db/reference/crypt/crypt2005.html#Helleseth05f
855 2017-07-12 reference/crypt/X11ch encyclopedia CRT. 277 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1083 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ch
856 2017-07-12 reference/crypt/Tilborg05a encyclopedia Henk C. A. van Tilborg Shannon's Model. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_390 reference/crypt/2005 db/reference/crypt/crypt2005.html#Tilborg05a
857 2017-07-12 reference/crypt/X11in encyclopedia Nonrepudiable Agreement. 852 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1030 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11in
858 2017-07-12 reference/crypt/Dacosta11 encyclopedia Italo Dacosta HTTP Digest Authentication. 565-567 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_111 reference/crypt/2011 db/reference/crypt/crypt2011.html#Dacosta11
859 2017-07-12 reference/crypt/Liu11b encyclopedia Donggang Liu Probabilistic Key Sharing. 978-980 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_636 reference/crypt/2011 db/reference/crypt/crypt2011.html#Liu11b
860 2017-07-12 reference/crypt/X11gt encyclopedia Keyword-Based Retrieval over Encrypted Data. 695 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1245 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gt
861 2017-07-12 reference/crypt/X11d encyclopedia ACM. 20 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1299 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11d
862 2017-07-12 reference/crypt/X11ob encyclopedia VSSS. 1364 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1119 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ob
863 2017-07-12 reference/crypt/Micciancio11b encyclopedia Daniele Micciancio Shortest Vector Problem. 1196-1197 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_434 reference/crypt/2011 db/reference/crypt/crypt2011.html#Micciancio11b
864 2017-07-12 reference/crypt/ContiniKW11 encyclopedia Scott Contini,Çetin Kaya Koç,Colin D. Walter Modular Arithmetic. 795-798 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_49 reference/crypt/2011 db/reference/crypt/crypt2011.html#ContiniKW11
865 2017-07-12 reference/crypt/Stallings11 encyclopedia William Stallings Web-Based Security Protocols. 1383-1384 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_669 reference/crypt/2011 db/reference/crypt/crypt2011.html#Stallings11
866 2017-07-12 reference/crypt/Bleumer11ab encyclopedia Gerrit Bleumer Sender Anonymity. 1177-1178 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_226 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11ab
867 2017-07-12 reference/crypt/Dwork11a encyclopedia Cynthia Dwork Non-Malleability. 849-852 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_149 reference/crypt/2011 db/reference/crypt/crypt2011.html#Dwork11a
868 2017-07-12 reference/crypt/X11ht encyclopedia Microdata Statistical Disclosure Control. 784 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1289 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ht
869 2017-07-12 reference/crypt/Bleumer11a encyclopedia Gerrit Bleumer Blind Signature. 148-150 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_181 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11a
870 2017-07-12 reference/crypt/HankersonM05f encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curve Point Multiplication Using Halving. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_136 reference/crypt/2005 db/reference/crypt/crypt2005.html#HankersonM05f
871 2017-07-12 reference/crypt/Stiglic05g encyclopedia Anton Stiglic Safe Prime. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_367 reference/crypt/2005 db/reference/crypt/crypt2005.html#Stiglic05g
872 2017-07-12 reference/crypt/Leeuw11 encyclopedia Elisabeth de Leeuw Biometrics for Identity Management and Fields of Application. 134-139 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_732 reference/crypt/2011 db/reference/crypt/crypt2011.html#Leeuw11
873 2017-07-12 reference/crypt/X11dk encyclopedia Electro-Magnetic Fingerprinting. 385 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1178 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dk
874 2017-07-12 reference/crypt/X11ca encyclopedia Confirmer Signatures. 249 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1031 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ca
875 2017-07-12 reference/crypt/Millen11a encyclopedia Jonathan K. Millen Formal Methods for the Orange Book. 495-498 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_859 reference/crypt/2011 db/reference/crypt/crypt2011.html#Millen11a
876 2017-07-12 reference/crypt/X11kx encyclopedia Rule-Based Access Control. 1072 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1312 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kx
877 2017-07-12 reference/crypt/FiniaszS11 encyclopedia Matthieu Finiasz,Nicolas Sendrier Digital Signature Scheme Based on McEliece. 342-343 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_380 reference/crypt/2011 db/reference/crypt/crypt2011.html#FiniaszS11
878 2017-07-12 reference/crypt/Bernstein11 encyclopedia Daniel J. Bernstein Factorization Circuits. 444-445 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_447 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bernstein11
879 2017-07-12 reference/crypt/Caddy05b encyclopedia Tom Caddy FIPS 140-2. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_168 reference/crypt/2005 db/reference/crypt/crypt2005.html#Caddy05b
880 2017-07-12 reference/crypt/Preneel05o encyclopedia Bart Preneel Second preimage resistance. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_372 reference/crypt/2005 db/reference/crypt/crypt2005.html#Preneel05o
881 2017-07-12 reference/crypt/Adams11i encyclopedia Carlisle Adams Personal Identification Number (PIN). 927 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_91 reference/crypt/2011 db/reference/crypt/crypt2011.html#Adams11i
882 2017-07-12 reference/crypt/X11iv encyclopedia One-Way Chain. 887 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1308 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11iv
883 2017-07-12 reference/crypt/Biryukov05a encyclopedia Alex Biryukov Adaptive Chosen Plaintext and Chosen Ciphertext Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_7 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05a
884 2017-07-12 reference/crypt/BiryukovC11a encyclopedia Alex Biryukov,Christophe De Cannière Linear Cryptanalysis for Block Ciphers. 722-725 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_589 reference/crypt/2011 db/reference/crypt/crypt2011.html#BiryukovC11a
885 2017-07-12 reference/crypt/ParkB11 encyclopedia Jung-Min "Jerry" Park,Kaigui Bian Security of Cognitive Radios. 1157-1158 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_63 reference/crypt/2011 db/reference/crypt/crypt2011.html#ParkB11
886 2017-07-12 reference/crypt/X11ic encyclopedia Multicast Authentication. 808 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1215 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ic
887 2017-07-12 reference/crypt/Canniere05 encyclopedia Christophe De Cannière Blowfish. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_34 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canniere05
888 2017-07-12 reference/crypt/X11mg encyclopedia Speaker Biometrics. 1232 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1273 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mg
889 2017-07-12 reference/crypt/X11bz encyclopedia Confidentiality Model. 248 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1302 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bz
890 2017-07-12 reference/crypt/Just11d encyclopedia Mike Just Key Escrow. 681-682 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_84 reference/crypt/2011 db/reference/crypt/crypt2011.html#Just11d
891 2019-10-25 reference/crypt/Liskov05c encyclopedia Moses D. Liskov Miller-Rabin Probabilistic Primality Test. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_253 reference/crypt/2005 db/reference/crypt/crypt2005.html#Liskov05c
892 2017-07-12 reference/crypt/Boneh11 encyclopedia Dan Boneh Aggregate Signatures. 27 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_139 reference/crypt/2011 db/reference/crypt/crypt2011.html#Boneh11
893 2017-07-12 reference/crypt/ImaiY11 encyclopedia Hideki Imai,Atsuhiro Yamagishi CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project). 285-288 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_567 reference/crypt/2011 db/reference/crypt/crypt2011.html#ImaiY11
894 2017-07-12 reference/crypt/Pedersen11b encyclopedia Torben Pedersen Key Encryption Key. 679-681 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_291 reference/crypt/2011 db/reference/crypt/crypt2011.html#Pedersen11b
895 2017-07-12 reference/crypt/Adams05m encyclopedia Carlisle Adams Master Key. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_244 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05m
896 2017-07-12 reference/crypt/CuppensC11 encyclopedia Frédéric Cuppens,Nora Cuppens-Boulahia Cover Story. 264-265 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_674 reference/crypt/2011 db/reference/crypt/crypt2011.html#CuppensC11
897 2017-07-12 reference/crypt/X11fg encyclopedia HTTP Digest Access Authentication Scheme. 565 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1010 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fg
898 2017-07-12 reference/crypt/X11ab encyclopedia Barter. 71 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1034 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ab
899 2017-07-12 reference/crypt/X11nl encyclopedia Transport-Level Security. 1317 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1234 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nl
900 2017-07-12 reference/crypt/Carlet11b encyclopedia Claude Carlet Correlation Immune and Resilient Boolean Functions. 262-264 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_340 reference/crypt/2011 db/reference/crypt/crypt2011.html#Carlet11b
901 2017-07-12 reference/crypt/Boneh11h encyclopedia Dan Boneh Schnorr Digital Signature Scheme. 1082-1083 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_154 reference/crypt/2011 db/reference/crypt/crypt2011.html#Boneh11h
902 2017-07-12 reference/crypt/X11if encyclopedia Multifactor Authentication. 808 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1322 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11if
903 2017-07-12 reference/crypt/Kaliski05z encyclopedia Burton S. Kaliski Jr. Polynomial Time. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_307 reference/crypt/2005 db/reference/crypt/crypt2005.html#Kaliski05z
904 2017-07-12 reference/crypt/Biryukov05y encyclopedia Alex Biryukov Slide Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_402 reference/crypt/2005 db/reference/crypt/crypt2005.html#Biryukov05y
905 2017-07-12 reference/crypt/Schoenmakers11j encyclopedia Berry Schoenmakers Verifiable Secret Sharing. 1357-1358 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_14 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schoenmakers11j
906 2017-07-12 reference/crypt/X11k encyclopedia Anomalous Binary Curves. 37 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1374 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11k
907 2017-07-12 reference/crypt/X11fp encyclopedia Iceman Attack. 583 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1015 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fp
908 2017-07-12 reference/crypt/X11on encyclopedia Wireless Locational Privacy. 1391 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1192 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11on
909 2017-07-12 reference/crypt/X11gq encyclopedia Key Variation. 688 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1076 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11gq
910 2017-07-12 reference/crypt/Bleumer05u encyclopedia Gerrit Bleumer Overspending Prevention. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_292 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05u
911 2017-07-12 reference/crypt/Kaliski11ah encyclopedia Burt Kaliski Sieving. 1205 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_435 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11ah
912 2017-07-12 reference/crypt/Adams05s encyclopedia Carlisle Adams Response. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_354 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05s
913 2017-07-12 reference/crypt/X11nf encyclopedia Temporal Authorization Models. 1285 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1348 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nf
914 2017-07-12 reference/crypt/Koeune05 encyclopedia François Koeune Pseudo-random number generator. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_330 reference/crypt/2005 db/reference/crypt/crypt2005.html#Koeune05
915 2017-07-12 reference/crypt/Preneel11i encyclopedia Bart Preneel HMAC. 559-560 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_581 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11i
916 2017-07-12 reference/crypt/Helleseth11h encyclopedia Tor Helleseth Sequences. 1185-1188 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_372 reference/crypt/2011 db/reference/crypt/crypt2011.html#Helleseth11h
917 2017-07-12 reference/crypt/Bleumer05xf encyclopedia Gerrit Bleumer Untraceability. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_449 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05xf
918 2017-07-12 reference/crypt/Fontaine05d encyclopedia Caroline Fontaine RC4. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_344 reference/crypt/2005 db/reference/crypt/crypt2005.html#Fontaine05d
919 2017-07-12 reference/crypt/Bleumer05i encyclopedia Gerrit Bleumer Designated Confirmer Signature. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_104 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05i
920 2017-07-12 reference/crypt/Benoit05 encyclopedia Olivier Benoît Fault Attack. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_157 reference/crypt/2005 db/reference/crypt/crypt2005.html#Benoit05
921 2017-07-12 reference/crypt/LibertQ11 encyclopedia Benoît Libert,Jean-Jacques Quisquater Identity-Based Cryptosystems. 588-594 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_127 reference/crypt/2011 db/reference/crypt/crypt2011.html#LibertQ11
922 2017-07-12 reference/crypt/Naccache11m encyclopedia David Naccache Temperature Attack. 1283 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_519 reference/crypt/2011 db/reference/crypt/crypt2011.html#Naccache11m
923 2017-07-12 reference/crypt/Biryukov11i encyclopedia Alex Biryukov DES-X (or DESX). 331 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_570 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11i
924 2017-07-12 reference/crypt/X11nh encyclopedia TLS. 1305 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1043 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nh
925 2017-07-12 reference/crypt/Pointcheval05b encyclopedia David Pointcheval RSA Public-Key Encryption. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_364 reference/crypt/2005 db/reference/crypt/crypt2005.html#Pointcheval05b
926 2017-07-12 reference/crypt/X11aw encyclopedia BLP. 158 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1335 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11aw
927 2017-07-12 reference/crypt/Pedersen11 encyclopedia Torben Pedersen CPS, Certificate Practice Statement. 266-267 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_283 reference/crypt/2011 db/reference/crypt/crypt2011.html#Pedersen11
928 2017-07-12 reference/crypt/X11ma encyclopedia Single Euro Payments Area. 1220 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1085 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ma
929 2017-07-12 reference/crypt/Pedersen11d encyclopedia Torben Pedersen PKIX, Public Key Infrastructure (X.509). 939-940 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_299 reference/crypt/2011 db/reference/crypt/crypt2011.html#Pedersen11d
930 2017-07-12 reference/crypt/X11kc encyclopedia Public-Key Encryption. 1001 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1390 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11kc
931 2017-07-12 reference/crypt/X11mr encyclopedia Static Code Analysis. 1256 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1371 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mr
932 2017-07-12 reference/crypt/Biryukov11 encyclopedia Alex Biryukov Adaptive Chosen Ciphertext Attack. 21 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_543 reference/crypt/2011 db/reference/crypt/crypt2011.html#Biryukov11
933 2017-07-12 reference/crypt/Desmedt11h encyclopedia Yvo Desmedt Station-to-Station Protocol. 1256 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_328 reference/crypt/2011 db/reference/crypt/crypt2011.html#Desmedt11h
934 2017-07-12 reference/crypt/Knudsen11 encyclopedia Lars R. Knudsen Block Ciphers. 152-157 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_549 reference/crypt/2011 db/reference/crypt/crypt2011.html#Knudsen11
935 2017-09-25 reference/crypt/Lange11b encyclopedia Tanja Lange 0001 Pairing-Based Key Exchange. 903-904 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_325 reference/crypt/2011 db/reference/crypt/crypt2011.html#Lange11b
936 2017-07-12 reference/crypt/CaoZ11 encyclopedia Guohong Cao,Zhichao Zhu Worms in Cellular Networks. 1392-1393 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_50 reference/crypt/2011 db/reference/crypt/crypt2011.html#CaoZ11
937 2017-07-12 reference/crypt/HankersonM11a encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curve Cryptography. 397 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_245 reference/crypt/2011 db/reference/crypt/crypt2011.html#HankersonM11a
938 2017-07-12 reference/crypt/X11cx encyclopedia Digest Authentication. 342 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1009 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11cx
939 2017-07-12 reference/crypt/Bauer05p encyclopedia Friedrich L. Bauer Security. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_376 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05p
940 2017-07-12 reference/crypt/Caddy11a encyclopedia Tom Caddy Differential Power Analysis. 336-338 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_196 reference/crypt/2011 db/reference/crypt/crypt2011.html#Caddy11a
941 2017-07-12 reference/crypt/Kaliski11ab encyclopedia Burt Kaliski Quadratic Residue. 1003 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_428 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11ab
942 2017-07-12 reference/crypt/Schoenmakers11k encyclopedia Berry Schoenmakers Witness Hiding. 1391-1392 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_15 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schoenmakers11k
943 2017-07-12 reference/crypt/Caddy05f encyclopedia Tom Caddy Tamper Resistance. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_425 reference/crypt/2005 db/reference/crypt/crypt2005.html#Caddy05f
944 2017-07-12 reference/crypt/X11jn encyclopedia Privacy-Aware Database. 970 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1240 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jn
945 2017-07-12 reference/crypt/WhyteH11 encyclopedia William Whyte,Jeffrey Hoffstein NTRU. 858-861 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_464 reference/crypt/2011 db/reference/crypt/crypt2011.html#WhyteH11
946 2017-07-12 reference/crypt/Soete11b encyclopedia Marijke De Soete Control Vector. 254 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_282 reference/crypt/2011 db/reference/crypt/crypt2011.html#Soete11b
947 2017-07-12 reference/crypt/X11ly encyclopedia Signed Window Exponentiation. 1217 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1147 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ly
948 2017-07-12 reference/crypt/Bauer05m encyclopedia Friedrich L. Bauer Playfair Cipher. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_303 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bauer05m
949 2017-07-12 reference/crypt/X11mj encyclopedia Specific Emitter Verification (SEV). 1243 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1184 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11mj
950 2017-07-12 reference/crypt/X11dn encyclopedia ElGamal Encryption. 396 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1091 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dn
951 2017-07-12 reference/crypt/Stiglic11d encyclopedia Anton Stiglic Prime Number. 959-964 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_471 reference/crypt/2011 db/reference/crypt/crypt2011.html#Stiglic11d
952 2017-07-12 reference/crypt/Boneh11g encyclopedia Dan Boneh Rabin Digital Signature Scheme. 1014-1015 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_152 reference/crypt/2011 db/reference/crypt/crypt2011.html#Boneh11g
953 2017-07-12 reference/crypt/Canteaut11h encyclopedia Anne Canteaut Linear Consistency Attack. 721-722 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_355 reference/crypt/2011 db/reference/crypt/crypt2011.html#Canteaut11h
954 2017-07-12 reference/crypt/Sunar05b encyclopedia Berk Sunar Multiprecision Multiplication. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_267 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sunar05b
955 2017-07-12 reference/crypt/Kaliski11w encyclopedia Burt Kaliski 881-882 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_423 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11w
956 2017-07-12 reference/crypt/Landrock05i encyclopedia Peter Landrock Electronic Negotiable Instruments. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_123 reference/crypt/2005 db/reference/crypt/crypt2005.html#Landrock05i
957 2017-07-12 reference/crypt/Canniere11a encyclopedia Christophe De Cannière Camellia. 180-182 2011 Encyclopedia of Cryptography and Security (2nd Ed.) reference/crypt/2011 db/reference/crypt/crypt2011.html#Canniere11a
958 2017-07-12 reference/crypt/X11jf encyclopedia PGP. 927 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1040 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jf
959 2017-07-12 reference/crypt/Adams05d encyclopedia Carlisle Adams Certificate. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_49 reference/crypt/2005 db/reference/crypt/crypt2005.html#Adams05d
960 2017-07-12 reference/crypt/X11bg encyclopedia Challenge-Response Authentication. 198 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1268 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bg
961 2017-07-12 reference/crypt/Bleumer05xd encyclopedia Gerrit Bleumer Undeniable Signatures. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_446 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05xd
962 2017-07-12 reference/crypt/HaberM05 encyclopedia Stuart Haber,Henri Massias Time-stamping. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_431 reference/crypt/2005 db/reference/crypt/crypt2005.html#HaberM05
963 2017-07-12 reference/crypt/Paillier05 encyclopedia Pascal Paillier Paillier Encryption and Signature Schemes. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_293 reference/crypt/2005 db/reference/crypt/crypt2005.html#Paillier05
964 2017-07-12 reference/crypt/Gordon11 encyclopedia Daniel M. Gordon Discrete Logarithm Problem. 352-353 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_445 reference/crypt/2011 db/reference/crypt/crypt2011.html#Gordon11
965 2017-07-12 reference/crypt/Challener11a encyclopedia David Challener TPM. 1308-1310 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_718 reference/crypt/2011 db/reference/crypt/crypt2011.html#Challener11a
966 2017-07-12 reference/crypt/Preneel11h encyclopedia Bart Preneel Hash Functions. 543-553 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_580 reference/crypt/2011 db/reference/crypt/crypt2011.html#Preneel11h
967 2017-07-12 reference/crypt/X11ai encyclopedia Binary GCD Algorithm. 86 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1054 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ai
968 2017-07-12 reference/crypt/Sako11c encyclopedia Kazue Sako Nyberg-Rueppel Signature Scheme. 879 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_20 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sako11c
969 2017-07-12 reference/crypt/Sako05b encyclopedia Kazue Sako Goldwasser-Micali Encryption Scheme. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_177 reference/crypt/2005 db/reference/crypt/crypt2005.html#Sako05b
970 2017-07-12 reference/crypt/X11a encyclopedia Access Limitation. 14 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1236 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11a
971 2017-07-12 reference/crypt/Bleumer11ac encyclopedia Gerrit Bleumer Threshold Signature. 1294-1296 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_233 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11ac
972 2017-07-12 reference/crypt/X11es encyclopedia Geometry of Numbers. 513 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1153 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11es
973 2017-07-12 reference/crypt/X11ga encyclopedia Integrated Circuit. 618 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1396 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11ga
974 2017-07-12 reference/crypt/Bleumer11e encyclopedia Gerrit Bleumer Communication Channel Anonymity. 232 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_187 reference/crypt/2011 db/reference/crypt/crypt2011.html#Bleumer11e
975 2017-07-12 reference/crypt/X11x encyclopedia Asynchronous Stream Cipher. 50 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1112 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11x
976 2017-07-12 reference/crypt/Desmedt11g encyclopedia Yvo Desmedt Relay Attack. 1042 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_327 reference/crypt/2011 db/reference/crypt/crypt2011.html#Desmedt11g
977 2017-07-12 reference/crypt/HankersonM11e encyclopedia Darrel Hankerson,Alfred Menezes Elliptic Curve Point Multiplication Using Halving. 403-406 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_249 reference/crypt/2011 db/reference/crypt/crypt2011.html#HankersonM11e
978 2017-07-12 reference/crypt/Sako11g encyclopedia Kazue Sako Verifiable Encryption. 1356-1357 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_24 reference/crypt/2011 db/reference/crypt/crypt2011.html#Sako11g
979 2017-07-12 reference/crypt/X11eh encyclopedia Fixed Window Exponentiation. 482 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1168 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11eh
980 2017-07-12 reference/crypt/X11fv encyclopedia Information Assurance. 605 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1395 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11fv
981 2017-07-12 reference/crypt/Just05 encyclopedia Mike Just Challenge-Response Identification. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_56 reference/crypt/2005 db/reference/crypt/crypt2005.html#Just05
982 2017-07-12 reference/crypt/X11bi encyclopedia Chip Card. 205 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1074 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bi
983 2017-07-12 reference/crypt/X11nx encyclopedia VM Protection. 1364 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1361 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11nx
984 2017-07-12 reference/crypt/LemkeP05 encyclopedia Kerstin Lemke,Christof Paar Physical Attacks. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_300 reference/crypt/2005 db/reference/crypt/crypt2005.html#LemkeP05
985 2017-07-12 reference/crypt/X11dh encyclopedia ECRYPT Stream Cipher Project. 380 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1106 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11dh
986 2017-07-12 reference/crypt/Canniere05d encyclopedia Christophe De Cannière GOST. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_179 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canniere05d
987 2017-07-12 reference/crypt/Schunter11 encyclopedia Matthias Schunter Certified Mail. 195-196 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_183 reference/crypt/2011 db/reference/crypt/crypt2011.html#Schunter11
988 2017-07-12 reference/crypt/CasperP11a encyclopedia William D. Casper,Stephen M. Papa Trusted Boot. 1327-1328 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_794 reference/crypt/2011 db/reference/crypt/crypt2011.html#CasperP11a
989 2017-07-12 reference/crypt/X11jz encyclopedia Public Key Infrastructure. 997 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1084 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11jz
990 2017-07-12 reference/crypt/Zuccherato05c encyclopedia Robert J. Zuccherato Key Authentication. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_219 reference/crypt/2005 db/reference/crypt/crypt2005.html#Zuccherato05c
991 2017-07-12 reference/crypt/Helleseth11d encyclopedia Tor Helleseth Golomb's Randomness Postulates. 516-517 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_351 reference/crypt/2011 db/reference/crypt/crypt2011.html#Helleseth11d
992 2017-07-12 reference/crypt/Canteaut05n encyclopedia Anne Canteaut Stream Cipher. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_412 reference/crypt/2005 db/reference/crypt/crypt2005.html#Canteaut05n
993 2017-07-12 reference/crypt/Vauclair11b encyclopedia Marc Vauclair Proximity Card. 991 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_909 reference/crypt/2011 db/reference/crypt/crypt2011.html#Vauclair11b
994 2017-07-12 reference/crypt/Pedersen05b encyclopedia Torben P. Pedersen PEM, Privacy Enhanced Mail. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_296 reference/crypt/2005 db/reference/crypt/crypt2005.html#Pedersen05b
995 2017-07-12 reference/crypt/Kaliski11i encyclopedia Burt Kaliski Extension Field. 436 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_405 reference/crypt/2011 db/reference/crypt/crypt2011.html#Kaliski11i
996 2017-07-12 reference/crypt/Charpin11a encyclopedia Pascale Charpin Reed-Muller Codes. 1037-1038 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_366 reference/crypt/2011 db/reference/crypt/crypt2011.html#Charpin11a
997 2017-11-23 reference/crypt/LiLR11 encyclopedia Ming Li 0003,Wenjing Lou,Kui Ren 0001 Secure Device Pairing. 1111-1115 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_53 reference/crypt/2011 db/reference/crypt/crypt2011.html#LiLR11
998 2017-07-12 reference/crypt/Bleumer05a encyclopedia Gerrit Bleumer Blind Signature. 2005 Encyclopedia of Cryptography and Security https://doi.org/10.1007/0-387-23483-7_31 reference/crypt/2005 db/reference/crypt/crypt2005.html#Bleumer05a
999 2017-07-12 reference/crypt/Micheli-TzanakouP11 encyclopedia Evangelia Micheli-Tzanakou,Konstantinos N. Plataniotis Biometrics: Terms and Definitions. 142-147 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_730 reference/crypt/2011 db/reference/crypt/crypt2011.html#Micheli-TzanakouP11
1000 2017-07-12 reference/crypt/X11bt encyclopedia Complexity Theory. 232 2011 Encyclopedia of Cryptography and Security (2nd Ed.) https://doi.org/10.1007/978-1-4419-5906-5_1142 reference/crypt/2011 db/reference/crypt/crypt2011.html#X11bt