default search action
Encyclopedia of Cryptography and Security 2005
- Henk C. A. van Tilborg:
Encyclopedia of Cryptography and Security. Springer 2005, ISBN 978-0-387-23473-1
A
- Anne Canteaut:
A5/1. - Peter Landrock:
ABA digital signature guidelines. - Gerald Brose:
Access Control. - Yvo Desmedt:
Access structure. - Peter Landrock:
Acquirer. - Alex Biryukov:
Adaptive Chosen Ciphertext Attack. - Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack. - Alex Biryukov:
Adaptive Chosen Plaintext Attack. - Friedrich L. Bauer:
Alberti encryption. - Friedrich L. Bauer:
Alphabet. - Gerrit Bleumer:
Anonymity. - Burton S. Kaliski Jr.:
Asymmetric Cryptosystem. - Peter Landrock:
Attribute certificate. - Carlisle Adams:
Attributes management. - John Black:
Authenticated encryption. - Gregory A. Kabatiansky, Ben J. M. Smeets:
Authentication. - Robert J. Zuccherato:
Authentication token. - Carlisle Adams:
Authorization architecture. - Carlisle Adams:
Authorization Policy. - Carlisle Adams:
Authorizations management. - Tor Helleseth:
Autocorrelation. - Eric Cronin:
Availability.
B
- Friedrich L. Bauer:
Beaufort Encryption. - Burton S. Kaliski Jr.:
Berlekamp Q-matrix. - Anne Canteaut:
Berlekamp-Massey algorithm. - Berk Sunar:
Binary Euclidean Algorithm. - Bodo Möller:
Binary exponentiation. - Burton S. Kaliski Jr.:
Binomial Distribution. - Arun Ross, Anil K. Jain:
Biometrics. - Arjen K. Lenstra:
Birthday Paradox. - Gerrit Bleumer:
Blind Signature. - Gerrit Bleumer:
Blinding Techniques. - Lars R. Knudsen:
Block ciphers. - Christophe De Cannière:
Blowfish. - Dan Boneh:
BLS Short Digital Signatures. - Burton S. Kaliski Jr.:
Blum Integer. - Dan Boneh:
Blum-Blum-Shub Pseudorandom Bit Generator. - Dan Boneh:
Blum-Goldwasser Public Key Encryption System. - Peter Landrock:
Bolero.net. - Claude Carlet:
Boolean Functions. - Alex Biryukov:
Boomerang Attack. - Dalit Naor:
Broadcast Encryption.
C
- Christophe De Cannière:
Camellia. - Christophe De Cannière:
CAST. - Bart Preneel:
CBC-MAC and Variants. - Friedrich L. Bauer:
CCIT2-code. - Peter Landrock:
CEPS Standard. - Carlisle Adams:
Certificate. - Carlisle Adams:
Certificate Management. - Anton Stiglic:
Certificate of Primality. - Carlisle Adams:
Certificate Revocation. - Carlisle Adams:
Certification Authority. - Matthias Schunter:
Certified Mail. - Gerrit Bleumer:
Chaffing and Winnowing. - Mike Just:
Challenge-Response Identification. - Gerrit Bleumer:
Chaum Blind Signature Scheme. - Henk C. A. van Tilborg:
Chinese Remainder Theorem. - Alex Biryukov:
Chosen Ciphertext Attack. - Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack. - Alex Biryukov:
Chosen Plaintext Attack. - Alex Biryukov:
Ciphertext-Only Attack. - Burton S. Kaliski Jr.:
Claw-Free. - Peter Landrock:
Clip Scheme. - Caroline Fontaine:
Clock-Controlled Generator. - Daniele Micciancio:
Closest Vector Problem. - Alex Biryukov:
Codebook Attack. - Bart Preneel:
Collision Attack. - Bart Preneel:
Collision resistance. - Anne Canteaut:
Combination generator. - Claude Crépeau:
Commitment. - Tom Caddy:
Common Criteria. - Gerrit Bleumer:
Communication Channel Anonymity. - Markus Kuhn:
compromising emanations. - Salil P. Vadhan:
Computational Complexity. - Matthias Schunter:
Contract Signing. - Peter Landrock:
Control Vectors. - Gerrit Bleumer:
Copy Protection. - Bart Preneel:
Correcting-block attack. - Anne Canteaut:
Correlation Attack for Stream Ciphers. - Claude Carlet:
Correlation Immune and Resilient Boolean Functions. - Yvo Desmedt:
Covert Channels. - Torben P. Pedersen:
CPS, Certificate Practice Statement. - Dan Boneh:
Cramer-Shoup Public Key System. - Gerrit Bleumer:
Credentials. - Tor Helleseth:
Cross-Correlation. - Friedrich L. Bauer:
Cryptanalysis. - Friedrich L. Bauer:
Crypto Machines. - Friedrich L. Bauer:
Cryptology. - Friedrich L. Bauer:
Cryptosystem. - Hideki Imai, Atsuhiro Yamagishi:
Cryptrec. - Claude Crépeau:
Cut-and-choose protocol. - Pascale Charpin:
Cyclic Codes. - Friedrich L. Bauer:
Cæsar cipher.
D
- Alex Biryukov, Christophe De Cannière:
Data encryption standard (DES). - Markus Kuhn:
Data Remanence. - Bart Preneel:
Davies-Meyer Hash Function. - Gerrit Bleumer:
DC Network. - Tor Helleseth:
DeBruijn sequence. - Ran Canetti:
Decisional Diffie-Hellman Assumption. - Burton S. Kaliski Jr.:
Decryption Exponent. - Yvo Desmedt:
Deniable encryption. - Eric Cronin:
Denial of Service. - Peter Landrock:
Derived key. - Alex Biryukov:
DES-X (or DESX). - Gerrit Bleumer:
Designated Confirmer Signature. - Alex Biryukov:
Dictionary Attack (I). - Carlisle Adams:
Dictionary Attack (II). - Eli Biham:
Differential Cryptanalysis. - Tom Caddy:
Differential Power Analysis. - Alex Biryukov:
Differential-Linear Attack. - Mike Just:
Diffie-Hellman Key Agreement. - Igor E. Shparlinski:
Diffie-Hellman Problem. - Kazue Sako:
digital signature schemes. - Dan Boneh:
Digital Signature Standard. - Christian Cachin:
Digital Steganography. - Daniel Gordon:
Discrete Logarithm Problem.
E
- Caroline Fontaine:
E0 (Bluetooth). - Jean-Jacques Quisquater:
Eavesdropper. - Darrel Hankerson, Alfred Menezes:
ECC Challenges. - Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack. - Gerrit Bleumer:
Electronic Cash. - Peter Landrock:
Electronic Cheque. - Peter Landrock:
Electronic Negotiable Instruments. - Gerrit Bleumer:
Electronic payment. - Gerrit Bleumer:
Electronic Postage. - Kazue Sako:
Electronic Voting Schemes. - Gerrit Bleumer:
Electronic Wallet. - Dan Boneh:
Elgamal Digital Signature Scheme. - Yvo Desmedt:
ElGamal Public Key Encryption. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Cryptography. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Discrete Logarithm Problem. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Key Agreement Schemes. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Keys. - Paul Zimmermann:
Elliptic Curve Method. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Point Multiplication Using Halving. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Public-Key Encryption Schemes. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Signature Schemes. - François Morain:
Elliptic Curves for Primality Proving. - Marijke De Soete, Michael Ward:
EMV. - Friedrich L. Bauer:
Encryption. - Burton S. Kaliski Jr.:
Encryption Exponent. - Carlisle Adams:
Entitlements Management. - Robert J. Zuccherato:
Entity Authentication. - Berk Sunar:
Euclidean Algorithm. - Burton S. Kaliski Jr.:
Euler's Totient Function. - Michael J. Wiener:
Exhaustive Key Search. - Gerrit Bleumer:
Existential Forgery. - Burton S. Kaliski Jr.:
Exponential Time. - Christof Paar:
Exponentiation Algorithms. - Burton S. Kaliski Jr.:
Extension Field.
F
- Burton S. Kaliski Jr.:
Factor Base. - Arjen K. Lenstra:
Factoring Circuits. - Gerrit Bleumer:
Fail-Stop Signature. - Matthias Schunter:
Fair Exchange. - Anne Canteaut:
Fast Correlation Attack. - Olivier Benoît:
Fault Attack. - Christophe De Cannière:
FEAL. - Alex Biryukov:
Feistel Cipher. - Moses D. Liskov:
Fermat Primality Test. - Moses D. Liskov:
Fermat's Little Theorem. - Yvo Desmedt:
Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme. - Burton S. Kaliski Jr.:
Field. - Burton S. Kaliski Jr.:
Field Polynomial. - Anne Canteaut:
Filter Generator. - Alexander Barg, Gregory A. Kabatiansky:
Fingerprinting. - Burton S. Kaliski Jr.:
Finite Field. - Tom Caddy:
FIPS 140-2. - Niels Provos:
Firewall. - André Weimerskirch:
Fixed-Base Exponentiation. - André Weimerskirch:
Fixed-Exponent Exponentiation. - Gerrit Bleumer:
Forgery.
G
- Tor Helleseth:
Gap. - Jerome A. Solinas:
Generalized Mersenne Prime. - Burton S. Kaliski Jr.:
Generator. - Gerrit Bleumer:
GMR Signature. - Kazue Sako:
Goldwasser-Micali Encryption Scheme. - Tor Helleseth:
Golomb'S Randomness Postulates. - Christophe De Cannière:
GOST. - Scott Contini:
Greatest Common Divisor. - Burton S. Kaliski Jr.:
Group. - Mike Burmester:
Group Key Agreement. - Gerrit Bleumer:
Group Signatures.
H
- Burton S. Kaliski Jr.:
Hard-Core Bit. - Laurent Sustek:
Hardware Security Module. - Bart Preneel:
Hash functions. - Bart Preneel:
HMAC. - Burton S. Kaliski Jr.:
Homomorphism. - Torben P. Pedersen:
HTTPS, Secure HTTPS.
I
- Alex Biryukov:
IDEA. - Carlisle Adams:
Identification. - Joe Pato:
Identity Management. - Robert J. Zuccherato:
Identity Verification Protocol. - Benoît Libert, Jean-Jacques Quisquater:
Identity-Based Cryptosystems. - Martin Gagné:
Identity-Based Encryption. - Carlisle Adams:
Impersonation Attack. - Alex Biryukov:
Impossible Differential Attack. - Kim Nguyen:
Index Calculus. - Friedrich L. Bauer:
Information Theory. - Arjen K. Lenstra:
Integer Factoring. - Berry Schoenmakers:
Interactive Argument. - Berry Schoenmakers:
Interactive Proof. - Christophe De Cannière:
Interpolation Attack. - Toni Farley, Jill Joseph:
Intrusion Detection. - Assia Tria, Hamid Choukri:
Invasive Attacks. - Anne Canteaut:
Inversion attack. - Christof Paar:
Inversion in Finite Fields and Rings. - Alex Biryukov:
IPES. - Patrick D. McDaniel:
IPsec. - Burton S. Kaliski Jr.:
Irreducible Polynomial. - Peter Landrock:
Issuer. - Jorge Guajardo:
Itoh-Tsujii Inversion Algorithm.
J
- Burton S. Kaliski Jr.:
Jacobi Symbol.
K
- André Weimerskirch:
Karatsuba algorithm. - Christophe De Cannière:
Kasumi/Misty1. - Carlisle Adams:
Kerberos Authentication Protocol. - Friedrich L. Bauer:
Key. - Mike Just:
Key agreement. - Robert J. Zuccherato:
Key Authentication. - Peter Landrock:
Key Encryption Key. - Miles E. Smid:
Key escrow. - Steve Lloyd:
Key management. - Yvo Desmedt:
Knapsack cryptographic schemes. - Alex Biryukov:
Known plaintext attack.
L
- Arjen K. Lenstra:
L-Notation. - Phong Q. Nguyen:
Lattice. - Daniele Micciancio:
Lattice Based Cryptography. - Phong Q. Nguyen:
Lattice Reduction. - Scott Contini:
Least Common Multiple. - Burton S. Kaliski Jr.:
Legendre Symbol. - Anne Canteaut:
Linear Complexity. - Caroline Fontaine:
Linear Congruential Generator. - Anne Canteaut:
Linear Consistency Attack. - Alex Biryukov, Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers. - Anne Canteaut:
Linear Cryptanalysis for Stream Ciphers. - Anne Canteaut:
Linear Feedback Shift Register. - Anne Canteaut:
Linear Syndrome Attack. - Lars R. Knudsen:
Luby-Rackoff Ciphers.
M
- Bart Preneel:
Maa. - Bart Preneel:
MAC Algorithms. - Yvo Desmedt:
Man-in-the-Middle Attack. - Christophe De Cannière:
Mars. - Bart Preneel:
Mash Hash Functions (Modular Arithmetic Secure Hash). - Carlisle Adams:
Master Key. - Moses D. Liskov:
Maurer's Method. - Tor Helleseth:
Maximal-Length Linear Sequence. - Friedrich L. Bauer:
Maxims. - Nicolas Sendrier:
McEliece Public Key Cryptosystem. - Antoon Bosselaers:
Md4-Md5. - Bart Preneel:
MDC-2 and MDC-4. - Alex Biryukov:
Meet-in-the-Middle Attack. - Jerome A. Solinas:
Mersenne Prime. - Moses D. Liskov:
Miller-Rabin Probabilistic Primality Test. - Anne Canteaut:
Minimal Polynomial. - Burton S. Kaliski Jr.:
MIPS-Year. - Alex Biryukov:
Miss-in-the-Middle Attack. - Matthew K. Franklin:
Mix Networks. - Bart Preneel:
Modes of Operation of a Block Cipher. - Scott Contini, Çetin Kaya Koç, Colin D. Walter:
Modular Arithmetic. - Scott Contini:
Modular Root. - Scott Contini:
Modulus. - Peter Landrock:
Mondex. - Çetin Kaya Koç, Colin D. Walter:
Montgomery Arithmetic. - Burton S. Kaliski Jr.:
Moore's Law. - Berry Schoenmakers:
Multiparty Computation. - Alex Biryukov:
Multiple Encryption. - Berk Sunar:
Multiprecision Multiplication. - Berk Sunar:
Multiprecision Squaring. - Alex Biryukov:
Multiset Attack.
N
- Mike Just:
Needham-Schroeder Protocols. - Bart Preneel:
NESSIE Project. - Nicolas Sendrier:
Niederreiter Encryption Scheme. - Berry Schoenmakers:
Noninteractive Proof. - Caroline Fontaine:
Nonlinear Feedback Shift Register. - Claude Carlet:
Nonlinearity of Boolean Functions. - Cynthia Dwork:
Nonmalleability. - Randy Sabett:
Nonrepudiation. - Gerrit Bleumer:
Nonsecret Encryption. - William Whyte:
Ntru. - Burton S. Kaliski Jr.:
Number Field. - Paul C. Leyland:
Number Field Sieve. - Scott Contini:
Number Theory. - Kazue Sako:
Nyberg-Rueppel Signature Scheme.
O
- Burton S. Kaliski Jr.:
O-Notation. - David Pointcheval:
OAEP: Optimal Asymmetric Encryption Padding. - Berry Schoenmakers:
Oblivious Transfer. - Carlisle Adams:
One-Time Password. - Matthew J. B. Robshaw:
One-Way Function. - Christof Paar:
Optimal Extension Fields (OEFs). - Burton S. Kaliski Jr.:
Order. - Gerrit Bleumer:
Overspender Detection. - Gerrit Bleumer:
Overspending Prevention.
P
- Pascal Paillier:
Paillier Encryption and Signature Schemes. - Gerald Brose:
Password. - Peter Landrock:
Payment card. - Torben P. Pedersen:
PEM, Privacy Enhanced Mail. - Tom Caddy:
Penetration Testing. - Hugo Krawczyk:
Perfect Forward Secrecy. - Carlisle Adams:
Personal Identification Number (PIN). - Kerstin Lemke, Christof Paar:
Physical Attacks. - Peter Landrock:
PKCS. - Torben P. Pedersen:
PKIX - Public Key Infrastructure (X.509). - Friedrich L. Bauer:
Playfair Cipher. - Bart Preneel:
PMAC. - Patrick D. McDaniel:
Policy. - Friedrich L. Bauer:
Polybios Square Encryption. - Burton S. Kaliski Jr.:
Polynomial Time. - Friedrich L. Bauer:
Porta Encryption. - Bart Preneel:
Preimage Resistance. - Clemens Heinrich:
Pretty Good Privacy (PGP). - Anton Stiglic:
Primality Proving Algorithm. - Anton Stiglic:
Primality Test. - Anton Stiglic:
Prime Generation. - Anton Stiglic:
Prime number. - Burton S. Kaliski Jr.:
Primitive Element. - Carlisle Adams:
Privacy. - Carlisle Adams:
Privilege Management. - Anton Stiglic:
Probabilistic Primality Test. - Kazue Sako:
Probabilistic Public-Key Encryption. - Alex Biryukov:
Product Cipher, Superencryption. - Berry Schoenmakers:
Proof of Knowledge vs. Proof of Membership. - Claude Carlet:
Propagation Characteristics of Boolean Functions. - Berry Schoenmakers:
Protocol. - Peter Landrock:
Proton. - Jerome A. Solinas:
Pseudo-Mersenne Prime. - Tor Helleseth:
Pseudo-Noise Sequence (PN-Sequence). - François Koeune:
Pseudo-random number generator. - Gerrit Bleumer:
Pseudonyms. - Anton Stiglic:
Pseudoprime. - Burton S. Kaliski Jr.:
Pseudorandom Function. - Kazue Sako:
Public Key Cryptography. - Peter Landrock:
Public Key Infrastructure. - Gerrit Bleumer:
Public Key Proxy Encryption. - Gerrit Bleumer:
Public Key Proxy Signatures.
Q
- Burton S. Kaliski Jr.:
Quadratic Residue. - Burton S. Kaliski Jr.:
Quadratic Residuosity Problem. - Robert Silverman:
Quadratic Sieve. - Gilles Brassard, Claude Crépeau:
Quantum Cryptography.
R
- David Pointcheval:
Rabin Cryptosystem. - Dan Boneh:
Rabin Digital Signature Scheme. - Jean-Jacques Quisquater, David Samyde:
Radio Frequency Attacks. - Marco Bucci:
Random Bit Generator. - Gerrit Bleumer:
Random Oracle Model. - Caroline Fontaine:
RC4. - Helena Handschuh:
RC5. - Helena Handschuh:
RC6. - Gerrit Bleumer:
Recipient Anonymity. - Pascale Charpin:
Reed-Muller Codes. - Peter Landrock:
Registration Authority. - Alex Biryukov:
Related Key Attack. - Burton S. Kaliski Jr.:
Relatively Prime. - Yvo Desmedt:
Relay Attack. - Carlisle Adams:
Replay Attack. - Carlisle Adams:
Response. - Alex Biryukov:
Resynchronization Attack. - Bodo Möller:
Right-to-Left Exponentiation. - Carlisle Adams:
Rights Management. - Joan Daemen, Vincent Rijmen:
Rijndael/AES. - Burton S. Kaliski Jr.:
Ring. - Antoon Bosselaers:
RIPEMD Family. - Burton S. Kaliski Jr.:
RSA Digital Signature Scheme. - Burton S. Kaliski Jr.:
RSA factoring challenge. - Ronald L. Rivest, Burton S. Kaliski Jr.:
RSA Problem. - David Pointcheval:
RSA Public-Key Encryption. - Tor Helleseth:
Run. - Anne Canteaut:
Running-key.
S
- Peter Landrock:
S/MIME. - Anton Stiglic:
Safe Prime. - Carlisle Adams:
Salt. - Dan Boneh:
Schnorr Digital Signature Scheme. - Mike Just:
Schnorr Indentification Scheme. - Caroline Fontaine:
SEAL. - Bart Preneel:
Second preimage resistance. - Robert Blakley, Gregory A. Kabatiansky:
Secret Sharing Schemes. - Dan Boneh:
Secure signatures from the "strong RSA" assumption. - Clemens Heinrich:
Secure Socket Layer (SSL). - Friedrich L. Bauer:
Security. - Peter Landrock:
Security Architecture. - Tom Caddy, Gerrit Bleumer:
Security Evaluation Criteria. - Russell Housley:
Security Standards Activities. - Gerrit Bleumer:
Selective Forgery. - Caroline Fontaine:
Self-Shrinking Generator. - Caroline Fontaine:
Self-Synchronizing Stream Cipher. - Kazue Sako:
Semantic Security. - Gerrit Bleumer:
Sender Anonymity. - Tor Helleseth:
Sequences. - Christophe De Cannière:
Serpent. - Peter Landrock:
SET. - Helena Handschuh:
SHA Family (Secure Hash Algorithm). - Robert Blakley, Gregory A. Kabatiansky:
Shamir's Threshold Scheme. - Henk C. A. van Tilborg:
Shannon's Model. - Robert Blakley, Gregory A. Kabatiansky:
Share. - Daniele Micciancio:
Shortest Vector Problem. - Caroline Fontaine:
Shrinking Generator. - Marc Joye, Francis Olivier:
Side-Channel Analysis. - Tom Caddy:
Side-Channel Attacks. - Burton S. Kaliski Jr.:
Sieving. - Sachar Paulus:
Sieving in Function Fields. - Yevgeniy Dodis:
Signcryption. - Bodo Möller:
Signed Digit Exponentiation. - Bodo Möller:
Simultaneous Exponentiation. - Alex Biryukov:
Skipjack. - Alex Biryukov:
Slide Attack. - Bodo Möller:
Sliding Window Exponentiation. - Markus Kuhn:
Smartcard tamper resistance. - Kim Nguyen:
Smoothness. - Arjen K. Lenstra:
Smoothness Probability. - Bruce Schneier:
Solitaire. - Carl M. Ellison:
SPKI/SDSI. - Peter Landrock:
SSH. - Yvo Desmedt:
Station-to-Station Protocol. - Anne Canteaut:
Stream Cipher. - Anton Stiglic:
Strong Prime. - Dan Boneh:
Strong RSA Assumption. - Alex Biryukov:
Structural Cryptanalysis. - Burton S. Kaliski Jr.:
Subexponential Time. - Burton S. Kaliski Jr.:
Subgroup. - Arjen K. Lenstra:
Subgroup Cryptosystems. - Friedrich L. Bauer:
Substitutions and permutations. - Alex Biryukov:
Substitution-Permutation (SP) Network. - Caroline Fontaine:
Summation generator. - Burton S. Kaliski Jr.:
Symmetric Cryptosystem. - Caroline Fontaine:
Synchronous Stream Cipher.
T
- Bodo Möller:
2k-Ary Exponentiation. - Tom Caddy:
Tamper Detection. - Tom Caddy:
Tamper Resistance. - Tom Caddy:
Tamper Response. - Markus Kuhn:
Tempest. - Yvo Desmedt:
Threshold Cryptography. - Gerrit Bleumer:
Threshold Signature. - Jean-Jacques Quisquater, François-Xavier Standaert:
Time-memory tradeoffs. - Stuart Haber, Henri Massias:
Time-stamping. - François Koeune:
Timing attack. - Peter Landrock:
Token. - Benny Pinkas:
Traitor Tracing. - Clemens Heinrich:
Transport layer security (TLS). - Matthew J. B. Robshaw:
Trapdoor One-Way Function. - Christophe De Cannière:
Triple-DES. - Yvo Desmedt:
Trojan Horses, Computer Viruses and Worms. - Alex Biryukov:
Truncated Differentials. - Sharon Boeyen:
Trust Models. - Carlisle Adams:
Trusted Third Party. - Adi Shamir, Eran Tromer:
TWIRL. - Peter Landrock:
Two-Factor Authentication. - Christophe De Cannière:
Twofish.
U
- Gerrit Bleumer:
Undeniable Signatures. - Bart Preneel:
Universal One-Way Hash Functions. - Gerrit Bleumer:
Unlinkability. - Gerrit Bleumer:
Untraceability. - Carlisle Adams:
User Authentication.
V
- Kazue Sako:
Verifiable Encryption. - Berry Schoenmakers:
Verifiable Secret Sharing. - Friedrich L. Bauer:
Vernam Cipher. - Friedrich L. Bauer:
Vigenére Encryption. - Pavan Verma:
Virus Protection. - Robert Blakley, Gregory A. Kabatiansky:
Visual Secret Sharing Schemes.
W
- Gerrit Bleumer:
Watermarking. - Alex Biryukov:
Weak keys. - Lukasz Opyrchal:
Web Security. - Glenn Durfee:
Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem. - Berry Schoenmakers:
Witness Hiding.
X
- Peter Landrock:
X.509.
Z
- Berry Schoenmakers:
Zero-knowledge.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.