


Остановите войну!
for scientists:


default search action
Encyclopedia of Cryptography and Security 2005
- Henk C. A. van Tilborg:
Encyclopedia of Cryptography and Security. Springer 2005, ISBN 978-0-387-23473-1
A
- Anne Canteaut:
A5/1. - Peter Landrock:
ABA digital signature guidelines. - Gerald Brose:
Access Control. - Yvo Desmedt:
Access structure. - Peter Landrock:
Acquirer. - Alex Biryukov:
Adaptive Chosen Ciphertext Attack. - Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack. - Alex Biryukov:
Adaptive Chosen Plaintext Attack. - Friedrich L. Bauer:
Alberti encryption. - Friedrich L. Bauer:
Alphabet. - Gerrit Bleumer:
Anonymity. - Burton S. Kaliski Jr.:
Asymmetric Cryptosystem. - Peter Landrock:
Attribute certificate. - Carlisle Adams:
Attributes management. - John Black:
Authenticated encryption. - Gregory A. Kabatiansky, Ben J. M. Smeets:
Authentication. - Robert J. Zuccherato:
Authentication token. - Carlisle Adams:
Authorization architecture. - Carlisle Adams:
Authorization Policy. - Carlisle Adams:
Authorizations management. - Tor Helleseth:
Autocorrelation. - Eric Cronin:
Availability.
B
- Friedrich L. Bauer:
Beaufort Encryption. - Burton S. Kaliski Jr.:
Berlekamp Q-matrix. - Anne Canteaut:
Berlekamp-Massey algorithm. - Berk Sunar:
Binary Euclidean Algorithm. - Bodo Möller:
Binary exponentiation. - Burton S. Kaliski Jr.:
Binomial Distribution. - Arun Ross, Anil K. Jain:
Biometrics. - Arjen K. Lenstra:
Birthday Paradox. - Gerrit Bleumer:
Blind Signature. - Gerrit Bleumer:
Blinding Techniques. - Lars R. Knudsen:
Block ciphers. - Christophe De Cannière:
Blowfish. - Dan Boneh:
BLS Short Digital Signatures. - Burton S. Kaliski Jr.:
Blum Integer. - Dan Boneh:
Blum-Blum-Shub Pseudorandom Bit Generator. - Dan Boneh:
Blum-Goldwasser Public Key Encryption System. - Peter Landrock:
Bolero.net. - Claude Carlet:
Boolean Functions. - Alex Biryukov:
Boomerang Attack. - Dalit Naor:
Broadcast Encryption.
C
- Christophe De Cannière:
Camellia. - Christophe De Cannière:
CAST. - Bart Preneel:
CBC-MAC and Variants. - Friedrich L. Bauer:
CCIT2-code. - Peter Landrock:
CEPS Standard. - Carlisle Adams:
Certificate. - Carlisle Adams:
Certificate Management. - Anton Stiglic:
Certificate of Primality. - Carlisle Adams:
Certificate Revocation. - Carlisle Adams:
Certification Authority. - Matthias Schunter:
Certified Mail. - Gerrit Bleumer:
Chaffing and Winnowing. - Mike Just
:
Challenge-Response Identification. - Gerrit Bleumer:
Chaum Blind Signature Scheme. - Henk C. A. van Tilborg:
Chinese Remainder Theorem. - Alex Biryukov:
Chosen Ciphertext Attack. - Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack. - Alex Biryukov:
Chosen Plaintext Attack. - Alex Biryukov:
Ciphertext-Only Attack. - Burton S. Kaliski Jr.:
Claw-Free. - Peter Landrock:
Clip Scheme. - Caroline Fontaine:
Clock-Controlled Generator. - Daniele Micciancio
:
Closest Vector Problem. - Alex Biryukov:
Codebook Attack. - Bart Preneel:
Collision Attack. - Bart Preneel:
Collision resistance. - Anne Canteaut:
Combination generator. - Claude Crépeau:
Commitment. - Tom Caddy:
Common Criteria. - Gerrit Bleumer:
Communication Channel Anonymity. - Markus Kuhn:
compromising emanations. - Salil P. Vadhan:
Computational Complexity. - Matthias Schunter:
Contract Signing. - Peter Landrock:
Control Vectors. - Gerrit Bleumer:
Copy Protection. - Bart Preneel:
Correcting-block attack. - Anne Canteaut:
Correlation Attack for Stream Ciphers. - Claude Carlet:
Correlation Immune and Resilient Boolean Functions. - Yvo Desmedt:
Covert Channels. - Torben P. Pedersen:
CPS, Certificate Practice Statement. - Dan Boneh:
Cramer-Shoup Public Key System. - Gerrit Bleumer:
Credentials. - Tor Helleseth:
Cross-Correlation. - Friedrich L. Bauer:
Cryptanalysis. - Friedrich L. Bauer:
Crypto Machines. - Friedrich L. Bauer:
Cryptology. - Friedrich L. Bauer:
Cryptosystem. - Hideki Imai, Atsuhiro Yamagishi:
Cryptrec. - Claude Crépeau:
Cut-and-choose protocol. - Pascale Charpin:
Cyclic Codes. - Friedrich L. Bauer:
Cæsar cipher.
D
- Alex Biryukov, Christophe De Cannière:
Data encryption standard (DES). - Markus Kuhn:
Data Remanence. - Bart Preneel:
Davies-Meyer Hash Function. - Gerrit Bleumer:
DC Network. - Tor Helleseth:
DeBruijn sequence. - Ran Canetti:
Decisional Diffie-Hellman Assumption. - Burton S. Kaliski Jr.:
Decryption Exponent. - Yvo Desmedt:
Deniable encryption. - Eric Cronin:
Denial of Service. - Peter Landrock:
Derived key. - Alex Biryukov:
DES-X (or DESX). - Gerrit Bleumer:
Designated Confirmer Signature. - Alex Biryukov:
Dictionary Attack (I). - Carlisle Adams:
Dictionary Attack (II). - Eli Biham:
Differential Cryptanalysis. - Tom Caddy:
Differential Power Analysis. - Alex Biryukov:
Differential-Linear Attack. - Mike Just
:
Diffie-Hellman Key Agreement. - Igor E. Shparlinski:
Diffie-Hellman Problem. - Kazue Sako:
digital signature schemes. - Dan Boneh:
Digital Signature Standard. - Christian Cachin:
Digital Steganography. - Daniel Gordon:
Discrete Logarithm Problem.
E
- Caroline Fontaine:
E0 (Bluetooth). - Jean-Jacques Quisquater:
Eavesdropper. - Darrel Hankerson, Alfred Menezes:
ECC Challenges. - Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack. - Gerrit Bleumer:
Electronic Cash. - Peter Landrock:
Electronic Cheque. - Peter Landrock:
Electronic Negotiable Instruments. - Gerrit Bleumer:
Electronic payment. - Gerrit Bleumer:
Electronic Postage. - Kazue Sako:
Electronic Voting Schemes. - Gerrit Bleumer:
Electronic Wallet. - Dan Boneh:
Elgamal Digital Signature Scheme. - Yvo Desmedt:
ElGamal Public Key Encryption. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Cryptography. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Discrete Logarithm Problem. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Key Agreement Schemes. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Keys. - Paul Zimmermann:
Elliptic Curve Method. - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Point Multiplication Using Halving.