


default search action
Encyclopedia of Cryptography and Security 2011
- Henk C. A. van Tilborg, Sushil Jajodia:

Encyclopedia of Cryptography and Security, 2nd Ed. Springer 2011, ISBN 978-1-4419-5905-8
A
- Anne Canteaut:

A5/1. 1-2 - Gerald Brose:

Access Control. 2-7 - Hakki C. Cankaya:

Access Control from an OS Security Perspective. 7-9 - Hakki C. Cankaya:

Access Control Lists. 9-12 - Aaron Estes:

Access Control Matrix. 12-13 - Sabrina De Capitani di Vimercati:

Access Control Policies, Models, and Mechanisms. 13-14 - Access Control Rules. 14

- Access Limitation. 14

- Access Lists. 14

- Sabrina De Capitani di Vimercati:

Access Matrix. 14-17 - Davide Martinenghi:

Access Pattern. 17-20 - Access Rights. 20

- Yvo Desmedt:

Access Structure. 20 - ACM. 20

- Marijke De Soete:

Acquirer. 20 - Alex Biryukov:

Adaptive Chosen Ciphertext Attack. 21 - Alex Biryukov:

Adaptive Chosen Plaintext and Chosen Ciphertext Attack. 21 - Alex Biryukov:

Adaptive Chosen Plaintext Attack. 21 - Pierangela Samarati:

Administrative Policies. 21-23 - Alessandro Campi, Stefano Paraboschi:

Administrative Policies in SQL. 23 - Advanced Encryption Standard. 24

- Advanced Hash Competition. 24

- Kristen LeFevre, Bee-Chung Chen:

Adversarial/External Knowledge (Privacy in the Presence of). 24-26 - Adware. 26

- AES. 26

- Dan Boneh:

Aggregate Signatures. 27 - Bart Preneel:

AHS Competition/SHA-3. 27-29 - Friedrich L. Bauer:

Alberti Encryption. 29-31 - Claude Carlet:

Algebraic Immunity of Boolean Functions. 31-32 - Algebraic Number Field. 32

- Algorithmic Complexity Attacks. 32

- Scott A. Crosby, Dan S. Wallach:

Algorithmic DoS. 32-33 - Friedrich L. Bauer:

Alphabet. 33-34 - William Enck:

Android's Security Framework-Understanding the Security of Mobile Phone Platforms. 34-37 - Anomalous Binary Curves. 37

- Gerrit Bleumer:

Anonymity. 37-38 - Anonymity in Data Mining. 39

- Anonymous Communication. 39

- Yi Yang, Sencun Zhu:

Anonymous Routing. 39-40 - Stefan Köpsell:

Anonymous Web Browsing and Publishing. 40-42 - Anthropometric Authentication. 42

- Anthropometrics. 42

- Anthropometry. 42

- Anti-DoS Cookies. 42

- Anti-Jamming Strategy. 42

- Antispam Based on Sender Reputation. 42

- Antivirus. 42

- Mudhakar Srivatsa, Arun Iyengar:

Application-Level Denial of Service. 42-44 - Catherine Meadows:

Applications of Formal Methods to Intrusion Detection. 44-45 - V. N. Venkatakrishnan:

Applications of Formal Methods to Web Application Security. 45-46 - Applications of Rank-Metric Codes. 46

- Sebastiaan Indesteege:

ARIA. 47 - ARP Poison Routing (APR). 47

- ARP Poisoning. 47

- William Enck:

ARP Spoofing. 48-49 - Burt Kaliski:

Asymmetric Cryptosystem. 49-50 - Asynchronous Stream Cipher. 50

- Attack by Summation Over an Hypercube. 50

- Sean W. Smith:

Attestation. 50-51 - Marijke De Soete:

Attribute Certificate. 51-52 - J. Black:

Authenticated Encryption. 52-61 - Ebru Celikel Cankaya:

Authentication. 61-62 - Robert J. Zuccherato:

Authentication Token. 62-63 - Gregory A. Kabatiansky, Ben J. M. Smeets:

Authentication, From an Information Theoretic Perspective. 63-65 - Authorization. 65

- Sabrina De Capitani di Vimercati:

Authorizations. 65-68 - Tor Helleseth:

Autocorrelation. 68 - David Naccache:

Autotomic Signatures. 68 - Eric Cronin:

Availability. 68-69
B
- Bank Card. 71

- David Naccache:

Barrett's Algorithm. 71 - Barter. 71

- Base. 71

- Friedrich L. Bauer:

Beaufort Encryption. 71 - Ebru Celikel Cankaya:

Bell-LaPadula Confidentiality Model. 71-74 - David Elliott Bell:

Bell-La Padula Model. 74-79 - Burt Kaliski:

Berlekamp Q-matrix. 79 - Anne Canteaut:

Berlekamp-Massey Algorithm. 80 - Aaron Estes:

Biba Integrity Model. 81 - Biba Mandatory Integrity Policy. 81

- Jonathan K. Millen:

Biba Model. 81-82 - Big Number Multiplication. 82

- Big Number Squaring. 82

- Bilinear Pairings. 82

- Berk Sunar:

Binary Euclidean Algorithm. 83-84 - Bodo Möller:

Binary Exponentiation. 84-86 - Binary Functions. 86

- Binary GCD Algorithm. 86

- Binding Pattern. 86

- Burt Kaliski:

Binomial Distribution. 86 - Nary Subramanian:

Biometric Authentication. 86-90 - Biometric Cryptosystem. 90

- Ann Cavoukian, Alex Stoianov:

Biometric Encryption. 90-98 - Biometric Fusion. 98

- Biometric Identification in Video Surveillance. 98

- Biometric Information Ethics. 98

- Biometric Key Generation. 98

- Biometric Keys. 98

- B. V. K. Vijaya Kumar:

Biometric Matching. 98-101 - Biometric Passport Security. 101

- Biometric Performance Evaluation. 101

- Fabio Scotti

, Stelvio Cimato, Roberto Sassi:
Biometric Privacy. 101-104 - Biometric Recognition. 104

- Krzysztof Kryszczuk, Jonas Richiardi

:
Biometric Sample Quality. 104-110 - Achint Thomas, Venu Govindaraju:

Biometric Sensors. 110-113 - Alan D. Smith:

Biometric Social Responsibility. 113-117 - Jonas Richiardi

, Krzysztof Kryszczuk:
Biometric Systems Evaluation. 117-124 - Fernando L. Podio:

Biometric Technologies and Security - International Biometric Standards Development Activities. 124-130 - Biometric Testing. 130

- Evangelia Micheli-Tzanakou, Konstantinos N. Plataniotis:

Biometrics: Terms and Definitions. 142-147 - Martin Evison

:
Biometrics for Forensics. 130-134 - Elisabeth de Leeuw:

Biometrics for Identity Management and Fields of Application. 134-139 - Stan Z. Li:

Biometrics in Video Surveillance. 139-142 - BIOS Basic Input Output System. 147

- Arjen K. Lenstra:

Birthday Paradox. 147-148 - Black Box Algorithms. 148

- David Naccache:

Blackmailing Attacks. 148 - Gerrit Bleumer:

Blind Signature. 148-150 - Gerrit Bleumer:

Blinding Techniques. 150-152 - Lars R. Knudsen:

Block Ciphers. 152-157 - Christophe De Cannière:

Blowfish. 157-158 - BLP. 158

- BLP Model. 158

- Dan Boneh:

BLS Short Digital Signatures. 158-159 - Burt Kaliski:

Blum Integer. 159-160 - Dan Boneh:

Blum-Blum-Shub Pseudorandom Bit Generator. 160-161 - Dan Boneh:

Blum-Goldwasser Public Key Encryption System. 161-162 - Claude Carlet:

Boolean Functions. 162-165 - Alex Biryukov:

Boomerang Attack. 165-166 - Guofei Gu:

Botnet Detection in Enterprise Networks. 166-168 - Donggang Liu:

Broadcast Authentication from a Conditional Perspective. 168-170 - Yvo Desmedt, Goce Jakimoski:

Broadcast Authentication from an Information Theoretic Perspective. 170-171 - Dalit Naor:

Broadcast Encryption. 171-174 - Broadcast Stream Authentication. 174

- Browser Cookie. 174

- BSP Board Support Package. 174

- Angelos D. Keromytis:

Buffer Overflow Attacks. 174-177 - Buffer Overrun. 177

- Jean-Louis Lanet:

Bytecode Verification. 177-178
C
- Lars R. Knudsen, Gregor Leander

:
C2 - Block Cipher. 179-180 - Christophe De Cannière:

Camellia. 180-182 - Cascade Revoke. 182

- Christophe De Cannière:

Cast. 182-183 - Christophe Petit, Jean-Jacques Quisquater:

Cayley Hash Functions. 183-184 - Bart Preneel:

CBC-MAC and Variants. 184-188 - Friedrich L. Bauer:

CCIT2-Code. 188 - CDH. 188

- Cellular Network Security. 188

- Carlisle Adams:

Certificate. 188-189 - Carlisle Adams:

Certificate Management. 189 - Anton Stiglic:

Certificate of Primality. 189 - Carlisle Adams:

Certificate Revocation. 190-192 - Certificate-Based Access Control. 192

- Alexander W. Dent:

Certificateless Cryptography. 192-193 - Carlisle Adams, Russ Housley, Sean Turner:

Certification Authority. 193-195 - Matthias Schunter:

Certified Mail. 195-196 - Gerrit Bleumer:

Chaffing and Winnowing. 197-198 - Challenge-Response Authentication. 198

- Mike Just

:
Challenge-Response Identification. 198-199 - Challenge-Response Protocol. 199

- Gerrit Bleumer:

Chaum Blind Signature Scheme. 199-200 - David Naccache:

Chemical Combinatorial Attack. 200-201 - Henk C. A. van Tilborg:

Chinese Remainder Theorem. 201-202 - Sabrina De Capitani di Vimercati, Pierangela Samarati:

Chinese Wall. 202-203 - Ebru Celikel Cankaya:

Chinese Wall Model. 203-205 - Chip Card. 205

- Alex Biryukov:

Chosen Ciphertext Attack. 205 - Alex Biryukov:

Chosen Plaintext and Chosen Ciphertext Attack. 205 - Alex Biryukov:

Chosen Plaintext Attack. 205-206 - Chosen Prefix Attack. 206

- Chromosome. 206

- Chroot Prison. 207

- Lee D. McFearin:

Chroot Jail. 206-207 - Alex Biryukov:

Ciphertext-Only Attack. 207 - Sabrina De Capitani di Vimercati, Pierangela Samarati:

Clark and Wilson Model. 208-209 - Classical Cryptosystem. 209

- Burt Kaliski:

Claw-Free. 209-210 - Lars R. Knudsen:

CLEFIA. 210-211 - Client Puzzles. 211

- Caroline Fontaine:

Clock-Controlled Generator. 211-212 - Daniele Micciancio:

Closest Vector Problem. 212-214 - Cloud Computing. 214

- Bart Preneel:

CMAC. 214-215 - CMVP - Cryptographic Module Validation Program. 215

- Code Verification. 215

- Nicolas Sendrier:

Code-Based Cryptography. 215-216 - Alex Biryukov:

Codebook Attack. 216 - Nadia Heninger:

Cold-Boot Attacks. 216-217 - Jelena Mirkovic:

Collaborative DoS Defenses. 217-220 - Bart Preneel:

Collision Attack. 220-221 - Bart Preneel:

Collision Resistance. 221-222 - Anne Canteaut:

Combination Generator. 222-224 - Commercial Off-the-Shelf. 224

- Commercial Security Model. 224

- Claude Crépeau:

Commitment. 224-227 - Tom Caddy:

Common Criteria. 227-229 - Paolo Salvaneschi:

Common Criteria, From a Security Policies Perspective. 229-232 - Gerrit Bleumer:

Communication Channel Anonymity. 232 - Complexity Theory. 232

- Compositeness Test. 232

- Markus Kuhn:

Compromising Emanations. 232-235 - Salil P. Vadhan:

Computational Complexity. 235-240 - Igor E. Shparlinski:

Computational Diffie-Hellman Problem. 240-244 - XiaoFeng Wang:

Computational Puzzles. 244-245 - Computationally Sound Proof System. 245

- Günther Pernul, Moritz Riesner:

Conceptual Design of Secure Databases. 245-248 - Conceptual Modeling. 248

- Conference Key Agreement. 248

- Conference Keying. 248

- Confidentiality Model. 248

- Confirmer Signatures. 249

- Consistency Verification of Security Policy. 249

- Marc Vauclair:

Contactless Cards. 249 - Arnon Rosenthal, Edward Sciore:

Content-Based and View-Based Access Control. 249-253 - Matthias Schunter:

Contract Signing. 253-254 - Marijke De Soete:

Control Vector. 254 - Conventional Cryptosystem. 254

- Michael T. Hunter:

Cookie. 254-256 - Coprime. 256

- Gerrit Bleumer:

Copy Protection. 256-259 - Bart Preneel:

Correcting-Block Attack. 259-260 - Anne Canteaut:

Correlation Attack for Stream Ciphers. 261-262 - Claude Carlet:

Correlation Immune and Resilient Boolean Functions. 262-264 - Frédéric Cuppens, Nora Cuppens-Boulahia:

Cover Story. 264-265 - Yvo Desmedt:

Covert Channels. 265-266 - Torben P. Pedersen:

CPS, Certificate Practice Statement. 266-267 - CPU Consumption. 267

- Michael E. Locasto:

CPU Denial of Service. 268-269 - CPU Starvation. 269

- Dan Boneh:

Cramer-Shoup Public-Key System. 269-270 - Credential Verification. 270

- Adam J. Lee:

Credential-Based Access Control. 271-272 - Gerrit Bleumer:

Credentials. 272-275 - Engin Kirda:

Cross Site Scripting Attacks. 275-277 - Tor Helleseth:

Cross-Correlation. 277 - CRT. 277

- Friedrich L. Bauer:

Cryptanalysis. 277-281 - Friedrich L. Bauer:

Crypto Machines. 281-283 - Cryptographic Algorithm Evaluation. 283

- Cryptographic Protocol. 283

- Cryptographic Protocol Verification. 283

- Cryptographic Puzzles. 283

- Cryptography on Reconfigurable Devices. 283

- Friedrich L. Bauer:

Cryptology. 283-284 - David Naccache:

Cryptophthora. 284 - Friedrich L. Bauer:

Cryptosystem. 284-285 - Hideki Imai, Atsuhiro Yamagishi:

CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project). 285-288 - Marion Videau:

Cube Attack. 289-290 - Claude Crépeau:

Cut-and-Choose Protocol. 290-291 - Pascale Charpin:

Cyclic Codes. 291-294 - Friedrich L. Bauer:

Cæsar Cipher. 180
D
- DAC. 295

- Alex Biryukov, Christophe De Cannière:

Data Encryption Standard (DES). 295-301 - William E. Winkler:

Data Linkage. 301-303 - Charu C. Aggarwal:

Data Mining (Privacy in). 303-306 - Markus Kuhn:

Data Remanence. 306 - Luc Bouganim, Yanli Guo:

Database Encryption. 307-312 - Bart Preneel:

Davies-Meyer. 312-313 - Gerrit Bleumer:

DC Network. 313-315 - DDH Problem. 315

- Tor Helleseth:

De Bruijn Sequence. 315-316 - De-Skewing. 331

- Decentralized Trust Management. 316

- Ran Canetti, Mayank Varia:

Decisional Diffie-Hellman Problem. 316-319 - Christiane Peters:

Decoding Algorithms. 319-322 - Burt Kaliski:

Decryption Exponent. 322 - Yvo Desmedt:

Deniable Encryption. 322-323 - Denial of Service (DoS). 323

- George Kesidis:

Denial-of-Service Detection. 323-328 - Deobfuscating Malware. 328

- Marijke De Soete:

Derived Key. 328 - Alex Biryukov:

DES-X (or DESX). 331 - Gerrit Bleumer:

Designated Confirmer Signature. 328-330 - Berry Schoenmakers:

Designated-Verifier Proofs. 330-331 - DH Key Agreement. 331

- DHP. 331

- Carlisle Adams:

Dictionary Attack. 332 - Alex Biryukov:

Dictionary Attack (I). 332 - Eli Biham:

Differential Cryptanalysis. 332-336 - Tom Caddy:

Differential Power Analysis. 336-338 - Cynthia Dwork:

Differential Privacy. 338-340 - Alex Biryukov:

Differential-Linear Attack. 340-341 - Diffie-Hellman Problem. 342

- Mike Just

:
Diffie-Hellman Key Agreement. 341-342 - Diffie-Hellman Key Exchange. 342

- Digest Authentication. 342

- Digital Certificate. 342

- Matthieu Finiasz, Nicolas Sendrier:

Digital Signature Scheme Based on McEliece. 342-343 - Kazue Sako:

Digital Signature Schemes. 343-344 - Philippe Gaborit, Nicolas Sendrier:

Digital Signature Schemes from Codes. 344-347 - Dan Boneh:

Digital Signature Standard. 347 - Christian Cachin:

Digital Steganography. 348-352 - Daniel M. Gordon:

Discrete Logarithm Problem. 352-353 - Ninghui Li:

Discretionary Access Control. 353-356 - Sabrina De Capitani di Vimercati:

Discretionary Access Control Policies (DAC). 356-358 - Marion Videau:

Distinguishing Attacks. 358-359 - DLP. 359

- Svetlana N. Yanushkevich

, Denis V. Popel:
DNA. 359-362 - Brent ByungHoon Kang:

DNS-Based Botnet Detection. 362-363 - John Ioannidis:

DoS Pushback. 363-365 - DPA. 365

- Mihai Christodorescu, Vinod Ganapathy:

Dynamic Analysis. 365-367 - Brent ByungHoon Kang, Anurag Srivastava:

Dynamic Malware Analysis. 367-368 - Dynamic Program Analysis. 368

- Sean W. Smith:

Dynamic Root of Trust. 368-369 - Dynamic Separation of Duties. 369

E
- e-Government. 372

- Johannes Gehrke

, Ashwin Machanavajjhala:
E-Privacy. 424-426 - Caroline Fontaine:

E0. 371-372 - Bir Bhanu:

Ear Shape for Biometric Identification. 372-378 - Micah Sherr:

Eavesdropping. 378-379 - ECC. 379

- Darrel Hankerson, Alfred Menezes:

ECC Challenges. 379-380 - ECM. 380

- ECPP. 380

- ECRYPT Stream Cipher Project. 380

- Edwards Coordinates. 380

- Tanja Lange:

Edwards Curves. 380-382 - Efficiency of Hyperelliptic Curve Cryptosystems. 382

- Electro-Magnetic Fingerprinting. 385

- Jean-Jacques Quisquater, David Samyde:

Electromagnetic Attack. 382-385 - Gerrit Bleumer:

Electronic Cash. 385-387 - Electronic Check. 387

- Marijke De Soete:

Electronic Cheque. 387 - Gerrit Bleumer:

Electronic Payment. 387-389 - Gerrit Bleumer:

Electronic Postage. 389-391 - Electronic Purse. 391

- Kazue Sako:

Electronic Voting Schemes. 391-393 - Gerrit Bleumer:

Electronic Wallet. 393-395 - Dan Boneh:

ElGamal Digital Signature Scheme. 395-396 - ElGamal Encryption. 396

- Yvo Desmedt:

ElGamal Public Key Encryption. 396 - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Cryptography. 397 - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Discrete Logarithm Problem. 397-400 - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Key Agreement Schemes. 400-401 - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Keys. 401 - Paul Zimmermann:

Elliptic Curve Method for Factoring. 401-403 - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Point Multiplication Using Halving. 403-406 - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Public-Key Encryption Schemes. 406-407 - Darrel Hankerson, Alfred Menezes:

Elliptic Curve Signature Schemes. 407-408 - Elliptic Curve Trace Computation. 408

- Darrel Hankerson, Alfred Menezes:

Elliptic Curves. 408-410 - François Morain:

Elliptic Curves for Primality Proving. 411-412 - Michael Ward, Anita Ochieano:

EMV. 412-416 - Friedrich L. Bauer:

Encryption. 416 - Burt Kaliski:

Encryption Exponent. 417 - Arkadiusz Orlowski:

Enigma. 417-420 - Robert J. Zuccherato:

Entity Authentication. 420-421 - Entity Authentication Protocol. 421

- Entity Resolution. 421

- Carl M. Ellison:

Entropy Sources. 421-423 - Environmental Attacks. 423

- ePassport Security. 423

- Error-Correcting Cyclic Codes. 426

- Error-Correction Decoding. 426

- Escrow Service. 426

- Marion Videau:

eSTREAM. 426-427 - Berk Sunar:

Euclidean Algorithm. 427-430 - Euclidean Lattice. 430

- Euclid's Algorithm. 427

- Burt Kaliski:

Euler's Totient Function. 430 - Everywhere Second Preimage Resistant Hash Function (esec). 430

- Michael J. Wiener:

Exhaustive Key Search. 431-433 - Gerrit Bleumer:

Existential Forgery. 433-434 - Exponential Key Exchange. 434

- Burt Kaliski:

Exponential Time. 434 - Christof Paar:

Exponentiation Algorithms. 434-436 - Extended Euclidean Algorithm. 436

- Burt Kaliski:

Extension Field. 436
F
- Soma Biswas, Rama Chellappa:

Face Recognition from Still Images and Video. 437-444 - Daniel J. Bernstein:

Factorization Circuits. 444-445 - Burt Kaliski:

Factor Base. 444 - Gerrit Bleumer:

Fail-Stop Signature. 446-447 - Matthias Schunter:

Fair Exchange. 447-448 - False Data Filtering. 448

- Wensheng Zhang:

False Data Injection Defense. 448-450 - Anne Canteaut:

Fast Correlation Attack. 450-452 - Olivier Benoît:

Fault Attack. 452-453 - Christophe De Cannière:

FEAL. 454-455 - Feige-Fiat-Shamir Signature Scheme. 455

- Alex Biryukov:

Feistel Cipher. 455 - Moses D. Liskov:

Fermat Primality Test. 455-456 - Fermat Test. 456

- Moses D. Liskov:

Fermat's Little Theorem. 456 - Yvo Desmedt:

Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme. 457-458 - Burt Kaliski:

Field. 458 - File System Permissions. 458

- Anne Canteaut:

Filter Generator. 458-460 - Ruggero Donida Labati, Fabio Scotti

:
Fingerprint. 460-465 - Fingerprint Authentication. 465

- Alexander Barg, Gregory A. Kabatiansky:

Fingerprinting. 465-467 - Burt Kaliski:

Finite Field. 468 - Tom Caddy:

FIPS 140-2. 468-471 - Niels Provos:

Firewall. 471-474 - Firewall Policy Analysis. 474

- Ehab Al-Shaer:

Firewalls. 474-482 - Fixed Window Exponentiation. 482

- André Weimerskirch:

Fixed-Base Exponentiation. 482-485 - André Weimerskirch:

Fixed-Exponent Exponentiation. 485-486 - Pierangela Samarati:

Flexible Authorization Framework (FAF). 486-489 - Flow Blocking. 489

- Forged Resets. 489

- Gerrit Bleumer:

Forgery. 489-490 - Catherine Meadows:

Formal Analysis of Cryptographic Protocols. 490-492 - Graham Steel:

Formal Analysis of Security APIs. 492-494 - Formal Methods. 494

- Michael Huth:

Formal Methods and Access Control. 494-495 - Jonathan K. Millen:

Formal Methods for the Orange Book. 495-498 - Catherine Meadows:

Formal Methods in Certification and Evaluation. 498-499 - Forward Secrecy. 499

- FPGA Field Programmable Gate Array. 499

- Tim Güneysu:

FPGAs in Cryptography. 499-501 - Emmanuel Thomé

:
Function Field Sieve. 501-502
G
- Sudeep Sarkar, Zongyi Liu:

Gait Recognition. 503-506 - David A. McGrew:

Galois Counter Mode. 506-508 - Galois Message Authentication Code. 508

- Tor Helleseth:

Gap. 508-509 - GCD. 509

- GCM. 509

- Gene. 509

- Jerome A. Solinas:

Generalized Mersenne Prime. 509-510 - Burt Kaliski:

Generator. 510 - Daniel M. Gordon:

Generic Attacks Against DLP. 510-512 - David Naccache:

Generic Model. 512-513 - Genetic Code. 513

- Geometry of Numbers. 513

- Bart Preneel:

GMAC. 513-514 - Gerrit Bleumer:

GMR Signature. 514-515 - Kazue Sako:

Goldwasser-Micali Encryption Scheme. 516 - Tor Helleseth:

Golomb's Randomness Postulates. 516-517 - Christophe De Cannière:

GOST. 517-518 - Sabrina De Capitani di Vimercati, Giovanni Livraga:

Grant Option. 518 - Scott Contini:

Greatest Common Divisor. 518-519 - Greatest Common Factor. 519

- Burt Kaliski:

Group. 519-520 - Mike Burmester:

Group Key Agreement. 520-526 - Group Key Distribution. 526

- Group Key Exchange. 526

- Gerrit Bleumer:

Group Signatures. 526-528 - David Naccache:

Gröbner Basis. 519
H
- David Zhang, Vivek Kanhangad:

Hand Geometry Recognition. 529-531 - Hand Geometry Verification. 531

- Patrizio Campisi, Emanuele Maiorana, Harold Mouchère, Christian Viard-Gaudin, Alessandro Neri:

Handwriting Analysis. 531-534 - Burt Kaliski:

Hard-Core Bit. 534-535 - Laurent Sustek:

Hardware Security Module. 535-538 - David Challener:

Hash Agility. 538-540 - Dwight Horne:

Hash Chain. 542-543 - Bart Preneel:

Hash Functions. 543-553 - Hash-Based Message Authentication Code. 553

- Tanja Lange:

Hash-Based Signatures. 540-542 - Header Injections. 553

- Serge Fenet:

Header-Based Attacks. 553-556 - HEC Acronym is Often Used for Hyper Elliptic Curves. 556

- Heredity. 556

- High Assurance Evaluation Methods. 556

- Higher Order Derivative Attack. 556

- Tyrone Grandison, Kristen LeFevre:

Hippocratic Database. 556-559 - History-Based Separation of Duties. 559

- Bart Preneel:

HMAC. 559-560 - Berry Schoenmakers:

Homomorphic Encryption. 560-562 - Burt Kaliski:

Homomorphism. 562 - Vijay Alturi:

HRU. 562-564 - Jörg Schwenk:

HTTP Authentication. 564-565 - HTTP Basic Authentication. 565

- HTTP Cookie. 565

- HTTP Digest Access Authentication Scheme. 565

- Italo Dacosta:

HTTP Digest Authentication. 565-567 - Andrew Clark:

HTTP Session Security. 567-569 - Torben P. Pedersen:

HTTPS, HTTP over TLS. 569-570 - Human Ear Biometrics. 570

- Human Ear Identification. 570

- Human Ear Recognition. 570

- Human Ear Verification. 570

- Kaoru Kurosawa:

Hybrid Encryption. 570-572 - Hyperelliptic Curve Discrete Logarithm Problem (HECDLP). 573

- Roberto Avanzi, Nicolas Thériault:

Hyperelliptic Curve Security. 573-576 - Roberto Avanzi, Nicolas Thériault:

Hyperelliptic Curves. 576-580 - Roberto Avanzi, Nicolas Thériault:

Hyperelliptic Curves Performance. 580-582
I
- IBE. 583

- IC Integrated Circuit. 583

- IC-Integrated Circuit. 583

- Iceman Attack. 583

- ID-Based Encryption. 583

- Alex Biryukov:

IDEA. 583-584 - Carlisle Adams:

Identification. 584-585 - Identity Authentication. 585

- Mike Just

:
Identity Management. 586-587 - Identity Proof. 587

- Robert J. Zuccherato:

Identity Verification Protocol. 587-588 - Benoît Libert, Jean-Jacques Quisquater:

Identity-Based Cryptosystems. 588-594 - Martin Gagné:

Identity-Based Encryption. 594-596 - Carlisle Adams:

Impersonation Attack. 596 - Implicit Key Authentication. 596

- Alex Biryukov:

Impossible Differential Attack. 597 - Kim Nguyen:

Index Calculus Method. 597-600 - Indistinguishability of Encryptions. 600

- Joachim Biskup:

Inference Control. 600-605 - Information Assurance. 605

- Heiko Mantel:

Information Flow and Noninterference. 605-607 - Information Flow Security. 607

- Information Integrity. 607

- Information Security Management System. 607

- Information Theoretic Model. 608

- Friedrich L. Bauer:

Information Theory. 608-609 - Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem:

Insider Threat Defense. 609-611 - Arjen K. Lenstra:

Integer Factoring. 611-618 - Integrated Circuit. 618

- Integrated Circuit Card. 618

- Integrity Model. 618

- Intellectual Property. 618

- Berry Schoenmakers:

Interactive Argument. 618-619 - Berry Schoenmakers:

Interactive Proof. 619 - Interactive Proof Systems. 619

- Interactive Theorem Proving and Security. 619

- Interception. 619

- Christophe De Cannière:

Interpolation Attack. 620 - Qijun Gu:

Intrusion Detection in Ad Hoc Networks. 620-623 - Assia Tria, Hamid Choukri:

Invasive Attacks. 623-629 - Anne Canteaut:

Inversion Attack. 629-630 - Christof Paar:

Inversion in Finite Fields and Rings. 631-632 - Inversion in Galois Fields. 632

- Steven M. Bellovin:

IP Traceback. 632-634 - Alex Biryukov:

IPES. 634-635 - John Ioannidis:

IPsec. 635-638 - IPSec Policy Analysis. 638

- Yu Chen:

Iris. 638-646 - Burt Kaliski:

Irreducible Polynomial. 646 - Angelika Plate:

ISMS: A Management Framework for Information Security. 647-648 - ISO 15408 CC - Common Criteria. 648

- ISO 19790 2006 Security Requirements for Cryptographic Modules. 648

- Mehdi Tibouchi

:
ISO-9796 Signature Standards. 649-650 - ISO/IEC 15408. 648

- ISO/IEC 27001. 649

- Marijke De Soete:

Issuer. 650 - Jorge Guajardo:

Itoh-Tsujii Inversion Algorithm. 650-653
J
- Burt Kaliski:

Jacobi Symbol. 655 - Wenyuan Xu:

Jamming Attack Defense. 655-661 - Srdjan Capkun:

Jamming Resistance. 661-662
K
- Pierangela Samarati:

k-Anonymity. 663-666 - André Weimerskirch:

Karatsuba Algorithm. 666-669 - Christophe De Cannière:

Kasumi/Misty1. 669-670 - Thomas Eisenbarth, Timo Kasper, Christof Paar, Sebastiaan Indesteege:

Keeloq. 671-673 - Radmilo Racic:

Kerberos. 673-674 - Carlisle Adams:

Kerberos Authentication Protocol. 674-675 - Kerckhoffs' Law. 675

- Fabien A. P. Petitcolas

:
Kerckhoffs' Principle. 675 - Friedrich L. Bauer:

Key. 676-677 - Mike Just

:
Key Agreement. 677-678 - Robert J. Zuccherato:

Key Authentication. 678-679 - Torben P. Pedersen:

Key Encryption Key. 679-681 - Mike Just

:
Key Escrow. 681-682 - Aggelos Kiayias, Bülent Yener:

Key Generation Using Physical Properties of Wireless Communication. 682-683 - Key Life Cycle Management. 683

- Steve Lloyd, Carlisle Adams:

Key Management. 683-688 - Key Recovery. 688

- Key Variation. 688

- Mitchell A. Thornton:

Keyboard Dynamics. 688-691 - Aaron Estes:

Keylogging. 691 - Keystream. 691

- Patrizio Campisi, Alessandro Neri:

Keystroke Dynamics. 692-695 - Keystroke Logging. 695

- Keyword-Based Retrieval over Encrypted Data. 695

- Yvo Desmedt:

Knapsack Cryptographic Schemes. 695-704 - Alex Biryukov:

Known Plaintext Attack. 704-705 - Darrel Hankerson, Alfred Menezes:

Koblitz Elliptic Curves. 705-706
L
- Arjen K. Lenstra:

L Notation. 709-710 - Lamport One-Time Signatures. 710

- Late Launch. 710

- Phong Q. Nguyen:

Lattice. 710-711 - Lattice Basis Reduction. 711

- Phong Q. Nguyen:

Lattice Reduction. 711-713 - Daniele Micciancio:

Lattice-Based Cryptography. 713-715 - LCM. 715

- Scott Contini:

Least Common Multiple. 715 - Sabrina De Capitani di Vimercati:

Least Privilege. 716 - Burt Kaliski:

Legendre Symbol. 716 - Stephen M. Papa, William D. Casper:

Levels of Trust. 716-720 - LFSR. 720

- Anne Canteaut:

Linear Complexity. 720 - Caroline Fontaine:

Linear Congruential Generator. 721 - Anne Canteaut:

Linear Consistency Attack. 721-722 - Alex Biryukov, Christophe De Cannière:

Linear Cryptanalysis for Block Ciphers. 722-725 - Anne Canteaut:

Linear Cryptanalysis for Stream Ciphers. 725-726 - Anne Canteaut:

Linear Feedback Shift Register. 726-729 - Anne Canteaut:

Linear Syndrome Attack. 729 - List Decoding. 729

- Claudio A. Ardagna

:
Location Information (Privacy of). 729-732 - Location Privacy. 732

- Marco Gruteser:

Location Privacy in Wireless Networks. 732-734 - Sean W. Smith:

Logic Bomb. 734 - Piero A. Bonatti:

Logic-Based Authorization Languages. 734-736 - Longhand. 736

- Lars R. Knudsen:

Luby-Rackoff Ciphers. 736-737
M
- m-Sequence. 737

- Xiaokui Xiao:

M-Invariance. 739-741 - Bart Preneel:

MAA. 741-742 - Bart Preneel:

MAC Algorithms. 742-748 - Machine Readable Travel Document Security. 748

- Macrodata Disclosure Limitation. 748

- Macrodata Disclosure Protection. 748

- Sara Foresti:

Macrodata Protection. 749-750 - Maliciously Modified Set of Administrative Tools. 750

- Malware. 750

- Engin Kirda:

Malware Behavior Clustering. 751-752 - Stefan Katzenbeisser, Johannes Kinder, Helmut Veith:

Malware Detection. 752-755 - Yvo Desmedt:

Man-in-the-Middle Attack. 759 - Shambhu J. Upadhyaya:

Mandatory Access Control. 756-758 - Sabrina De Capitani di Vimercati, Pierangela Samarati:

Mandatory Access Control Policy (MAC). 758 - Christophe De Cannière:

MARS. 759-760 - Bart Preneel:

MASH Hash Functions (Modular Arithmetic Secure Hash). 761 - Carlisle Adams:

Master Key. 762 - Maurer's Algorithm. 762

- Moses D. Liskov:

Maurer's Method. 762-763 - Tor Helleseth:

Maximal-Length Sequences. 763-766 - Friedrich L. Bauer:

Maxims. 766 - Nicolas Sendrier:

McEliece Public Key Cryptosystem. 767-768 - MD4 Hash Function. 768

- Nicky Mouha:

MD4-MD5. 768-771 - MD5 Hash Function. 771

- Bart Preneel:

MDC-2 and MDC-4. 771-772 - Measurement Models of Software Security. 772

- Alex Biryukov:

Meet-in-the-Middle Attack. 772-773 - XiaoFeng Wang:

Memory and State Exhaustion Denial of Service. 773-774 - Memory and State Exhaustion DoS. 774

- Memory Overflow. 774

- Merkle-Hash-Trees Signatures. 774

- Jerome A. Solinas:

Mersenne Prime. 774-775 - Message Authentication Algorithm. 775

- Guido Salvaneschi, Paolo Salvaneschi:

Metrics of Software Security. 775-778 - Microdata Anonymization Techniques. 778

- Microdata Disclosure Limitation. 778

- Microdata Disclosure Protection. 778

- Josep Domingo-Ferrer:

Microdata Masking Techniques. 778-781 - Sara Foresti:

Microdata Protection. 781-783 - Microdata Statistical Disclosure Control. 784

- Miller-Rabin Test. 785

- Moses D. Liskov:

Miller-Rabin Probabilistic Primality Test. 784-785 - MILS. 785

- Anne Canteaut:

Minimal Polynomial. 785 - Minimal Privilege. 785

- Burt Kaliski:

MIPS-Year. 785-786 - Alex Biryukov:

Miss-in-the-Middle Attack. 786 - Matthew K. Franklin:

Mix Networks. 786-788 - ML-Sequence. 788

- Marijke De Soete:

Mobile Payments. 788-789 - Marijke De Soete:

Mobile Wallet. 789 - Bart Preneel:

Modes of Operation of a Block Cipher. 789-794 - Scott Contini, Çetin Kaya Koç, Colin D. Walter:

Modular Arithmetic. 795-798 - Scott Contini:

Modular Root. 798 - Scott Contini:

Modulus. 798-799 - Monitoring. 799

- David Naccache:

Monotone Signatures. 799 - Çetin Kaya Koç:

Montgomery Arithmetic. 799-803 - Burt Kaliski:

Moore's Law. 803 - MPKC. 804

- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC). 804

- Multi-Exponentiation. 808

- Chen-Mou Cheng:

Multi-Threaded Implementation for Cryptography and Cryptanalysis. 823-824 - Arun Ross:

Multibiometrics. 804-808 - Multicast Authentication. 808

- Multicast Stream Authentication. 808

- Multidimensional Databases. 808

- Multifactor Authentication. 808

- Pierangela Samarati, Giovanni Livraga:

Multilevel Database. 809-811 - Frédéric Cuppens, Nora Cuppens-Boulahia:

Multilevel Security Policies. 811-812 - Berry Schoenmakers:

Multiparty Computation. 812-815 - Multiparty Computation (MPC). 815

- Alex Biryukov:

Multiple Encryption. 815 - Jim Alves-Foss:

Multiple Independent Levels of Security. 815-818 - David Naccache:

Multiplicative Knapsack Cryptosystem. 818 - Berk Sunar:

Multiprecision Multiplication. 818-821 - Berk Sunar:

Multiprecision Squaring. 821-822 - Alex Biryukov:

Multiset Attack. 822 - Louis Goubin, Jacques Patarin, Bo-Yin Yang:

Multivariate Cryptography. 824-828
N
- David Naccache:

Naccache-Stern Higher Residues Cryptosystem. 829 - Near Field Communication. 829

- Nearest Vector Problem. 829

- Mike Just

:
Needham-Schroeder Protocols. 829-831 - Bart Preneel:

NESSIE Project. 831-836 - Angelos D. Keromytis:

Network Bandwidth Denial of Service (DoS). 836-838 - Xiaowei Yang:

Network Capabilities. 838-840 - Network DoS. 840

- Network Flooding Attack. 840

- Marc Vauclair:

NFC. 840-842 - NFS. 842

- Nicolas Sendrier:

Niederreiter Encryption Scheme. 842-843 - Darrel Hankerson, Alfred Menezes:

NIST Elliptic Curves. 843-844 - Donggang Liu:

Node Clone Defense. 844-846 - Node Replication. 846

- Cynthia Dwork:

Non-Malleability. 849-852 - Berry Schoenmakers:

Noninteractive Proof. 846 - Caroline Fontaine:

Nonlinear Feedback Shift Register. 846-848 - Claude Carlet:

Nonlinearity of Boolean Functions. 848-849 - Nonrepudiable Agreement. 852

- Mike Just

:
Nonrepudiation of Digital Signatures. 852-854 - Nonrepudiation Protocol. 854

- Gerrit Bleumer:

Nonsecret Encryption. 854-857 - Darrel Hankerson, Alfred Menezes:

NSA Suite B. 857 - NSS. 857

- William Whyte, Jeffrey Hoffstein:

NTRU. 858-861 - NTRUEncrypt. 861

- NTRUSign. 861

- Nucleic Acid. 861

- Burt Kaliski:

Number Field. 861 - Number Field Sieve. 861

- Alexander Kruppa, Paul Leyland:

Number Field Sieve for Factoring. 862-867 - Antoine Joux

, Reynald Lercier:
Number Field Sieve for the DLP. 867-873 - Scott Contini:

Number Theory. 873-879 - Kazue Sako:

Nyberg-Rueppel Signature Scheme. 879 - Nym. 879

O
- Burt Kaliski:

O-Notation. 881-882 - David Pointcheval:

OAEP: Optimal Asymmetric Encryption Padding. 882-884 - Berry Schoenmakers:

Oblivious Transfer. 884-885 - Carlisle Adams:

One Time Password, from a Key Management Perspective. 885 - Mohamed Omar Rayes:

One-Time Password. 885-887 - One-Way Chain. 887

- Matthew J. B. Robshaw:

One-Way Function. 887-888 - One-way property. 888

- Online Analytical Processing. 888

- Operational Separation of Duties. 888

- Christof Paar:

Optimal Extension Fields (OEFs). 888-890 - Burt Kaliski:

Order. 890-891 - Outbound Authentication. 891

- Angelos Stavrou:

Overlay-Based DoS Defenses. 891-897 - Gerrit Bleumer:

Overspender Detection. 897 - Gerrit Bleumer:

Overspending Prevention. 898
P
- Packet Flooding Attack. 899

- Qijun Gu:

Packet-Dropping Attack. 899-902 - Pascal Paillier:

Paillier Encryption and Signature Schemes. 902-903 - Tanja Lange:

Pairing-Based Key Exchange. 903-904 - Edlyn Teske:

Pairing-Friendly Elliptic Curves. 904-907 - Darrel Hankerson, Alfred Menezes:

Pairings. 907-909 - Palmprint Authentication. 909

- David Zhang, Feng Yue, Wangmeng Zuo:

Palmprint Recognition. 909-913 - Parallelizable Message



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID