Encyclopedia of Cryptography and Security最新文献

筛选
英文 中文
Camellia 山茶花
Encyclopedia of Cryptography and Security Pub Date : 2022-01-07 DOI: 10.1007/978-1-4419-5906-5_553
C. Cannière
{"title":"Camellia","authors":"C. Cannière","doi":"10.1007/978-1-4419-5906-5_553","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_553","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Quadratic Residue 二次剩余
Encyclopedia of Cryptography and Security Pub Date : 2021-07-23 DOI: 10.1007/0-387-23483-7_335
B. Kaliski
{"title":"Quadratic Residue","authors":"B. Kaliski","doi":"10.1007/0-387-23483-7_335","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_335","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115331736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fingerprint Authentication 指纹身份验证
Encyclopedia of Cryptography and Security Pub Date : 2021-06-30 DOI: 10.1007/978-1-4419-5906-5_1305
J. Rajasingh, D. Yaswanth
{"title":"Fingerprint Authentication","authors":"J. Rajasingh, D. Yaswanth","doi":"10.1007/978-1-4419-5906-5_1305","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1305","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122548302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tamper Resistance 抗干扰
Encyclopedia of Cryptography and Security Pub Date : 2020-12-02 DOI: 10.1007/0-387-23483-7_425
T. Caddy
{"title":"Tamper Resistance","authors":"T. Caddy","doi":"10.1007/0-387-23483-7_425","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_425","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sieving 筛分
Encyclopedia of Cryptography and Security Pub Date : 2020-04-18 DOI: 10.1007/978-1-4419-5906-5_435
Burton S. Kaliski
{"title":"Sieving","authors":"Burton S. Kaliski","doi":"10.1007/978-1-4419-5906-5_435","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_435","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123748651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Acm Acm
Encyclopedia of Cryptography and Security Pub Date : 2020-04-16 DOI: 10.1007/978-1-4419-5906-5_1299
Lidia Arroyo Prieto
{"title":"Acm","authors":"Lidia Arroyo Prieto","doi":"10.1007/978-1-4419-5906-5_1299","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1299","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Aes Aes
Encyclopedia of Cryptography and Security Pub Date : 2020-04-16 DOI: 10.1007/978-1-4419-5906-5_1207
Dirk O. Gelderblom
{"title":"Aes","authors":"Dirk O. Gelderblom","doi":"10.1007/978-1-4419-5906-5_1207","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1207","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114826552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Token 令牌
Encyclopedia of Cryptography and Security Pub Date : 2020-02-07 DOI: 10.1007/0-387-23483-7_433
P. Landrock
{"title":"Token","authors":"P. Landrock","doi":"10.1007/0-387-23483-7_433","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_433","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116957564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Share 分享
Encyclopedia of Cryptography and Security Pub Date : 2020-02-07 DOI: 10.1007/978-1-4419-5906-5_391
G. R. Blakley, G. Kabatiansky
{"title":"Share","authors":"G. R. Blakley, G. Kabatiansky","doi":"10.1007/978-1-4419-5906-5_391","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_391","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122029111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Password 密码
Encyclopedia of Cryptography and Security Pub Date : 2020-02-07 DOI: 10.1007/0-387-23483-7_294
Gerald Brose
{"title":"Password","authors":"Gerald Brose","doi":"10.1007/0-387-23483-7_294","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_294","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124762144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信