{"title":"Elliptic Curve Cryptography","authors":"D. Hankerson, Alfred Menezes","doi":"10.1007/978-1-4419-5906-5_245","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_245","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125319809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authorization","authors":"J. Stapleton","doi":"10.1007/978-1-4419-5906-5_1025","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1025","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monotone Signatures","authors":"D. Naccache","doi":"10.1007/978-1-4419-5906-5_892","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_892","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125043101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadcast Encryption","authors":"D. Naor","doi":"10.1007/0-387-23483-7_42","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_42","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maurer's Method","authors":"Moses D. Liskov","doi":"10.1007/978-1-4419-5906-5_460","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_460","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Station-to-Station Protocol","authors":"Y. Desmedt","doi":"10.1007/0-387-23483-7_411","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_411","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115005869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stream and Multicast Authentication","authors":"Y. Desmedt, G. Jakimoski","doi":"10.1007/978-1-4419-5906-5_329","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_329","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Product Cipher, Superencryption","authors":"A. Biryukov","doi":"10.1007/978-1-4419-5906-5_606","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_606","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123090072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strong RSA Assumption","authors":"D. Boneh","doi":"10.1007/978-1-4419-5906-5_157","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_157","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ElGamal Encryption","authors":"","doi":"10.1007/978-1-4419-5906-5_1091","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1091","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"675 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}