Encyclopedia of Cryptography and Security最新文献

筛选
英文 中文
Elliptic Curve Cryptography 椭圆曲线密码
Encyclopedia of Cryptography and Security Pub Date : 2006-05-18 DOI: 10.1007/978-1-4419-5906-5_245
D. Hankerson, Alfred Menezes
{"title":"Elliptic Curve Cryptography","authors":"D. Hankerson, Alfred Menezes","doi":"10.1007/978-1-4419-5906-5_245","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_245","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125319809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authorization 授权
Encyclopedia of Cryptography and Security Pub Date : 2004-01-01 DOI: 10.1007/978-1-4419-5906-5_1025
J. Stapleton
{"title":"Authorization","authors":"J. Stapleton","doi":"10.1007/978-1-4419-5906-5_1025","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1025","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Monotone Signatures 单调的签名
Encyclopedia of Cryptography and Security Pub Date : 2002-02-19 DOI: 10.1007/978-1-4419-5906-5_892
D. Naccache
{"title":"Monotone Signatures","authors":"D. Naccache","doi":"10.1007/978-1-4419-5906-5_892","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_892","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125043101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Broadcast Encryption 广播加密
Encyclopedia of Cryptography and Security Pub Date : 1993-08-22 DOI: 10.1007/0-387-23483-7_42
D. Naor
{"title":"Broadcast Encryption","authors":"D. Naor","doi":"10.1007/0-387-23483-7_42","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_42","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 418
Maurer's Method 毛雷尔的方法
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_460
Moses D. Liskov
{"title":"Maurer's Method","authors":"Moses D. Liskov","doi":"10.1007/978-1-4419-5906-5_460","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_460","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Station-to-Station Protocol 叫号电话的协议
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/0-387-23483-7_411
Y. Desmedt
{"title":"Station-to-Station Protocol","authors":"Y. Desmedt","doi":"10.1007/0-387-23483-7_411","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_411","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115005869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stream and Multicast Authentication 流和组播认证
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_329
Y. Desmedt, G. Jakimoski
{"title":"Stream and Multicast Authentication","authors":"Y. Desmedt, G. Jakimoski","doi":"10.1007/978-1-4419-5906-5_329","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_329","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product Cipher, Superencryption 产品密码,超级加密
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_606
A. Biryukov
{"title":"Product Cipher, Superencryption","authors":"A. Biryukov","doi":"10.1007/978-1-4419-5906-5_606","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_606","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123090072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Strong RSA Assumption 强RSA假设
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_157
D. Boneh
{"title":"Strong RSA Assumption","authors":"D. Boneh","doi":"10.1007/978-1-4419-5906-5_157","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_157","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ElGamal Encryption
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_1091
{"title":"ElGamal Encryption","authors":"","doi":"10.1007/978-1-4419-5906-5_1091","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1091","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"675 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信