{"title":"Index Calculus Method","authors":"K. Nguyen","doi":"10.1007/978-1-4419-5906-5_454","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_454","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115579301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Roles in SQL","authors":"A. Campi","doi":"10.1007/978-1-4419-5906-5_685","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_685","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"107 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subexponential Time","authors":"B. Kaliski","doi":"10.1007/978-1-4419-5906-5_436","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_436","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122775063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HEC Acronym is Often Used for Hyper Elliptic Curves","authors":"T. Grandison, K. LeFevre","doi":"10.1007/978-1-4419-5906-5_1053","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1053","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Knudsen, G. Leander, F. L. Bauer, Christophe De Cannière, C. Cannière, C. Petit, J. Quisquater, B. Preneel, C. Adams, Anton Stiglic, A. Dent, R. Housley, S. Turner, M. Schunter, G. Bleumer, Mike Just, D. Naccache, H. V. Tilborg, S. Vimercati, P. Samarati, Ebru Celikel Cankaya, A. Biryukov, L. McFearin, S. De Capitani di Vimercati, B. Kaliski, C. Fontaine, Daniele Micciancio, N. Sendrier, N. Heninger, J. Mirkovic, A. Canteaut, C. Crépeau, T. Caddy, P. Salvaneschi, Markus G. Kuhn, S. Vadhan, I. Shparlinski, Xiaofeng Wang, GüntherPernul Dr., Moritz Riesner, M. Vauclair, A. Rosenthal, E. Sciore, M. Soete, Michael T. Hunter, C. Carlet, F. Cuppens, N. Cuppens-Boulahia, Y. Desmedt, T. Pedersen, M. Locasto, D. Boneh, Adam J. Lee, E. Kirda, T. Helleseth, David accache, H. Imai, A. Yamagishi, M. Videau, P. Charpin
{"title":"Credential Verification","authors":"L. Knudsen, G. Leander, F. L. Bauer, Christophe De Cannière, C. Cannière, C. Petit, J. Quisquater, B. Preneel, C. Adams, Anton Stiglic, A. Dent, R. Housley, S. Turner, M. Schunter, G. Bleumer, Mike Just, D. Naccache, H. V. Tilborg, S. Vimercati, P. Samarati, Ebru Celikel Cankaya, A. Biryukov, L. McFearin, S. De Capitani di Vimercati, B. Kaliski, C. Fontaine, Daniele Micciancio, N. Sendrier, N. Heninger, J. Mirkovic, A. Canteaut, C. Crépeau, T. Caddy, P. Salvaneschi, Markus G. Kuhn, S. Vadhan, I. Shparlinski, Xiaofeng Wang, GüntherPernul Dr., Moritz Riesner, M. Vauclair, A. Rosenthal, E. Sciore, M. Soete, Michael T. Hunter, C. Carlet, F. Cuppens, N. Cuppens-Boulahia, Y. Desmedt, T. Pedersen, M. Locasto, D. Boneh, Adam J. Lee, E. Kirda, T. Helleseth, David accache, H. Imai, A. Yamagishi, M. Videau, P. Charpin","doi":"10.1007/978-1-4419-5906-5_1300","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1300","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Multiparty Computation (SMC)","authors":"Keith B. Frikken","doi":"10.1007/978-1-4419-5906-5_766","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_766","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinearity of Boolean Functions","authors":"C. Carlet","doi":"10.1007/0-387-23483-7_275","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_275","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Euclidean Lattice","authors":"","doi":"10.1007/978-1-4419-5906-5_1152","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1152","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PKI Trust Relationships","authors":"","doi":"10.1007/978-1-4419-5906-5_1407","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1407","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114462839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}