C. Adams, M. Stephens, E. Gabidulin, D. Boneh, Mike Just, C. Ardagna, E. Damiani, C. Fontaine, P. England, Ali Bagherzandi, B. Hore, S. Mehrotra, B. Preneel, Laurent Bussard, G. R. Blakley, G. Kabatiansky, Gerardo Pelosi, Sangwon Hyun, P. Ning, Sean Smith, Wensheng Zhang, R. Sion, Ming Li, W. Lou, Kui Ren, M. Vauclair, Donggang Liu, Keith B. Frikken, C. Nita-Rotaru, Reza Curtmola, Jing Dong, Qijun Gu, C. Heinrich, Kun Sun, Panos Papadimitratos, Jean-Pierre Hubaux, F. L. Bauer, Marijke DeSoete, T. Caddy, Sachiko Yoshihama, T. Oh, Shinyoung Lim, Young-Bok Choi, J. Ryoo, Jung-Min “Jerry” Park, Ka Bian, Srdjan Capkun, Mehdi Tibouchi, R. Housley, G. Bleumer, Caroline Fontain, Kazue Sako, Yi Yang, Sencun Zhu, Ms. Yi Yang, Marijke De Soete, Mary Ellen Zurko, Richard T. Simon, T. Helleseth, Christophe De Cannière, Martin Johns, H. Handschuh, H. van Tilborg, D. Micciancio, M. Joye, Francis Olivier, B. Kaliski, Emmanuel Thomé, Berry Schoenmakers, P. Campisi, E. Maiorana, A. Neri, Y. Dodis, Bodo Möller, A. Biryukov,
{"title":"Stack (Buffer) Overflow","authors":"C. Adams, M. Stephens, E. Gabidulin, D. Boneh, Mike Just, C. Ardagna, E. Damiani, C. Fontaine, P. England, Ali Bagherzandi, B. Hore, S. Mehrotra, B. Preneel, Laurent Bussard, G. R. Blakley, G. Kabatiansky, Gerardo Pelosi, Sangwon Hyun, P. Ning, Sean Smith, Wensheng Zhang, R. Sion, Ming Li, W. Lou, Kui Ren, M. Vauclair, Donggang Liu, Keith B. Frikken, C. Nita-Rotaru, Reza Curtmola, Jing Dong, Qijun Gu, C. Heinrich, Kun Sun, Panos Papadimitratos, Jean-Pierre Hubaux, F. L. Bauer, Marijke DeSoete, T. Caddy, Sachiko Yoshihama, T. Oh, Shinyoung Lim, Young-Bok Choi, J. Ryoo, Jung-Min “Jerry” Park, Ka Bian, Srdjan Capkun, Mehdi Tibouchi, R. Housley, G. Bleumer, Caroline Fontain, Kazue Sako, Yi Yang, Sencun Zhu, Ms. Yi Yang, Marijke De Soete, Mary Ellen Zurko, Richard T. Simon, T. Helleseth, Christophe De Cannière, Martin Johns, H. Handschuh, H. van Tilborg, D. Micciancio, M. Joye, Francis Olivier, B. Kaliski, Emmanuel Thomé, Berry Schoenmakers, P. Campisi, E. Maiorana, A. Neri, Y. Dodis, Bodo Möller, A. Biryukov,","doi":"10.1007/978-1-4419-5906-5_1172","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1172","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128674322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Signature Scheme Based on McEliece","authors":"M. Finiasz, N. Sendrier","doi":"10.1007/978-1-4419-5906-5_380","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_380","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128986841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unpacking Malware","authors":"Brent Byunghoon Kang, G. Sinclair","doi":"10.1007/978-1-4419-5906-5_851","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_851","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pairing-Friendly Elliptic Curves","authors":"Edlyn Teske","doi":"10.1007/978-1-4419-5906-5_256","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_256","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Pointcheval, D. Boneh, J. Quisquater, David Samyde, Gerald Brose, M. Bucci, T. Caddy, G. Bleumer, E. Gabidulin, C. Fontaine, H. Handschuh, P. Samarati, P. Charpin, Trent Jaeger, A.Yu. Biryukov, B. Kaliski, Y. Desmedt, Carlisle M. Adams, M. Polychronakis, David Naccache, Gildas Avoine, Bodo Möller, J. Daemen, V. Rijmen, A. Bosselaers, V. Alturi, D. Ferraiolo, A. Campi, W. Casper, S. Papa, Padmaraj M. V. Nair, Ronald L. Rivest, T. Helleseth, A. Canteaut
{"title":"Record Linkage","authors":"D. Pointcheval, D. Boneh, J. Quisquater, David Samyde, Gerald Brose, M. Bucci, T. Caddy, G. Bleumer, E. Gabidulin, C. Fontaine, H. Handschuh, P. Samarati, P. Charpin, Trent Jaeger, A.Yu. Biryukov, B. Kaliski, Y. Desmedt, Carlisle M. Adams, M. Polychronakis, David Naccache, Gildas Avoine, Bodo Möller, J. Daemen, V. Rijmen, A. Bosselaers, V. Alturi, D. Ferraiolo, A. Campi, W. Casper, S. Papa, Padmaraj M. V. Nair, Ronald L. Rivest, T. Helleseth, A. Canteaut","doi":"10.1007/978-1-4419-5906-5_1281","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1281","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iceman Attack","authors":"","doi":"10.1007/978-1-4419-5906-5_1015","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1015","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130367880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blum Integer","authors":"Burton S. Kaliski","doi":"10.1007/978-1-4419-5906-5_397","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_397","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130535337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Enhanced Languages","authors":"","doi":"10.1007/978-1-4419-5906-5_1381","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1381","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"1984 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strong Exclusion","authors":"","doi":"10.1007/978-1-4419-5906-5_1346","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1346","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}