{"title":"Physical Security","authors":"François-Xavier Standaert, J. Quisquater","doi":"10.1007/978-1-4419-5906-5_130","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_130","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overspending Prevention","authors":"G. Bleumer","doi":"10.1007/0-387-23483-7_292","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_292","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123836200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Montgomery Arithmetic","authors":"Ç. Koç, C. D. Walter","doi":"10.1007/0-387-23483-7_263","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_263","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123927850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic Public-Key Encryption","authors":"Kazue Sako","doi":"10.1007/978-1-4419-5906-5_21","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_21","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123936810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic Primality Test","authors":"Anton Stiglic","doi":"10.1007/978-1-4419-5906-5_472","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_472","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124213871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack by Summation Over an Hypercube","authors":"","doi":"10.1007/978-1-4419-5906-5_1103","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1103","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123218243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Point Counting","authors":"P. Gaudry","doi":"10.1007/978-1-4419-5906-5_257","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_257","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-Factor Authentication","authors":"Saeed Abu-Nimeh","doi":"10.1007/978-1-4419-5906-5_793","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_793","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"33 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ciphertext-Only Attack","authors":"A. Biryukov","doi":"10.1007/0-387-23483-7_62","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_62","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}