Encyclopedia of Cryptography and Security最新文献

筛选
英文 中文
Physical Security 物理安全
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_130
François-Xavier Standaert, J. Quisquater
{"title":"Physical Security","authors":"François-Xavier Standaert, J. Quisquater","doi":"10.1007/978-1-4419-5906-5_130","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_130","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overspending Prevention 预防超支
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/0-387-23483-7_292
G. Bleumer
{"title":"Overspending Prevention","authors":"G. Bleumer","doi":"10.1007/0-387-23483-7_292","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_292","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123836200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice Basis Reduction 格基约简
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_1154
Leanne Lm Scheepers
{"title":"Lattice Basis Reduction","authors":"Leanne Lm Scheepers","doi":"10.1007/978-1-4419-5906-5_1154","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1154","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123887261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Montgomery Arithmetic 蒙哥马利算法
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/0-387-23483-7_263
Ç. Koç, C. D. Walter
{"title":"Montgomery Arithmetic","authors":"Ç. Koç, C. D. Walter","doi":"10.1007/0-387-23483-7_263","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_263","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123927850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Probabilistic Public-Key Encryption 概率公钥加密
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_21
Kazue Sako
{"title":"Probabilistic Public-Key Encryption","authors":"Kazue Sako","doi":"10.1007/978-1-4419-5906-5_21","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_21","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123936810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Probabilistic Primality Test 概率原性检验
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_472
Anton Stiglic
{"title":"Probabilistic Primality Test","authors":"Anton Stiglic","doi":"10.1007/978-1-4419-5906-5_472","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_472","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124213871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack by Summation Over an Hypercube 超立方体上的求和攻击
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_1103
{"title":"Attack by Summation Over an Hypercube","authors":"","doi":"10.1007/978-1-4419-5906-5_1103","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1103","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123218243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Point Counting 点估算
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_257
P. Gaudry
{"title":"Point Counting","authors":"P. Gaudry","doi":"10.1007/978-1-4419-5906-5_257","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_257","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
Three-Factor Authentication 三因子认证
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4419-5906-5_793
Saeed Abu-Nimeh
{"title":"Three-Factor Authentication","authors":"Saeed Abu-Nimeh","doi":"10.1007/978-1-4419-5906-5_793","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_793","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"33 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ciphertext-Only Attack Ciphertext-Only攻击
Encyclopedia of Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1007/0-387-23483-7_62
A. Biryukov
{"title":"Ciphertext-Only Attack","authors":"A. Biryukov","doi":"10.1007/0-387-23483-7_62","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_62","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信