{"title":"Vigenère Encryption","authors":"F. L. Bauer","doi":"10.1007/978-1-4419-5906-5_178","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_178","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116286065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Flow and Noninterference","authors":"H. Mantel","doi":"10.1007/978-1-4419-5906-5_874","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_874","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116492072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fixed-Exponent Exponentiation","authors":"A. Weimerskirch","doi":"10.1007/978-1-4419-5906-5_30","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_30","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121502422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Capabilities","authors":"Xiaowei Yang","doi":"10.1007/978-1-4419-5906-5_272","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_272","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124519362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity-Based Encryption","authors":"Martin Gagné","doi":"10.1007/978-1-4419-5906-5_148","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_148","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124070486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Galois Counter Mode","authors":"D. McGrew","doi":"10.1007/978-1-4419-5906-5_451","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_451","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Biryukov, Christophe De Cannière, W. Winkler, C. Aggarwal, Markus G. Kuhn, Luc Bouganim, Yanli Guo, Bart Preneel, G. Bleumer, T. Helleseth, Ran Canetti, Mayank Varia, Christiane Peters, Burt Kaliski, Y. Desmedt, G. Kesidis, Marijke De Soete, Berry Schoenmakers, Carlisle M. Adams, Eli Biham, T. Caddy, Cynthia Dwork, Mike Just, M. Finiasz, N. Sendrier, Kazue Sako, P. Gaborit, D. Boneh, C. Cachin, Dan Gordon, Ninghui Li, S. Vimercati, M. Videau, S. Yanushkevich, D. Popel, Brent Byung Hoon Kang, John Ioannidis, Mihai Christodorescu, Vinod Ganapathy, Anurag Srivastava, Sean W. Smith
{"title":"Diffie-Hellman Key Exchange","authors":"A. Biryukov, Christophe De Cannière, W. Winkler, C. Aggarwal, Markus G. Kuhn, Luc Bouganim, Yanli Guo, Bart Preneel, G. Bleumer, T. Helleseth, Ran Canetti, Mayank Varia, Christiane Peters, Burt Kaliski, Y. Desmedt, G. Kesidis, Marijke De Soete, Berry Schoenmakers, Carlisle M. Adams, Eli Biham, T. Caddy, Cynthia Dwork, Mike Just, M. Finiasz, N. Sendrier, Kazue Sako, P. Gaborit, D. Boneh, C. Cachin, Dan Gordon, Ninghui Li, S. Vimercati, M. Videau, S. Yanushkevich, D. Popel, Brent Byung Hoon Kang, John Ioannidis, Mihai Christodorescu, Vinod Ganapathy, Anurag Srivastava, Sean W. Smith","doi":"10.1007/978-1-4419-5906-5_1293","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1293","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"116 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126382426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"k-Anonymity","authors":"Pierangela Samarati","doi":"10.1007/978-1-4419-5906-5_754","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_754","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126412266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Shell","authors":"J. Grimm","doi":"10.1007/978-1-4419-5906-5_1089","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1089","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126538476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}