Coverart for item
The Resource Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg

Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg

Label
Encyclopedia of cryptography and security
Title
Encyclopedia of cryptography and security
Statement of responsibility
editor-in-chief, Henk C.A. van Tilborg
Contributor
Subject
Genre
Language
eng
Summary
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification.- Block ciphers and stream ciphers.- Computational issues.- Copy protection.- Cryptanalysis and security.- Cryptographic protocols.- Electronic payment and digital certificates.- Elliptic curve cryptography.- Factorization algorithms and primality tests.- Hash functions and MACs.- Historical systems.- Identity-based cryptography.- Implementation aspects for smart cards and standards.- Key management.- Multiparty computations like voting schemes.- Public key cryptography.- Quantum cryptography.- Secret sharing schemes.- Sequences.- Web security. The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject
Member of
Cataloging source
GW5XE
Dewey number
652/.803
Illustrations
illustrations
Index
index present
Language note
English
LC call number
Z103
LC item number
.E53 2005eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
  • encyclopedias
http://library.link/vocab/relatedWorkOrContributorDate
1947-
http://library.link/vocab/relatedWorkOrContributorName
Tilborg, Henk C. A. van
http://library.link/vocab/subjectName
  • Cryptography
  • Data protection
  • Data protection
  • Cryptographie
  • Protection de l'information (Informatique)
  • Cryptografie
  • Computerbeveiliging
  • Databescherming
  • Cryptographie (Informatique)
  • Sécurité des données
  • Cryptography
  • Informatique
  • Cryptography
  • Data protection
  • Cryptografie
  • Computerbeveiliging
  • Databescherming
  • Cryptographie (Informatique)
  • Sécurité des données
  • Kryptologi
  • IT-säkerhet
Label
Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • List of Advisory Board Members -- List of Contributors -- Preface -- A -- A5/1 -- ABA DIGITAL SIGNATURE GUIDELINES -- ACCESS CONTROL -- ACCESS STRUCTURE -- ACQUIRER -- ADAPTIVE CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT ATTACK ALBERTI ENCRYPTION -- ALPHABET -- ANONYMITY -- ASYMMETRIC CRYPTOSYSTEM -- ATTRIBUTE CERTIFICATE -- ATTRIBUTES MANAGEMENT -- AUTHENTICATED ENCRYPTION -- AUTHENTICATION -- AUTHENTICATION TOKEN -- AUTHORIZATION ARCHITECTURE -- AUTHORIZATIONS MANAGEMENT
  • AUTHORIZATION POLICYAUTOCORRELATION -- AVAILABILITY -- B -- BEAUFORT ENCRYPTION -- BERLEKAMPÃ?MASSEY ALGORITHM -- BERLEKAMP Q-MATRIX -- BINARY EUCLIDEAN ALGORITHM -- BINARY EXPONENTIATION -- BINOMIAL DISTRIBUTION -- BIOMETRICS -- BIRTHDAY PARADOX -- BLIND SIGNATURE -- BLINDING TECHNIQUES -- BLOCK CIPHERS -- BLOWFISH -- BLS SHORT DIGITAL SIGNATURES -- BLUM INTEGER -- BLUMÃ?BLUMÃ?SHUB PSEUDORANDOM BIT GENERATOR -- BLUMÃ?GOLDWASSER PUBLIC KEY ENCRYPTION SYSTEM -- BOLERO.NET -- BOOLEAN FUNCTIONS -- BOOMERANG ATTACK -- BROADCAST ENCRYPTION
  • C C SAR CIPHER CAMELLIACAST -- CBC-MAC AND VARIANTS -- CCIT2-CODE -- CEPS STANDARD -- CERTIFICATE -- CERTIFICATE MANAGEMENT -- CERTIFICATE OF PRIMALITY -- CERTIFICATE REVOCATION -- CERTIFICATION AUTHORITY -- CERTIFIED MAIL -- CHAFFING AND WINNOWING -- CHALLENGEÃ?RESPONSE IDENTIFICATION -- CHAUM BLIND SIGNATURE SCHEME -- CHINESE REMAINDER THEOREM -- CHOSEN CIPHERTEXT ATTACK -- CHOSEN PLAINTEXT ATTACK -- CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- CIPHERTEXT-ONLY ATTACK -- CLAW-FREE -- CLIP SCHEME -- CLOCK-CONTROLLED GENERATOR
  • CLOSEST VECTOR PROBLEMCODEBOOK ATTACK -- COLLISION ATTACK -- COLLISION RESISTANCE -- COMBINATION GENERATOR -- COMMITMENT -- COMMON CRITERIA -- COMMUNICATION CHANNEL ANONYMITY -- COMPROMISING EMANATIONS -- COMPUTATIONAL COMPLEXITY -- CONTRACT SIGNING -- CONTROL VECTORS -- COPY PROTECTION -- CORRECTING-BLOCK ATTACK -- CORRELATION ATTACK FOR STREAM CIPHERS -- CORRELATION IMMUNE AND RESILIENT BOOLEAN FUNCTIONS -- COVERT CHANNELS -- CPS, CERTIFICATE PRACTICE STATEMENT -- CRAMERÃ?SHOUP PUBLIC KEY SYSTEM -- CREDENTIALS -- CROSS-CORRELATION
  • CRYPTANALYSISCRYPTO MACHINES -- CRYPTOLOGY -- CRYPTOSYSTEM -- CRYPTREC -- CUT-AND-CHOOSE PROTOCOL -- CYCLIC CODES -- D -- DATA ENCRYPTION STANDARD (DES) -- DATA REMANENCE -- DAVIESÃ?MEYER HASH FUNCTION -- DC NETWORK -- DEBRUIJN SEQUENCE -- DECISIONAL DIFFIEÃ? HELLMAN ASSUMPTION -- DECRYPTION EXPONENT -- DENIABLE ENCRYPTION -- DENIAL OF SERVICE -- DERIVED KEY -- DESIGNATED CONFIRMER SIGNATURE -- DES-X (OR DESX) -- DICTIONARY ATTACK (I) -- DICTIONARY ATTACK (II) -- DIFFERENTIAL CRYPTANALYSIS
Control code
209886202
Dimensions
unknown
Extent
1 online resource (x, 684 pages)
Form of item
online
Isbn
9780387234731
Lccn
2005296213
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/0-387-23483-7
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-23473-1
Specific material designation
remote
System control number
(OCoLC)209886202
Label
Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • List of Advisory Board Members -- List of Contributors -- Preface -- A -- A5/1 -- ABA DIGITAL SIGNATURE GUIDELINES -- ACCESS CONTROL -- ACCESS STRUCTURE -- ACQUIRER -- ADAPTIVE CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT ATTACK ALBERTI ENCRYPTION -- ALPHABET -- ANONYMITY -- ASYMMETRIC CRYPTOSYSTEM -- ATTRIBUTE CERTIFICATE -- ATTRIBUTES MANAGEMENT -- AUTHENTICATED ENCRYPTION -- AUTHENTICATION -- AUTHENTICATION TOKEN -- AUTHORIZATION ARCHITECTURE -- AUTHORIZATIONS MANAGEMENT
  • AUTHORIZATION POLICYAUTOCORRELATION -- AVAILABILITY -- B -- BEAUFORT ENCRYPTION -- BERLEKAMPÃ?MASSEY ALGORITHM -- BERLEKAMP Q-MATRIX -- BINARY EUCLIDEAN ALGORITHM -- BINARY EXPONENTIATION -- BINOMIAL DISTRIBUTION -- BIOMETRICS -- BIRTHDAY PARADOX -- BLIND SIGNATURE -- BLINDING TECHNIQUES -- BLOCK CIPHERS -- BLOWFISH -- BLS SHORT DIGITAL SIGNATURES -- BLUM INTEGER -- BLUMÃ?BLUMÃ?SHUB PSEUDORANDOM BIT GENERATOR -- BLUMÃ?GOLDWASSER PUBLIC KEY ENCRYPTION SYSTEM -- BOLERO.NET -- BOOLEAN FUNCTIONS -- BOOMERANG ATTACK -- BROADCAST ENCRYPTION
  • C C SAR CIPHER CAMELLIACAST -- CBC-MAC AND VARIANTS -- CCIT2-CODE -- CEPS STANDARD -- CERTIFICATE -- CERTIFICATE MANAGEMENT -- CERTIFICATE OF PRIMALITY -- CERTIFICATE REVOCATION -- CERTIFICATION AUTHORITY -- CERTIFIED MAIL -- CHAFFING AND WINNOWING -- CHALLENGEÃ?RESPONSE IDENTIFICATION -- CHAUM BLIND SIGNATURE SCHEME -- CHINESE REMAINDER THEOREM -- CHOSEN CIPHERTEXT ATTACK -- CHOSEN PLAINTEXT ATTACK -- CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- CIPHERTEXT-ONLY ATTACK -- CLAW-FREE -- CLIP SCHEME -- CLOCK-CONTROLLED GENERATOR
  • CLOSEST VECTOR PROBLEMCODEBOOK ATTACK -- COLLISION ATTACK -- COLLISION RESISTANCE -- COMBINATION GENERATOR -- COMMITMENT -- COMMON CRITERIA -- COMMUNICATION CHANNEL ANONYMITY -- COMPROMISING EMANATIONS -- COMPUTATIONAL COMPLEXITY -- CONTRACT SIGNING -- CONTROL VECTORS -- COPY PROTECTION -- CORRECTING-BLOCK ATTACK -- CORRELATION ATTACK FOR STREAM CIPHERS -- CORRELATION IMMUNE AND RESILIENT BOOLEAN FUNCTIONS -- COVERT CHANNELS -- CPS, CERTIFICATE PRACTICE STATEMENT -- CRAMERÃ?SHOUP PUBLIC KEY SYSTEM -- CREDENTIALS -- CROSS-CORRELATION
  • CRYPTANALYSISCRYPTO MACHINES -- CRYPTOLOGY -- CRYPTOSYSTEM -- CRYPTREC -- CUT-AND-CHOOSE PROTOCOL -- CYCLIC CODES -- D -- DATA ENCRYPTION STANDARD (DES) -- DATA REMANENCE -- DAVIESÃ?MEYER HASH FUNCTION -- DC NETWORK -- DEBRUIJN SEQUENCE -- DECISIONAL DIFFIEÃ? HELLMAN ASSUMPTION -- DECRYPTION EXPONENT -- DENIABLE ENCRYPTION -- DENIAL OF SERVICE -- DERIVED KEY -- DESIGNATED CONFIRMER SIGNATURE -- DES-X (OR DESX) -- DICTIONARY ATTACK (I) -- DICTIONARY ATTACK (II) -- DIFFERENTIAL CRYPTANALYSIS
Control code
209886202
Dimensions
unknown
Extent
1 online resource (x, 684 pages)
Form of item
online
Isbn
9780387234731
Lccn
2005296213
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/0-387-23483-7
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-23473-1
Specific material designation
remote
System control number
(OCoLC)209886202

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...