The Resource Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg
Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg
Resource Information
The item Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification.- Block ciphers and stream ciphers.- Computational issues.- Copy protection.- Cryptanalysis and security.- Cryptographic protocols.- Electronic payment and digital certificates.- Elliptic curve cryptography.- Factorization algorithms and primality tests.- Hash functions and MACs.- Historical systems.- Identity-based cryptography.- Implementation aspects for smart cards and standards.- Key management.- Multiparty computations like voting schemes.- Public key cryptography.- Quantum cryptography.- Secret sharing schemes.- Sequences.- Web security. The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject
- Language
- eng
- Extent
- 1 online resource (x, 684 pages)
- Contents
-
- List of Advisory Board Members -- List of Contributors -- Preface -- A -- A5/1 -- ABA DIGITAL SIGNATURE GUIDELINES -- ACCESS CONTROL -- ACCESS STRUCTURE -- ACQUIRER -- ADAPTIVE CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT ATTACK ALBERTI ENCRYPTION -- ALPHABET -- ANONYMITY -- ASYMMETRIC CRYPTOSYSTEM -- ATTRIBUTE CERTIFICATE -- ATTRIBUTES MANAGEMENT -- AUTHENTICATED ENCRYPTION -- AUTHENTICATION -- AUTHENTICATION TOKEN -- AUTHORIZATION ARCHITECTURE -- AUTHORIZATIONS MANAGEMENT
- AUTHORIZATION POLICYAUTOCORRELATION -- AVAILABILITY -- B -- BEAUFORT ENCRYPTION -- BERLEKAMPÃ?MASSEY ALGORITHM -- BERLEKAMP Q-MATRIX -- BINARY EUCLIDEAN ALGORITHM -- BINARY EXPONENTIATION -- BINOMIAL DISTRIBUTION -- BIOMETRICS -- BIRTHDAY PARADOX -- BLIND SIGNATURE -- BLINDING TECHNIQUES -- BLOCK CIPHERS -- BLOWFISH -- BLS SHORT DIGITAL SIGNATURES -- BLUM INTEGER -- BLUMÃ?BLUMÃ?SHUB PSEUDORANDOM BIT GENERATOR -- BLUMÃ?GOLDWASSER PUBLIC KEY ENCRYPTION SYSTEM -- BOLERO.NET -- BOOLEAN FUNCTIONS -- BOOMERANG ATTACK -- BROADCAST ENCRYPTION
- C C SAR CIPHER CAMELLIACAST -- CBC-MAC AND VARIANTS -- CCIT2-CODE -- CEPS STANDARD -- CERTIFICATE -- CERTIFICATE MANAGEMENT -- CERTIFICATE OF PRIMALITY -- CERTIFICATE REVOCATION -- CERTIFICATION AUTHORITY -- CERTIFIED MAIL -- CHAFFING AND WINNOWING -- CHALLENGEÃ?RESPONSE IDENTIFICATION -- CHAUM BLIND SIGNATURE SCHEME -- CHINESE REMAINDER THEOREM -- CHOSEN CIPHERTEXT ATTACK -- CHOSEN PLAINTEXT ATTACK -- CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- CIPHERTEXT-ONLY ATTACK -- CLAW-FREE -- CLIP SCHEME -- CLOCK-CONTROLLED GENERATOR
- CLOSEST VECTOR PROBLEMCODEBOOK ATTACK -- COLLISION ATTACK -- COLLISION RESISTANCE -- COMBINATION GENERATOR -- COMMITMENT -- COMMON CRITERIA -- COMMUNICATION CHANNEL ANONYMITY -- COMPROMISING EMANATIONS -- COMPUTATIONAL COMPLEXITY -- CONTRACT SIGNING -- CONTROL VECTORS -- COPY PROTECTION -- CORRECTING-BLOCK ATTACK -- CORRELATION ATTACK FOR STREAM CIPHERS -- CORRELATION IMMUNE AND RESILIENT BOOLEAN FUNCTIONS -- COVERT CHANNELS -- CPS, CERTIFICATE PRACTICE STATEMENT -- CRAMERÃ?SHOUP PUBLIC KEY SYSTEM -- CREDENTIALS -- CROSS-CORRELATION
- CRYPTANALYSISCRYPTO MACHINES -- CRYPTOLOGY -- CRYPTOSYSTEM -- CRYPTREC -- CUT-AND-CHOOSE PROTOCOL -- CYCLIC CODES -- D -- DATA ENCRYPTION STANDARD (DES) -- DATA REMANENCE -- DAVIESÃ?MEYER HASH FUNCTION -- DC NETWORK -- DEBRUIJN SEQUENCE -- DECISIONAL DIFFIEÃ? HELLMAN ASSUMPTION -- DECRYPTION EXPONENT -- DENIABLE ENCRYPTION -- DENIAL OF SERVICE -- DERIVED KEY -- DESIGNATED CONFIRMER SIGNATURE -- DES-X (OR DESX) -- DICTIONARY ATTACK (I) -- DICTIONARY ATTACK (II) -- DIFFERENTIAL CRYPTANALYSIS
- Isbn
- 9780387234731
- Label
- Encyclopedia of cryptography and security
- Title
- Encyclopedia of cryptography and security
- Statement of responsibility
- editor-in-chief, Henk C.A. van Tilborg
- Subject
-
- Computerbeveiliging
- Computerbeveiliging
- Cryptografie
- Cryptografie
- Cryptographie
- Cryptographie (Informatique)
- Cryptographie (Informatique)
- Cryptography
- Cryptography
- Cryptography
- Cryptography -- Encyclopedias
- Data protection
- Data protection
- Data protection
- Data protection -- Encyclopedias
- Databescherming
- Databescherming
- Encyclopedias
- Encyclopedias
- IT-säkerhet -- uppslagsverk
- Informatique
- Kryptologi -- uppslagsverk
- Protection de l'information (Informatique)
- Sécurité des données
- Sécurité des données
- Language
- eng
- Summary
- This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification.- Block ciphers and stream ciphers.- Computational issues.- Copy protection.- Cryptanalysis and security.- Cryptographic protocols.- Electronic payment and digital certificates.- Elliptic curve cryptography.- Factorization algorithms and primality tests.- Hash functions and MACs.- Historical systems.- Identity-based cryptography.- Implementation aspects for smart cards and standards.- Key management.- Multiparty computations like voting schemes.- Public key cryptography.- Quantum cryptography.- Secret sharing schemes.- Sequences.- Web security. The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject
- Cataloging source
- GW5XE
- Dewey number
- 652/.803
- Illustrations
- illustrations
- Index
- index present
- Language note
- English
- LC call number
- Z103
- LC item number
- .E53 2005eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- encyclopedias
- http://library.link/vocab/relatedWorkOrContributorDate
- 1947-
- http://library.link/vocab/relatedWorkOrContributorName
- Tilborg, Henk C. A. van
- http://library.link/vocab/subjectName
-
- Cryptography
- Data protection
- Data protection
- Cryptographie
- Protection de l'information (Informatique)
- Cryptografie
- Computerbeveiliging
- Databescherming
- Cryptographie (Informatique)
- Sécurité des données
- Cryptography
- Informatique
- Cryptography
- Data protection
- Cryptografie
- Computerbeveiliging
- Databescherming
- Cryptographie (Informatique)
- Sécurité des données
- Kryptologi
- IT-säkerhet
- Label
- Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- List of Advisory Board Members -- List of Contributors -- Preface -- A -- A5/1 -- ABA DIGITAL SIGNATURE GUIDELINES -- ACCESS CONTROL -- ACCESS STRUCTURE -- ACQUIRER -- ADAPTIVE CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT ATTACK ALBERTI ENCRYPTION -- ALPHABET -- ANONYMITY -- ASYMMETRIC CRYPTOSYSTEM -- ATTRIBUTE CERTIFICATE -- ATTRIBUTES MANAGEMENT -- AUTHENTICATED ENCRYPTION -- AUTHENTICATION -- AUTHENTICATION TOKEN -- AUTHORIZATION ARCHITECTURE -- AUTHORIZATIONS MANAGEMENT
- AUTHORIZATION POLICYAUTOCORRELATION -- AVAILABILITY -- B -- BEAUFORT ENCRYPTION -- BERLEKAMPÃ?MASSEY ALGORITHM -- BERLEKAMP Q-MATRIX -- BINARY EUCLIDEAN ALGORITHM -- BINARY EXPONENTIATION -- BINOMIAL DISTRIBUTION -- BIOMETRICS -- BIRTHDAY PARADOX -- BLIND SIGNATURE -- BLINDING TECHNIQUES -- BLOCK CIPHERS -- BLOWFISH -- BLS SHORT DIGITAL SIGNATURES -- BLUM INTEGER -- BLUMÃ?BLUMÃ?SHUB PSEUDORANDOM BIT GENERATOR -- BLUMÃ?GOLDWASSER PUBLIC KEY ENCRYPTION SYSTEM -- BOLERO.NET -- BOOLEAN FUNCTIONS -- BOOMERANG ATTACK -- BROADCAST ENCRYPTION
- C C SAR CIPHER CAMELLIACAST -- CBC-MAC AND VARIANTS -- CCIT2-CODE -- CEPS STANDARD -- CERTIFICATE -- CERTIFICATE MANAGEMENT -- CERTIFICATE OF PRIMALITY -- CERTIFICATE REVOCATION -- CERTIFICATION AUTHORITY -- CERTIFIED MAIL -- CHAFFING AND WINNOWING -- CHALLENGEÃ?RESPONSE IDENTIFICATION -- CHAUM BLIND SIGNATURE SCHEME -- CHINESE REMAINDER THEOREM -- CHOSEN CIPHERTEXT ATTACK -- CHOSEN PLAINTEXT ATTACK -- CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- CIPHERTEXT-ONLY ATTACK -- CLAW-FREE -- CLIP SCHEME -- CLOCK-CONTROLLED GENERATOR
- CLOSEST VECTOR PROBLEMCODEBOOK ATTACK -- COLLISION ATTACK -- COLLISION RESISTANCE -- COMBINATION GENERATOR -- COMMITMENT -- COMMON CRITERIA -- COMMUNICATION CHANNEL ANONYMITY -- COMPROMISING EMANATIONS -- COMPUTATIONAL COMPLEXITY -- CONTRACT SIGNING -- CONTROL VECTORS -- COPY PROTECTION -- CORRECTING-BLOCK ATTACK -- CORRELATION ATTACK FOR STREAM CIPHERS -- CORRELATION IMMUNE AND RESILIENT BOOLEAN FUNCTIONS -- COVERT CHANNELS -- CPS, CERTIFICATE PRACTICE STATEMENT -- CRAMERÃ?SHOUP PUBLIC KEY SYSTEM -- CREDENTIALS -- CROSS-CORRELATION
- CRYPTANALYSISCRYPTO MACHINES -- CRYPTOLOGY -- CRYPTOSYSTEM -- CRYPTREC -- CUT-AND-CHOOSE PROTOCOL -- CYCLIC CODES -- D -- DATA ENCRYPTION STANDARD (DES) -- DATA REMANENCE -- DAVIESÃ?MEYER HASH FUNCTION -- DC NETWORK -- DEBRUIJN SEQUENCE -- DECISIONAL DIFFIEÃ? HELLMAN ASSUMPTION -- DECRYPTION EXPONENT -- DENIABLE ENCRYPTION -- DENIAL OF SERVICE -- DERIVED KEY -- DESIGNATED CONFIRMER SIGNATURE -- DES-X (OR DESX) -- DICTIONARY ATTACK (I) -- DICTIONARY ATTACK (II) -- DIFFERENTIAL CRYPTANALYSIS
- Control code
- 209886202
- Dimensions
- unknown
- Extent
- 1 online resource (x, 684 pages)
- Form of item
- online
- Isbn
- 9780387234731
- Lccn
- 2005296213
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/0-387-23483-7
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-0-387-23473-1
- Specific material designation
- remote
- System control number
- (OCoLC)209886202
- Label
- Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- List of Advisory Board Members -- List of Contributors -- Preface -- A -- A5/1 -- ABA DIGITAL SIGNATURE GUIDELINES -- ACCESS CONTROL -- ACCESS STRUCTURE -- ACQUIRER -- ADAPTIVE CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- ADAPTIVE CHOSEN PLAINTEXT ATTACK ALBERTI ENCRYPTION -- ALPHABET -- ANONYMITY -- ASYMMETRIC CRYPTOSYSTEM -- ATTRIBUTE CERTIFICATE -- ATTRIBUTES MANAGEMENT -- AUTHENTICATED ENCRYPTION -- AUTHENTICATION -- AUTHENTICATION TOKEN -- AUTHORIZATION ARCHITECTURE -- AUTHORIZATIONS MANAGEMENT
- AUTHORIZATION POLICYAUTOCORRELATION -- AVAILABILITY -- B -- BEAUFORT ENCRYPTION -- BERLEKAMPÃ?MASSEY ALGORITHM -- BERLEKAMP Q-MATRIX -- BINARY EUCLIDEAN ALGORITHM -- BINARY EXPONENTIATION -- BINOMIAL DISTRIBUTION -- BIOMETRICS -- BIRTHDAY PARADOX -- BLIND SIGNATURE -- BLINDING TECHNIQUES -- BLOCK CIPHERS -- BLOWFISH -- BLS SHORT DIGITAL SIGNATURES -- BLUM INTEGER -- BLUMÃ?BLUMÃ?SHUB PSEUDORANDOM BIT GENERATOR -- BLUMÃ?GOLDWASSER PUBLIC KEY ENCRYPTION SYSTEM -- BOLERO.NET -- BOOLEAN FUNCTIONS -- BOOMERANG ATTACK -- BROADCAST ENCRYPTION
- C C SAR CIPHER CAMELLIACAST -- CBC-MAC AND VARIANTS -- CCIT2-CODE -- CEPS STANDARD -- CERTIFICATE -- CERTIFICATE MANAGEMENT -- CERTIFICATE OF PRIMALITY -- CERTIFICATE REVOCATION -- CERTIFICATION AUTHORITY -- CERTIFIED MAIL -- CHAFFING AND WINNOWING -- CHALLENGEÃ?RESPONSE IDENTIFICATION -- CHAUM BLIND SIGNATURE SCHEME -- CHINESE REMAINDER THEOREM -- CHOSEN CIPHERTEXT ATTACK -- CHOSEN PLAINTEXT ATTACK -- CHOSEN PLAINTEXT AND CHOSEN CIPHERTEXT ATTACK -- CIPHERTEXT-ONLY ATTACK -- CLAW-FREE -- CLIP SCHEME -- CLOCK-CONTROLLED GENERATOR
- CLOSEST VECTOR PROBLEMCODEBOOK ATTACK -- COLLISION ATTACK -- COLLISION RESISTANCE -- COMBINATION GENERATOR -- COMMITMENT -- COMMON CRITERIA -- COMMUNICATION CHANNEL ANONYMITY -- COMPROMISING EMANATIONS -- COMPUTATIONAL COMPLEXITY -- CONTRACT SIGNING -- CONTROL VECTORS -- COPY PROTECTION -- CORRECTING-BLOCK ATTACK -- CORRELATION ATTACK FOR STREAM CIPHERS -- CORRELATION IMMUNE AND RESILIENT BOOLEAN FUNCTIONS -- COVERT CHANNELS -- CPS, CERTIFICATE PRACTICE STATEMENT -- CRAMERÃ?SHOUP PUBLIC KEY SYSTEM -- CREDENTIALS -- CROSS-CORRELATION
- CRYPTANALYSISCRYPTO MACHINES -- CRYPTOLOGY -- CRYPTOSYSTEM -- CRYPTREC -- CUT-AND-CHOOSE PROTOCOL -- CYCLIC CODES -- D -- DATA ENCRYPTION STANDARD (DES) -- DATA REMANENCE -- DAVIESÃ?MEYER HASH FUNCTION -- DC NETWORK -- DEBRUIJN SEQUENCE -- DECISIONAL DIFFIEÃ? HELLMAN ASSUMPTION -- DECRYPTION EXPONENT -- DENIABLE ENCRYPTION -- DENIAL OF SERVICE -- DERIVED KEY -- DESIGNATED CONFIRMER SIGNATURE -- DES-X (OR DESX) -- DICTIONARY ATTACK (I) -- DICTIONARY ATTACK (II) -- DIFFERENTIAL CRYPTANALYSIS
- Control code
- 209886202
- Dimensions
- unknown
- Extent
- 1 online resource (x, 684 pages)
- Form of item
- online
- Isbn
- 9780387234731
- Lccn
- 2005296213
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/0-387-23483-7
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-0-387-23473-1
- Specific material designation
- remote
- System control number
- (OCoLC)209886202
Subject
- Computerbeveiliging
- Computerbeveiliging
- Cryptografie
- Cryptografie
- Cryptographie
- Cryptographie (Informatique)
- Cryptographie (Informatique)
- Cryptography
- Cryptography
- Cryptography
- Cryptography -- Encyclopedias
- Data protection
- Data protection
- Data protection
- Data protection -- Encyclopedias
- Databescherming
- Databescherming
- Encyclopedias
- Encyclopedias
- IT-säkerhet -- uppslagsverk
- Informatique
- Kryptologi -- uppslagsverk
- Protection de l'information (Informatique)
- Sécurité des données
- Sécurité des données
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Encyclopedia-of-cryptography-and-security/Dxk6GhuuuiI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Encyclopedia-of-cryptography-and-security/Dxk6GhuuuiI/">Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Encyclopedia-of-cryptography-and-security/Dxk6GhuuuiI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Encyclopedia-of-cryptography-and-security/Dxk6GhuuuiI/">Encyclopedia of cryptography and security, editor-in-chief, Henk C.A. van Tilborg</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>