Pub Date : 1900-01-01DOI: 10.1007/978-1-4419-5906-5_454
K. Nguyen
{"title":"Index Calculus Method","authors":"K. Nguyen","doi":"10.1007/978-1-4419-5906-5_454","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_454","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115579301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4419-5906-5_685
A. Campi
{"title":"Roles in SQL","authors":"A. Campi","doi":"10.1007/978-1-4419-5906-5_685","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_685","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"107 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4419-5906-5_436
B. Kaliski
{"title":"Subexponential Time","authors":"B. Kaliski","doi":"10.1007/978-1-4419-5906-5_436","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_436","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122775063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4419-5906-5_1053
T. Grandison, K. LeFevre
{"title":"HEC Acronym is Often Used for Hyper Elliptic Curves","authors":"T. Grandison, K. LeFevre","doi":"10.1007/978-1-4419-5906-5_1053","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1053","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4419-5906-5_1300
L. Knudsen, G. Leander, F. L. Bauer, Christophe De Cannière, C. Cannière, C. Petit, J. Quisquater, B. Preneel, C. Adams, Anton Stiglic, A. Dent, R. Housley, S. Turner, M. Schunter, G. Bleumer, Mike Just, D. Naccache, H. V. Tilborg, S. Vimercati, P. Samarati, Ebru Celikel Cankaya, A. Biryukov, L. McFearin, S. De Capitani di Vimercati, B. Kaliski, C. Fontaine, Daniele Micciancio, N. Sendrier, N. Heninger, J. Mirkovic, A. Canteaut, C. Crépeau, T. Caddy, P. Salvaneschi, Markus G. Kuhn, S. Vadhan, I. Shparlinski, Xiaofeng Wang, GüntherPernul Dr., Moritz Riesner, M. Vauclair, A. Rosenthal, E. Sciore, M. Soete, Michael T. Hunter, C. Carlet, F. Cuppens, N. Cuppens-Boulahia, Y. Desmedt, T. Pedersen, M. Locasto, D. Boneh, Adam J. Lee, E. Kirda, T. Helleseth, David accache, H. Imai, A. Yamagishi, M. Videau, P. Charpin
{"title":"Credential Verification","authors":"L. Knudsen, G. Leander, F. L. Bauer, Christophe De Cannière, C. Cannière, C. Petit, J. Quisquater, B. Preneel, C. Adams, Anton Stiglic, A. Dent, R. Housley, S. Turner, M. Schunter, G. Bleumer, Mike Just, D. Naccache, H. V. Tilborg, S. Vimercati, P. Samarati, Ebru Celikel Cankaya, A. Biryukov, L. McFearin, S. De Capitani di Vimercati, B. Kaliski, C. Fontaine, Daniele Micciancio, N. Sendrier, N. Heninger, J. Mirkovic, A. Canteaut, C. Crépeau, T. Caddy, P. Salvaneschi, Markus G. Kuhn, S. Vadhan, I. Shparlinski, Xiaofeng Wang, GüntherPernul Dr., Moritz Riesner, M. Vauclair, A. Rosenthal, E. Sciore, M. Soete, Michael T. Hunter, C. Carlet, F. Cuppens, N. Cuppens-Boulahia, Y. Desmedt, T. Pedersen, M. Locasto, D. Boneh, Adam J. Lee, E. Kirda, T. Helleseth, David accache, H. Imai, A. Yamagishi, M. Videau, P. Charpin","doi":"10.1007/978-1-4419-5906-5_1300","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1300","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4419-5906-5_766
Keith B. Frikken
{"title":"Secure Multiparty Computation (SMC)","authors":"Keith B. Frikken","doi":"10.1007/978-1-4419-5906-5_766","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_766","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/0-387-23483-7_275
C. Carlet
{"title":"Nonlinearity of Boolean Functions","authors":"C. Carlet","doi":"10.1007/0-387-23483-7_275","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_275","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4419-5906-5_1152
{"title":"Euclidean Lattice","authors":"","doi":"10.1007/978-1-4419-5906-5_1152","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1152","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4419-5906-5_1407
{"title":"PKI Trust Relationships","authors":"","doi":"10.1007/978-1-4419-5906-5_1407","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1407","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114462839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}