↓ Skip to main content

Encyclopedia of Cryptography and Security

Overview of attention for book
Cover of 'Encyclopedia of Cryptography and Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 2 ABA digital signature guidelines
  3. Altmetric Badge
    Chapter 4 Access structure
  4. Altmetric Badge
    Chapter 8 Adaptive Chosen Plaintext Attack
  5. Altmetric Badge
    Chapter 9 Alberti encryption
  6. Altmetric Badge
    Chapter 11 Anonymity
  7. Altmetric Badge
    Chapter 12 Asymmetric Cryptosystem
  8. Altmetric Badge
    Chapter 13 Attribute certificate
  9. Altmetric Badge
    Chapter 14 Attributes management
  10. Altmetric Badge
    Chapter 17 Authentication token
  11. Altmetric Badge
    Chapter 19 Authorizations management
  12. Altmetric Badge
    Chapter 20 Authorization Policy
  13. Altmetric Badge
    Chapter 21 Autocorrelation
  14. Altmetric Badge
    Chapter 22 Availability
  15. Altmetric Badge
    Chapter 24 Berlekamp-Massey algorithm
  16. Altmetric Badge
    Chapter 28 Binomial Distribution
  17. Altmetric Badge
    Chapter 31 Blind Signature
  18. Altmetric Badge
    Chapter 34 Blowfish
  19. Altmetric Badge
    Chapter 36 Blum Integer
  20. Altmetric Badge
    Chapter 40 Boolean Functions
  21. Altmetric Badge
    Chapter 43 Cæsar cipher
  22. Altmetric Badge
    Chapter 44 Camellia
  23. Altmetric Badge
    Chapter 45 CAST
  24. Altmetric Badge
    Chapter 46 CBC-MAC and Variants
  25. Altmetric Badge
    Chapter 47 CCIT2-code
  26. Altmetric Badge
    Chapter 48 CEPS Standard
  27. Altmetric Badge
    Chapter 49 Certificate
  28. Altmetric Badge
    Chapter 50 Certificate Management
  29. Altmetric Badge
    Chapter 51 Certificate of Primality
  30. Altmetric Badge
    Chapter 55 Chaffing and Winnowing
  31. Altmetric Badge
    Chapter 57 Chaum Blind Signature Scheme
  32. Altmetric Badge
    Chapter 60 Chosen Plaintext Attack
  33. Altmetric Badge
    Chapter 62 Ciphertext-Only Attack
  34. Altmetric Badge
    Chapter 64 Clip Scheme
  35. Altmetric Badge
    Chapter 65 Clock-Controlled Generator
  36. Altmetric Badge
    Chapter 67 Codebook Attack
  37. Altmetric Badge
    Chapter 68 Collision Attack
  38. Altmetric Badge
    Chapter 69 Collision resistance
  39. Altmetric Badge
    Chapter 71 Commitment
  40. Altmetric Badge
    Chapter 74 Encyclopedia of Cryptography and Security
  41. Altmetric Badge
    Chapter 75 Computational Complexity
  42. Altmetric Badge
    Chapter 77 Control Vectors
  43. Altmetric Badge
    Chapter 82 Covert Channels
  44. Altmetric Badge
    Chapter 84 Cramer–Shoup Public Key System
  45. Altmetric Badge
    Chapter 92 Cut-and-choose protocol
  46. Altmetric Badge
    Chapter 94 Data encryption standard (DES)
  47. Altmetric Badge
    Chapter 95 Encyclopedia of Cryptography and Security
  48. Altmetric Badge
    Chapter 96 Davies–Meyer Hash Function
  49. Altmetric Badge
    Chapter 99 Decisional Diffie-Hellman Assumption
  50. Altmetric Badge
    Chapter 100 Decryption Exponent
  51. Altmetric Badge
    Chapter 101 Deniable encryption
  52. Altmetric Badge
    Chapter 103 Derived key
  53. Altmetric Badge
    Chapter 105 DES-X (or DESX)
  54. Altmetric Badge
    Chapter 106 Dictionary Attack (I)
  55. Altmetric Badge
    Chapter 109 Differential–Linear Attack
  56. Altmetric Badge
    Chapter 111 Diffie–Hellman Key Agreement
  57. Altmetric Badge
    Chapter 113 digital signature schemes
  58. Altmetric Badge
    Chapter 118 Eavesdropper
  59. Altmetric Badge
    Chapter 119 ECC Challenges
  60. Altmetric Badge
    Chapter 122 Electronic Cheque
  61. Altmetric Badge
    Chapter 123 Electronic Negotiable Instruments
  62. Altmetric Badge
    Chapter 125 Electronic Postage
  63. Altmetric Badge
    Chapter 129 ElGamal Public Key Encryption
  64. Altmetric Badge
    Chapter 131 Elliptic Curve Cryptography
  65. Altmetric Badge
    Chapter 133 Elliptic Curve Key Agreement Schemes
  66. Altmetric Badge
    Chapter 137 Elliptic Curve Public-Key Encryption Schemes
  67. Altmetric Badge
    Chapter 139 Elliptic Curves for Primality Proving
  68. Altmetric Badge
    Chapter 143 Entitlements Management
  69. Altmetric Badge
    Chapter 146 Euler's Totient Function
  70. Altmetric Badge
    Chapter 147 Exhaustive Key Search
  71. Altmetric Badge
    Chapter 148 Existential Forgery
  72. Altmetric Badge
    Chapter 149 Exponential Time
  73. Altmetric Badge
    Chapter 150 Exponentiation Algorithms
  74. Altmetric Badge
    Chapter 152 Factor Base
  75. Altmetric Badge
    Chapter 155 Fair Exchange
  76. Altmetric Badge
    Chapter 157 Fault Attack
  77. Altmetric Badge
    Chapter 159 Feistel Cipher
  78. Altmetric Badge
    Chapter 160 Fermat Primality Test
  79. Altmetric Badge
    Chapter 161 Fermat's Little Theorem
  80. Altmetric Badge
    Chapter 163 Field
  81. Altmetric Badge
    Chapter 164 Field Polynomial
  82. Altmetric Badge
    Chapter 165 Filter Generator
  83. Altmetric Badge
    Chapter 167 Finite Field
  84. Altmetric Badge
    Chapter 171 Fixed-Exponent Exponentiation
  85. Altmetric Badge
    Chapter 173 Gap
  86. Altmetric Badge
    Chapter 175 Generator
  87. Altmetric Badge
    Chapter 179 GOST
  88. Altmetric Badge
    Chapter 180 GREATEST COMMON DIVISOR
  89. Altmetric Badge
    Chapter 183 GROUP SIGNATURES
  90. Altmetric Badge
    Chapter 184 Hard-Core Bit
  91. Altmetric Badge
    Chapter 188 Homomorphism
  92. Altmetric Badge
    Chapter 189 HTTPS, Secure HTTPS
  93. Altmetric Badge
    Chapter 190 IDEA
  94. Altmetric Badge
    Chapter 191 Identification
  95. Altmetric Badge
    Chapter 193 Identity-Based Encryption
  96. Altmetric Badge
    Chapter 198 Index Calculus
  97. Altmetric Badge
    Chapter 201 Interactive Argument
  98. Altmetric Badge
    Chapter 203 Interpolation Attack
  99. Altmetric Badge
    Chapter 205 Invasive Attacks
  100. Altmetric Badge
    Chapter 208 IPES
  101. Altmetric Badge
    Chapter 209 IPsec
  102. Altmetric Badge
    Chapter 210 Irreducible Polynomial
  103. Altmetric Badge
    Chapter 211 Issuer
  104. Altmetric Badge
    Chapter 213 Jacobi Symbol
  105. Altmetric Badge
    Chapter 214 Karatsuba algorithm
  106. Altmetric Badge
    Chapter 216 Kerberos Authentication Protocol
  107. Altmetric Badge
    Chapter 218 Key agreement
  108. Altmetric Badge
    Chapter 222 Key management
  109. Altmetric Badge
    Chapter 224 Known plaintext attack
  110. Altmetric Badge
    Chapter 226 Lattice Reduction
  111. Altmetric Badge
    Chapter 228 Least Common Multiple
  112. Altmetric Badge
    Chapter 230 Linear Complexity
  113. Altmetric Badge
    Chapter 231 LINEAR CONGRUENTIAL GENERATOR
  114. Altmetric Badge
    Chapter 233 Linear Cryptanalysis for Block Ciphers
  115. Altmetric Badge
    Chapter 235 Linear Feedback Shift Register
  116. Altmetric Badge
    Chapter 236 Linear Syndrome Attack
  117. Altmetric Badge
    Chapter 237 L -Notation
  118. Altmetric Badge
    Chapter 238 Luby–Rackoff Ciphers
  119. Altmetric Badge
    Chapter 239 Maa
  120. Altmetric Badge
    Chapter 241 Man-in-the-Middle Attack
  121. Altmetric Badge
    Chapter 243 Mash Hash Functions (Modular Arithmetic Secure Hash)
  122. Altmetric Badge
    Chapter 244 Master Key
  123. Altmetric Badge
    Chapter 245 Maurer's Method
  124. Altmetric Badge
    Chapter 247 Maximal-Length Linear Sequence
  125. Altmetric Badge
    Chapter 249 Md4-Md5
  126. Altmetric Badge
    Chapter 251 Meet-in-the-Middle Attack
  127. Altmetric Badge
    Chapter 252 Mersenne Prime
  128. Altmetric Badge
    Chapter 253 Miller–Rabin Probabilistic Primality Test
  129. Altmetric Badge
    Chapter 254 Minimal Polynomial
  130. Altmetric Badge
    Chapter 256 Miss-in-the-Middle Attack
  131. Altmetric Badge
    Chapter 257 Mix Networks
  132. Altmetric Badge
    Chapter 258 Modes of Operation of a Block Cipher
  133. Altmetric Badge
    Chapter 259 Modular Arithmetic
  134. Altmetric Badge
    Chapter 260 Modular Root
  135. Altmetric Badge
    Chapter 262 Mondex
  136. Altmetric Badge
    Chapter 266 Multiple Encryption
  137. Altmetric Badge
    Chapter 268 Multiprecision Squaring
  138. Altmetric Badge
    Chapter 271 NESSIE Project
  139. Altmetric Badge
    Chapter 273 Noninteractive Proof
  140. Altmetric Badge
    Chapter 275 Nonlinearity of Boolean Functions
  141. Altmetric Badge
    Chapter 277 Nonrepudiation
  142. Altmetric Badge
    Chapter 279 Ntru
  143. Altmetric Badge
    Chapter 281 Number Field Sieve
  144. Altmetric Badge
    Chapter 283 Nyberg–Rueppel Signature Scheme
  145. Altmetric Badge
    Chapter 284 OAEP: Optimal Asymmetric Encryption Padding
  146. Altmetric Badge
    Chapter 285 Oblivious Transfer
  147. Altmetric Badge
    Chapter 286 One-Time Password
  148. Altmetric Badge
    Chapter 289 Optimal Extension Fields (OEFs)
  149. Altmetric Badge
    Chapter 290 Order
  150. Altmetric Badge
    Chapter 292 Overspending Prevention
  151. Altmetric Badge
    Chapter 294 Password
  152. Altmetric Badge
    Chapter 295 Payment card
  153. Altmetric Badge
    Chapter 298 Perfect Forward Secrecy
  154. Altmetric Badge
    Chapter 299 Personal Identification Number (PIN)
  155. Altmetric Badge
    Chapter 301 PKCS
  156. Altmetric Badge
    Chapter 302 PKIX—Public Key Infrastructure (X.509)
  157. Altmetric Badge
    Chapter 304 PMAC
  158. Altmetric Badge
    Chapter 305 Policy
  159. Altmetric Badge
    Chapter 306 Polybios Square Encryption
  160. Altmetric Badge
    Chapter 310 Pretty Good Privacy (PGP)
  161. Altmetric Badge
    Chapter 311 Primality Proving Algorithm
  162. Altmetric Badge
    Chapter 312 Primality Test
  163. Altmetric Badge
    Chapter 313 Prime Generation
  164. Altmetric Badge
    Chapter 315 Primitive Element
  165. Altmetric Badge
    Chapter 316 Privacy
  166. Altmetric Badge
    Chapter 317 Privilege Management
  167. Altmetric Badge
    Chapter 319 Probabilistic Public-Key Encryption
  168. Altmetric Badge
    Chapter 320 Product Cipher, Superencryption
  169. Altmetric Badge
    Chapter 322 Propagation Characteristics of Boolean Functions
  170. Altmetric Badge
    Chapter 323 Protocol
  171. Altmetric Badge
    Chapter 325 Pseudo-Mersenne Prime
  172. Altmetric Badge
    Chapter 326 Pseudo-Noise Sequence (PN-Sequence)
  173. Altmetric Badge
    Chapter 328 Pseudoprime
  174. Altmetric Badge
    Chapter 329 Pseudorandom Function
  175. Altmetric Badge
    Chapter 330 Pseudo-random number generator
  176. Altmetric Badge
    Chapter 331 Public Key Cryptography
  177. Altmetric Badge
    Chapter 334 Public Key Proxy Signatures
  178. Altmetric Badge
    Chapter 335 Quadratic Residue
  179. Altmetric Badge
    Chapter 336 Quadratic Residuosity Problem
  180. Altmetric Badge
    Chapter 343 Random Oracle Model
  181. Altmetric Badge
    Chapter 345 RC5
  182. Altmetric Badge
    Chapter 347 Recipient Anonymity
  183. Altmetric Badge
    Chapter 351 Relatively Prime
  184. Altmetric Badge
    Chapter 352 Relay Attack
  185. Altmetric Badge
    Chapter 354 Response
  186. Altmetric Badge
    Chapter 355 Resynchronization Attack
  187. Altmetric Badge
    Chapter 356 Rights Management
  188. Altmetric Badge
    Chapter 357 Right-to-Left Exponentiation
  189. Altmetric Badge
    Chapter 364 RSA Public-Key Encryption
  190. Altmetric Badge
    Chapter 365 Run
  191. Altmetric Badge
    Chapter 366 Running-key
  192. Altmetric Badge
    Chapter 367 Safe Prime
  193. Altmetric Badge
    Chapter 368 Salt
  194. Altmetric Badge
    Chapter 371 SEAL
  195. Altmetric Badge
    Chapter 373 Secret Sharing Schemes
  196. Altmetric Badge
    Chapter 375 Secure Socket Layer (SSL)
  197. Altmetric Badge
    Chapter 376 Security
  198. Altmetric Badge
    Chapter 377 Security Architecture
  199. Altmetric Badge
    Chapter 379 Security Standards Activities
  200. Altmetric Badge
    Chapter 380 Selective Forgery
  201. Altmetric Badge
    Chapter 381 Self-Shrinking Generator
  202. Altmetric Badge
    Chapter 382 Self-Synchronizing Stream Cipher
  203. Altmetric Badge
    Chapter 383 Semantic Security
  204. Altmetric Badge
    Chapter 384 Sender Anonymity
  205. Altmetric Badge
    Chapter 387 SET
  206. Altmetric Badge
    Chapter 388 SHA Family (Secure Hash Algorithm)
  207. Altmetric Badge
    Chapter 389 Shamir's Threshold Scheme
  208. Altmetric Badge
    Chapter 392 Shortest Vector Problem
  209. Altmetric Badge
    Chapter 394 Side-Channel Analysis
  210. Altmetric Badge
    Chapter 395 Side-Channel Attacks
  211. Altmetric Badge
    Chapter 396 Sieving
  212. Altmetric Badge
    Chapter 398 Signcryption
  213. Altmetric Badge
    Chapter 401 Skipjack
  214. Altmetric Badge
    Chapter 403 Sliding Window Exponentiation
  215. Altmetric Badge
    Chapter 404 Encyclopedia of Cryptography and Security
  216. Altmetric Badge
    Chapter 405 S/MIME
  217. Altmetric Badge
    Chapter 407 Smoothness Probability
  218. Altmetric Badge
    Chapter 409 SPKI/SDSI
  219. Altmetric Badge
    Chapter 410 SSH
  220. Altmetric Badge
    Chapter 412 Stream Cipher
  221. Altmetric Badge
    Chapter 413 Strong Prime
  222. Altmetric Badge
    Chapter 414 Strong RSA Assumption
  223. Altmetric Badge
    Chapter 416 Subexponential Time
  224. Altmetric Badge
    Chapter 417 Subgroup
  225. Altmetric Badge
    Chapter 418 Subgroup Cryptosystems
  226. Altmetric Badge
    Chapter 420 Substitution–Permutation (SP) Network
  227. Altmetric Badge
    Chapter 421 Summation generator
  228. Altmetric Badge
    Chapter 422 Symmetric Cryptosystem
  229. Altmetric Badge
    Chapter 424 Tamper Detection
  230. Altmetric Badge
    Chapter 425 Tamper Resistance
  231. Altmetric Badge
    Chapter 427 Encyclopedia of Cryptography and Security
  232. Altmetric Badge
    Chapter 428 Threshold Cryptography
  233. Altmetric Badge
    Chapter 430 Time-memory tradeoffs
  234. Altmetric Badge
    Chapter 432 Timing attack
  235. Altmetric Badge
    Chapter 433 Token
  236. Altmetric Badge
    Chapter 434 Traitor Tracing
  237. Altmetric Badge
    Chapter 435 Transport layer security (TLS)
  238. Altmetric Badge
    Chapter 436 Trapdoor One-Way Function
  239. Altmetric Badge
    Chapter 437 Triple-DES
  240. Altmetric Badge
    Chapter 438 Trojan Horses, Computer Viruses and Worms
  241. Altmetric Badge
    Chapter 439 Truncated Differentials
  242. Altmetric Badge
    Chapter 440 Trust Models
  243. Altmetric Badge
    Chapter 442 TWIRL
  244. Altmetric Badge
    Chapter 443 Two-Factor Authentication
  245. Altmetric Badge
    Chapter 445 2 k -Ary Exponentiation
  246. Altmetric Badge
    Chapter 446 Undeniable Signatures
  247. Altmetric Badge
    Chapter 448 Unlinkability
  248. Altmetric Badge
    Chapter 449 Untraceability
  249. Altmetric Badge
    Chapter 450 User Authentication
  250. Altmetric Badge
    Chapter 451 Verifiable Encryption
  251. Altmetric Badge
    Chapter 454 Vigenére Encryption
  252. Altmetric Badge
    Chapter 455 Virus Protection
  253. Altmetric Badge
    Chapter 456 Visual Secret Sharing Schemes
  254. Altmetric Badge
    Chapter 457 Watermarking
  255. Altmetric Badge
    Chapter 461 Witness Hiding
  256. Altmetric Badge
    Chapter 462 X.509
  257. Altmetric Badge
    Chapter 463 Zero-knowledge
Attention for Chapter 15: Authenticated encryption
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Citations

dimensions_citation
76 Dimensions

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Authenticated encryption
Chapter number 15
Book title
Encyclopedia of Cryptography and Security
Published by
Springer, Boston, MA , January 2005
DOI 10.1007/0-387-23483-7_15
Book ISBNs
978-0-387-23473-1, 978-0-387-23483-0
Authors

J. Black, Black, J.

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 50%
Student > Master 1 50%
Readers by discipline Count As %
Computer Science 1 50%
Unknown 1 50%