Encyclopedia of Cryptography and Security
From MaRDI portal
Publication:3095372
DOI10.1007/978-1-4419-5906-5zbMath1226.94001OpenAlexW2170334586MaRDI QIDQ3095372
No author found.
Publication date: 31 October 2011
Full work available at URL: https://doi.org/10.1007/978-1-4419-5906-5
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Factorization (11Y05) Primality (11Y11) General reference works (handbooks, dictionaries, bibliographies, etc.) pertaining to information and communication theory (94-00)
Related Items (16)
Design and implementation of a system that preserves the confidentiality of stream cipher in non-linear flow coding ⋮ Light-weighted cryptographic algorithms for energy efficient applications ⋮ Efficient key-dependent dynamic S-boxes based on permutated elliptic curves ⋮ Offsetting inventory replenishment cycles ⋮ On the properties that characterize privacy ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ Security Analysis of PRINCE ⋮ BOX-COUNTING DIMENSION COMPUTED BY α-DENSE CURVES ⋮ Quantum algorithm for solving hyperelliptic curve discrete logarithm problem ⋮ One round threshold ECDSA without roll call ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ Quantum secret sharing with identity authentication based on Bell states ⋮ Ensuring privacy with constrained additive noise by minimizing Fisher information ⋮ Reflection ciphers ⋮ Distinguisher on full-round compression function of GOST R ⋮ Hashing Garbled Circuits for Free
This page was built for publication: Encyclopedia of Cryptography and Security