


default search action
Encyclopedia of Cryptography and Security 2011
- Henk C. A. van Tilborg, Sushil Jajodia:
Encyclopedia of Cryptography and Security, 2nd Ed. Springer 2011, ISBN 978-1-4419-5905-8
A
- Anne Canteaut:
A5/1. 1-2 - Gerald Brose:
Access Control. 2-7 - Hakki C. Cankaya:
Access Control from an OS Security Perspective. 7-9 - Hakki C. Cankaya:
Access Control Lists. 9-12 - Aaron Estes:
Access Control Matrix. 12-13 - Sabrina De Capitani di Vimercati:
Access Control Policies, Models, and Mechanisms. 13-14 - Access Control Rules. 14
- Access Limitation. 14
- Access Lists. 14
- Sabrina De Capitani di Vimercati:
Access Matrix. 14-17 - Davide Martinenghi:
Access Pattern. 17-20 - Access Rights. 20
- Yvo Desmedt:
Access Structure. 20 - ACM. 20
- Marijke De Soete:
Acquirer. 20 - Alex Biryukov:
Adaptive Chosen Ciphertext Attack. 21 - Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack. 21 - Alex Biryukov:
Adaptive Chosen Plaintext Attack. 21 - Pierangela Samarati:
Administrative Policies. 21-23 - Alessandro Campi, Stefano Paraboschi:
Administrative Policies in SQL. 23 - Advanced Encryption Standard. 24
- Advanced Hash Competition. 24
- Kristen LeFevre, Bee-Chung Chen:
Adversarial/External Knowledge (Privacy in the Presence of). 24-26 - Adware. 26
- AES. 26
- Dan Boneh:
Aggregate Signatures. 27 - Bart Preneel:
AHS Competition/SHA-3. 27-29 - Friedrich L. Bauer:
Alberti Encryption. 29-31 - Claude Carlet:
Algebraic Immunity of Boolean Functions. 31-32 - Algebraic Number Field. 32
- Algorithmic Complexity Attacks. 32
- Scott A. Crosby, Dan S. Wallach:
Algorithmic DoS. 32-33 - Friedrich L. Bauer:
Alphabet. 33-34 - William Enck:
Android's Security Framework-Understanding the Security of Mobile Phone Platforms. 34-37 - Anomalous Binary Curves. 37
- Gerrit Bleumer:
Anonymity. 37-38 - Anonymity in Data Mining. 39
- Anonymous Communication. 39
- Yi Yang, Sencun Zhu:
Anonymous Routing. 39-40 - Stefan Köpsell:
Anonymous Web Browsing and Publishing. 40-42 - Anthropometric Authentication. 42
- Anthropometrics. 42
- Anthropometry. 42
- Anti-DoS Cookies. 42
- Anti-Jamming Strategy. 42
- Antispam Based on Sender Reputation. 42
- Antivirus. 42
- Mudhakar Srivatsa, Arun Iyengar:
Application-Level Denial of Service. 42-44 - Catherine Meadows:
Applications of Formal Methods to Intrusion Detection. 44-45 - V. N. Venkatakrishnan:
Applications of Formal Methods to Web Application Security. 45-46 - Applications of Rank-Metric Codes. 46
- Sebastiaan Indesteege:
ARIA. 47 - ARP Poison Routing (APR). 47
- ARP Poisoning. 47
- William Enck:
ARP Spoofing. 48-49 - Burt Kaliski:
Asymmetric Cryptosystem. 49-50 - Asynchronous Stream Cipher. 50
- Attack by Summation Over an Hypercube. 50
- Sean W. Smith:
Attestation. 50-51 - Marijke De Soete:
Attribute Certificate. 51-52 - J. Black:
Authenticated Encryption. 52-61 - Ebru Celikel Cankaya:
Authentication. 61-62 - Robert J. Zuccherato:
Authentication Token. 62-63 - Gregory A. Kabatiansky, Ben J. M. Smeets:
Authentication, From an Information Theoretic Perspective. 63-65 - Authorization. 65
- Sabrina De Capitani di Vimercati:
Authorizations. 65-68 - Tor Helleseth:
Autocorrelation. 68 - David Naccache:
Autotomic Signatures. 68 - Eric Cronin:
Availability. 68-69
B
- Bank Card. 71
- David Naccache:
Barrett's Algorithm. 71 - Barter. 71
- Base. 71
- Friedrich L. Bauer:
Beaufort Encryption. 71 - Ebru Celikel Cankaya:
Bell-LaPadula Confidentiality Model. 71-74 - David Elliott Bell:
Bell-La Padula Model. 74-79 - Burt Kaliski:
Berlekamp Q-matrix. 79 - Anne Canteaut:
Berlekamp-Massey Algorithm. 80 - Aaron Estes:
Biba Integrity Model. 81 - Biba Mandatory Integrity Policy. 81
- Jonathan K. Millen:
Biba Model. 81-82 - Big Number Multiplication. 82
- Big Number Squaring. 82
- Bilinear Pairings. 82
- Berk Sunar:
Binary Euclidean Algorithm. 83-84 - Bodo Möller:
Binary Exponentiation. 84-86 - Binary Functions. 86
- Binary GCD Algorithm. 86
- Binding Pattern. 86
- Burt Kaliski:
Binomial Distribution. 86 - Nary Subramanian:
Biometric Authentication. 86-90 - Biometric Cryptosystem. 90
- Ann Cavoukian, Alex Stoianov:
Biometric Encryption. 90-98 - Biometric Fusion. 98
- Biometric Identification in Video Surveillance. 98
- Biometric Information Ethics. 98
- Biometric Key Generation. 98
- Biometric Keys. 98
- B. V. K. Vijaya Kumar:
Biometric Matching. 98-101 - Biometric Passport Security. 101
- Biometric Performance Evaluation. 101
- Fabio Scotti
, Stelvio Cimato, Roberto Sassi:
Biometric Privacy. 101-104 - Biometric Recognition. 104
- Krzysztof Kryszczuk, Jonas Richiardi
:
Biometric Sample Quality. 104-110 - Achint Thomas, Venu Govindaraju:
Biometric Sensors. 110-113 - Alan D. Smith:
Biometric Social Responsibility. 113-117 - Jonas Richiardi
, Krzysztof Kryszczuk:
Biometric Systems Evaluation. 117-124 - Fernando L. Podio:
Biometric Technologies and Security - International Biometric Standards Development Activities. 124-130 - Biometric Testing. 130
- Evangelia Micheli-Tzanakou, Konstantinos N. Plataniotis:
Biometrics: Terms and Definitions. 142-147 - Martin Evison
:
Biometrics for Forensics. 130-134 - Elisabeth de Leeuw:
Biometrics for Identity Management and Fields of Application. 134-139 - Stan Z. Li:
Biometrics in Video Surveillance. 139-142 - BIOS Basic Input Output System. 147
- Arjen K. Lenstra:
Birthday Paradox. 147-148 - Black Box Algorithms. 148
- David Naccache:
Blackmailing Attacks. 148 - Gerrit Bleumer:
Blind Signature. 148-150 - Gerrit Bleumer:
Blinding Techniques. 150-152 - Lars R. Knudsen:
Block Ciphers. 152-157 - Christophe De Cannière:
Blowfish. 157-158 - BLP. 158
- BLP Model. 158
- Dan Boneh:
BLS Short Digital Signatures. 158-159 - Burt Kaliski:
Blum Integer. 159-160 - Dan Boneh:
Blum-Blum-Shub Pseudorandom Bit Generator. 160-161 - Dan Boneh:
Blum-Goldwasser Public Key Encryption System. 161-162 - Claude Carlet:
Boolean Functions. 162-165 - Alex Biryukov:
Boomerang Attack. 165-166 - Guofei Gu:
Botnet Detection in Enterprise Networks. 166-168 - Donggang Liu:
Broadcast Authentication from a Conditional Perspective. 168-170 - Yvo Desmedt, Goce Jakimoski:
Broadcast Authentication from an Information Theoretic Perspective. 170-171 - Dalit Naor:
Broadcast Encryption. 171-174 - Broadcast Stream Authentication. 174
- Browser Cookie. 174
- BSP Board Support Package. 174
- Angelos D. Keromytis:
Buffer Overflow Attacks. 174-177 - Buffer Overrun. 177
- Jean-Louis Lanet:
Bytecode Verification. 177-178
C
- Lars R. Knudsen, Gregor Leander
:
C2 - Block Cipher. 179-180 - Christophe De Cannière:
Camellia. 180-182 - Cascade Revoke. 182
- Christophe De Cannière:
Cast. 182-183 - Christophe Petit, Jean-Jacques Quisquater:
Cayley Hash Functions. 183-184 - Bart Preneel:
CBC-MAC and Variants. 184-188 - Friedrich L. Bauer:
CCIT2-Code. 188 - CDH. 188
- Cellular Network Security. 188
- Carlisle Adams:
Certificate. 188-189 - Carlisle Adams:
Certificate Management. 189 - Anton Stiglic:
Certificate of Primality. 189 - Carlisle Adams:
Certificate Revocation. 190-192 - Certificate-Based Access Control. 192
- Alexander W. Dent:
Certificateless Cryptography. 192-193 - Carlisle Adams, Russ Housley, Sean Turner:
Certification Authority. 193-195 - Matthias Schunter:
Certified Mail. 195-196 - Gerrit Bleumer:
Chaffing and Winnowing. 197-198 - Challenge-Response Authentication. 198
- Mike Just
:
Challenge-Response Identification. 198-199 - Challenge-Response Protocol. 199
- Gerrit Bleumer:
Chaum Blind Signature Scheme. 199-200 - David Naccache:
Chemical Combinatorial Attack. 200-201 - Henk C. A. van Tilborg:
Chinese Remainder Theorem. 201-202 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Chinese Wall. 202-203 - Ebru Celikel Cankaya:
Chinese Wall Model. 203-205 - Chip Card. 205
- Alex Biryukov:
Chosen Ciphertext Attack. 205 - Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack. 205 - Alex Biryukov:
Chosen Plaintext Attack. 205-206 - Chosen Prefix Attack. 206
- Chromosome. 206
- Chroot Prison. 207
- Lee D. McFearin:
Chroot Jail. 206-207 - Alex Biryukov:
Ciphertext-Only Attack. 207 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Clark and Wilson Model. 208-209 - Classical Cryptosystem. 209
- Burt Kaliski:
Claw-Free. 209-210 - Lars R. Knudsen:
CLEFIA. 210-211 - Client Puzzles. 211
- Caroline Fontaine:
Clock-Controlled Generator. 211-212 - Daniele Micciancio:
Closest Vector Problem. 212-214 - Cloud Computing. 214
- Bart Preneel:
CMAC. 214-215 - CMVP - Cryptographic Module Validation Program. 215
- Code Verification. 215
- Nicolas Sendrier:
Code-Based Cryptography. 215-216 - Alex Biryukov:
Codebook Attack. 216 - Nadia Heninger:
Cold-Boot Attacks. 216-217 - Jelena Mirkovic:
Collaborative DoS Defenses. 217-220 - Bart Preneel:
Collision Attack. 220-221 - Bart Preneel:
Collision Resistance. 221-222 - Anne Canteaut:
Combination Generator. 222-224 - Commercial Off-the-Shelf. 224
- Commercial Security Model. 224
- Claude Crépeau:
Commitment. 224-227 - Tom Caddy:
Common Criteria. 227-229 - Paolo Salvaneschi:
Common Criteria, From a Security Policies Perspective. 229-232 - Gerrit Bleumer:
Communication Channel Anonymity. 232 - Complexity Theory. 232
- Compositeness Test. 232
- Markus Kuhn:
Compromising Emanations. 232-235 - Salil P. Vadhan:
Computational Complexity. 235-240 - Igor E. Shparlinski:
Computational Diffie-Hellman Problem. 240-244 - XiaoFeng Wang:
Computational Puzzles. 244-245 - Computationally Sound Proof System. 245
- Günther Pernul, Moritz Riesner:
Conceptual Design of Secure Databases. 245-248 - Conceptual Modeling. 248
- Conference Key Agreement. 248
- Conference Keying. 248
- Confidentiality Model. 248
- Confirmer Signatures. 249
- Consistency Verification of Security Policy. 249
- Marc Vauclair:
Contactless Cards. 249 - Arnon Rosenthal, Edward Sciore:
Content-Based and View-Based Access Control. 249-253 - Matthias Schunter:
Contract Signing. 253-254 - Marijke De Soete:
Control Vector. 254 - Conventional Cryptosystem. 254
- Michael T. Hunter:
Cookie. 254-256 - Coprime. 256
- Gerrit Bleumer:
Copy Protection. 256-259 - Bart Preneel:
Correcting-Block Attack. 259-260 - Anne Canteaut:
Correlation Attack for Stream Ciphers. 261-262 - Claude Carlet:
Correlation Immune and Resilient Boolean Functions. 262-264 - Frédéric Cuppens, Nora Cuppens-Boulahia:
Cover Story. 264-265 - Yvo Desmedt:
Covert Channels. 265-266 - Torben Pedersen:
CPS, Certificate Practice Statement. 266-267 - CPU Consumption. 267
- Michael E. Locasto:
CPU Denial of Service. 268-269 - CPU Starvation. 269
- Dan Boneh:
Cramer-Shoup Public-Key System. 269-270 - Credential Verification. 270
- Adam J. Lee:
Credential-Based Access Control. 271-272 - Gerrit Bleumer:
Credentials. 272-275 - Engin Kirda:
Cross Site Scripting Attacks. 275-277 - Tor Helleseth:
Cross-Correlation. 277 - CRT. 277
- Friedrich L. Bauer:
Cryptanalysis. 277-281 - Friedrich L. Bauer:
Crypto Machines. 281-283 - Cryptographic Algorithm Evaluation. 283
- Cryptographic Protocol. 283
- Cryptographic Protocol Verification. 283
- Cryptographic Puzzles. 283
- Cryptography on Reconfigurable Devices. 283
- Friedrich L. Bauer:
Cryptology. 283-284 - David Naccache:
Cryptophthora. 284 - Friedrich L. Bauer:
Cryptosystem. 284-285 - Hideki Imai, Atsuhiro Yamagishi:
CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project). 285-288 - Marion Videau:
Cube Attack. 289-290 - Claude Crépeau:
Cut-and-Choose Protocol. 290-291 - Pascale Charpin:
Cyclic Codes. 291-294 - Friedrich L. Bauer:
Cæsar Cipher. 180
D
- DAC. 295
- Alex Biryukov, Christophe De Cannière:
Data Encryption Standard (DES). 295-301 - William E. Winkler:
Data Linkage. 301-303 - Charu C. Aggarwal:
Data Mining (Privacy in). 303-306 - Markus Kuhn:
Data Remanence. 306 - Luc Bouganim, Yanli Guo:
Database Encryption. 307-312 - Bart Preneel:
Davies-Meyer. 312-313 - Gerrit Bleumer:
DC Network. 313-315 - DDH Problem. 315
- Tor Helleseth:
De Bruijn Sequence. 315-316 - De-Skewing. 331
- Decentralized Trust Management. 316
- Ran Canetti, Mayank Varia:
Decisional Diffie-Hellman Problem. 316-319 - Christiane Peters:
Decoding Algorithms. 319-322 - Burt Kaliski:
Decryption Exponent. 322 - Yvo Desmedt:
Deniable Encryption. 322-323 - Denial of Service (DoS). 323
- George Kesidis:
Denial-of-Service Detection. 323-328 - Deobfuscating Malware. 328
- Marijke De Soete:
Derived Key. 328 - Alex Biryukov:
DES-X (or DESX). 331 - Gerrit Bleumer:
Designated Confirmer Signature. 328-330 - Berry Schoenmakers:
Designated-Verifier Proofs. 330-331 - DH Key Agreement. 331
- DHP. 331
- Carlisle Adams:
Dictionary Attack. 332 - Alex Biryukov:
Dictionary Attack (I). 332 - Eli Biham:
Differential Cryptanalysis. 332-336 - Tom Caddy:
Differential Power Analysis. 336-338 - Cynthia Dwork:
Differential Privacy. 338-340 - Alex Biryukov:
Differential-Linear Attack. 340-341 - Diffie-Hellman Problem. 342
- Mike Just
:
Diffie-Hellman Key Agreement. 341-342 - Diffie-Hellman Key Exchange. 342
- Digest Authentication. 342
- Digital Certificate. 342
- Matthieu Finiasz, Nicolas Sendrier:
Digital Signature Scheme Based on McEliece. 342-343 - Kazue Sako:
Digital Signature Schemes. 343-344 - Philippe Gaborit, Nicolas Sendrier:
Digital Signature Schemes from Codes. 344-347 - Dan Boneh:
Digital Signature Standard. 347 - Christian Cachin:
Digital Steganography. 348-352 - Daniel M. Gordon:
Discrete Logarithm Problem. 352-353 - Ninghui Li:
Discretionary Access Control. 353-356 - Sabrina De Capitani di Vimercati:
Discretionary Access Control Policies (DAC). 356-358 - Marion Videau:
Distinguishing Attacks. 358-359 - DLP. 359
- Svetlana N. Yanushkevich
, Denis V. Popel:
DNA. 359-362 - Brent ByungHoon Kang:
DNS-Based Botnet Detection. 362-363 - John Ioannidis:
DoS Pushback. 363-365 - DPA. 365
- Mihai Christodorescu, Vinod Ganapathy:
Dynamic Analysis. 365-367 - Brent ByungHoon Kang, Anurag Srivastava:
Dynamic Malware Analysis. 367-368 - Dynamic Program Analysis. 368
- Sean W. Smith:
Dynamic Root of Trust. 368-369 - Dynamic Separation of Duties. 369
E
- e-Government. 372
- Johannes Gehrke
, Ashwin Machanavajjhala:
E-Privacy. 424-426 - Caroline Fontaine:
E0. 371-372 - Bir Bhanu:
Ear Shape for Biometric Identification. 372-378 - Micah Sherr:
Eavesdropping. 378-379 - ECC. 379
- Darrel Hankerson, Alfred Menezes:
ECC Challenges. 379-380 - ECM. 380
- ECPP. 380
- ECRYPT Stream Cipher Project. 380
- Edwards Coordinates. 380
- Tanja Lange:
Edwards Curves. 380-382 - Efficiency of Hyperelliptic Curve Cryptosystems. 382
- Electro-Magnetic Fingerprinting. 385
- Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack. 382-385 - Gerrit Bleumer:
Electronic Cash. 385-387 - Electronic Check. 387
- Marijke De Soete:
Electronic Cheque. 387 - Gerrit Bleumer:
Electronic Payment. 387-389 - Gerrit Bleumer:
Electronic Postage. 389-391 - Electronic Purse. 391
- Kazue Sako:
Electronic Voting Schemes. 391-393 - Gerrit Bleumer:
Electronic Wallet. 393-395 - Dan Boneh:
ElGamal Digital Signature Scheme. 395-396 - ElGamal Encryption. 396
- Yvo Desmedt:
ElGamal Public Key Encryption. 396 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Cryptography. 397 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Discrete Logarithm Problem. 397-400 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Key Agreement Schemes. 400-401 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Keys. 401 - Paul Zimmermann:
Elliptic Curve Method for Factoring. 401-403 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Point Multiplication Using Halving. 403-406 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Public-Key Encryption Schemes. 406-407 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Signature Schemes. 407-408 - Elliptic Curve Trace Computation. 408
- Darrel Hankerson, Alfred Menezes:
Elliptic Curves. 408-410 - François Morain:
Elliptic Curves for Primality Proving. 411-412 - Michael Ward, Anita Ochieano:
EMV. 412-416 - Friedrich L. Bauer:
Encryption. 416 - Burt Kaliski:
Encryption Exponent. 417 - Arkadiusz Orlowski:
Enigma. 417-420 - Robert J. Zuccherato:
Entity Authentication. 420-421 - Entity Authentication Protocol. 421
- Entity Resolution. 421
- Carl M. Ellison:
Entropy Sources. 421-423 - Environmental Attacks. 423
- ePassport Security. 423
- Error-Correcting Cyclic Codes. 426
- Error-Correction Decoding. 426
- Escrow Service. 426
- Marion Videau:
eSTREAM. 426-427 - Berk Sunar:
Euclidean Algorithm. 427-430 - Euclidean Lattice. 430
- Euclid's Algorithm. 427
- Burt Kaliski:
Euler's Totient Function. 430 - Everywhere Second Preimage Resistant Hash Function (esec). 430
- Michael J. Wiener:
Exhaustive Key Search. 431-433 - Gerrit Bleumer:
Existential Forgery. 433-434 - Exponential Key Exchange. 434
- Burt Kaliski:
Exponential Time. 434 - Christof Paar:
Exponentiation Algorithms. 434-436 - Extended Euclidean Algorithm. 436
- Burt Kaliski:
Extension Field. 436
F
- Soma Biswas, Rama Chellappa:
Face Recognition from Still Images and Video. 437-444 - Daniel J. Bernstein:
Factorization Circuits. 444-445 - Burt Kaliski:
Factor Base. 444 - Gerrit Bleumer:
Fail-Stop Signature. 446-447 - Matthias Schunter:
Fair Exchange. 447-448 - False Data Filtering. 448
- Wensheng Zhang:
False Data Injection Defense. 448-450 - Anne Canteaut:
Fast Correlation Attack. 450-452 - Olivier Benoît:
Fault Attack. 452-453 - Christophe De Cannière:
FEAL. 454-455 - Feige-Fiat-Shamir Signature Scheme. 455
- Alex Biryukov:
Feistel Cipher. 455 - Moses D. Liskov:
Fermat Primality Test. 455-456 - Fermat Test. 456
- Moses D. Liskov:
Fermat's Little Theorem. 456 - Yvo Desmedt:
Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme. 457-458 - Burt Kaliski:
Field. 458 - File System Permissions. 458
- Anne Canteaut:
Filter Generator. 458-460 - Ruggero Donida Labati, Fabio Scotti
:
Fingerprint. 460-465 - Fingerprint Authentication. 465
- Alexander Barg, Gregory A. Kabatiansky:
Fingerprinting. 465-467 - Burt Kaliski:
Finite Field. 468 - Tom Caddy:
FIPS 140-2. 468-471 - Niels Provos:
Firewall. 471-474 - Firewall Policy Analysis. 474
- Ehab Al-Shaer:
Firewalls. 474-482 - Fixed Window Exponentiation. 482
- André Weimerskirch:
Fixed-Base Exponentiation. 482-485 - André Weimerskirch:
Fixed-Exponent Exponentiation. 485-486 - Pierangela Samarati:
Flexible Authorization Framework (FAF). 486-489 - Flow Blocking. 489
- Forged Resets. 489
- Gerrit Bleumer:
Forgery. 489-490 - Catherine Meadows:
Formal Analysis of Cryptographic Protocols. 490-492 - Graham Steel:
Formal Analysis of Security APIs. 492-494 - Formal Methods. 494
- Michael Huth:
Formal Methods and Access Control. 494-495 - Jonathan K. Millen:
Formal Methods for the Orange Book. 495-498 - Catherine Meadows:
Formal Methods in Certification and Evaluation. 498-499 - Forward Secrecy. 499
- FPGA Field Programmable Gate Array. 499
- Tim Güneysu:
FPGAs in Cryptography. 499-501 - Emmanuel Thomé
:
Function Field Sieve. 501-502
G
- Sudeep Sarkar, Zongyi Liu:
Gait Recognition. 503-506 - David A. McGrew:
Galois Counter Mode. 506-508 - Galois Message Authentication Code. 508
- Tor Helleseth:
Gap. 508-509 - GCD. 509
- GCM. 509
- Gene. 509
- Jerome A. Solinas:
Generalized Mersenne Prime. 509-510 - Burt Kaliski:
Generator. 510 - Daniel M. Gordon:
Generic Attacks Against DLP. 510-512 - David Naccache:
Generic Model. 512-513 - Genetic Code. 513
- Geometry of Numbers. 513
- Bart Preneel:
GMAC. 513-514 - Gerrit Bleumer:
GMR Signature. 514-515 - Kazue Sako:
Goldwasser-Micali Encryption Scheme. 516 - Tor Helleseth:
Golomb's Randomness Postulates. 516-517 - Christophe De Cannière:
GOST. 517-518 - Sabrina De Capitani di Vimercati, Giovanni Livraga:
Grant Option. 518 - Scott Contini:
Greatest Common Divisor. 518-519 - Greatest Common Factor. 519
- Burt Kaliski:
Group. 519-520 - Mike Burmester:
Group Key Agreement. 520-526 - Group Key Distribution. 526
- Group Key Exchange. 526
- Gerrit Bleumer:
Group Signatures. 526-528 - David Naccache:
Gröbner Basis. 519
H
- David Zhang, Vivek Kanhangad:
Hand Geometry Recognition. 529-531 - Hand Geometry Verification. 531
- Patrizio Campisi, Emanuele Maiorana, Harold Mouchère, Christian Viard-Gaudin, Alessandro Neri:
Handwriting Analysis. 531-534 - Burt Kaliski:
Hard-Core Bit. 534-535 - Laurent Sustek:
Hardware Security Module. 535-538 - David Challener:
Hash Agility. 538-540 - Dwight Horne:
Hash Chain. 542-543 - Bart Preneel:
Hash Functions. 543-553 - Hash-Based Message Authentication Code. 553
- Tanja Lange:
Hash-Based Signatures. 540-542 - Header Injections. 553
- Serge Fenet:
Header-Based Attacks. 553-556 - HEC Acronym is Often Used for Hyper Elliptic Curves. 556
- Heredity. 556
- High Assurance Evaluation Methods. 556
- Higher Order Derivative Attack. 556
- Tyrone Grandison, Kristen LeFevre:
Hippocratic Database. 556-559 - History-Based Separation of Duties. 559
- Bart Preneel:
HMAC. 559-560 - Berry Schoenmakers:
Homomorphic Encryption. 560-562 - Burt Kaliski:
Homomorphism. 562 - Vijay Alturi:
HRU. 562-564 - Jörg Schwenk:
HTTP Authentication. 564-565 - HTTP Basic Authentication. 565
- HTTP Cookie. 565
- HTTP Digest Access Authentication Scheme. 565
- Italo Dacosta:
HTTP Digest Authentication. 565-567 - Andrew Clark:
HTTP Session Security. 567-569 - Torben Pedersen:
HTTPS, HTTP over TLS. 569-570 - Human Ear Biometrics. 570
- Human Ear Identification. 570
- Human Ear Recognition. 570
- Human Ear Verification. 570
- Kaoru Kurosawa:
Hybrid Encryption. 570-572 - Hyperelliptic Curve Discrete Logarithm Problem (HECDLP). 573
- Roberto Avanzi, Nicolas Thériault:
Hyperelliptic Curve Security. 573-576 - Roberto Avanzi, Nicolas Thériault:
Hyperelliptic Curves. 576-580 - Roberto Avanzi, Nicolas Thériault:
Hyperelliptic Curves Performance. 580-582
I
- IBE. 583
- IC Integrated Circuit. 583
- IC-Integrated Circuit. 583
- Iceman Attack. 583
- ID-Based Encryption. 583
- Alex Biryukov:
IDEA. 583-584 - Carlisle Adams:
Identification. 584-585 - Identity Authentication. 585
- Mike Just
:
Identity Management. 586-587 - Identity Proof. 587
- Robert J. Zuccherato:
Identity Verification Protocol. 587-588 - Benoît Libert, Jean-Jacques Quisquater:
Identity-Based Cryptosystems. 588-594 - Martin Gagné:
Identity-Based Encryption. 594-596 - Carlisle Adams:
Impersonation Attack. 596 - Implicit Key Authentication. 596
- Alex Biryukov:
Impossible Differential Attack. 597 - Kim Nguyen:
Index Calculus Method. 597-600 - Indistinguishability of Encryptions. 600
- Joachim Biskup:
Inference Control. 600-605 - Information Assurance. 605
- Heiko Mantel:
Information Flow and Noninterference. 605-607 - Information Flow Security. 607
- Information Integrity. 607
- Information Security Management System. 607
- Information Theoretic Model. 608
- Friedrich L. Bauer:
Information Theory. 608-609 - Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem:
Insider Threat Defense. 609-611 - Arjen K. Lenstra:
Integer Factoring. 611-618 - Integrated Circuit. 618
- Integrated Circuit Card. 618
- Integrity Model. 618
- Intellectual Property. 618
- Berry Schoenmakers:
Interactive Argument. 618-619 - Berry Schoenmakers:
Interactive Proof. 619 - Interactive Proof Systems. 619
- Interactive Theorem Proving and Security. 619
- Interception. 619
- Christophe De Cannière:
Interpolation Attack. 620 - Qijun Gu:
Intrusion Detection in Ad Hoc Networks. 620-623 - Assia Tria, Hamid Choukri:
Invasive Attacks. 623-629 - Anne Canteaut:
Inversion Attack. 629-630 - Christof Paar:
Inversion in Finite Fields and Rings. 631-632 - Inversion in Galois Fields. 632
- Steven M. Bellovin:
IP Traceback. 632-634 - Alex Biryukov:
IPES. 634-635 - John Ioannidis:
IPsec. 635-638 - IPSec Policy Analysis. 638
- Yu Chen:
Iris. 638-646 - Burt Kaliski:
Irreducible Polynomial. 646 - Angelika Plate:
ISMS: A Management Framework for Information Security. 647-648 - ISO 15408 CC - Common Criteria. 648
- ISO 19790 2006 Security Requirements for Cryptographic Modules. 648
- Mehdi Tibouchi
:
ISO-9796 Signature Standards. 649-650 - ISO/IEC 15408. 648
- ISO/IEC 27001. 649
- Marijke De Soete:
Issuer. 650 - Jorge Guajardo:
Itoh-Tsujii Inversion Algorithm. 650-653
J
- Burt Kaliski:
Jacobi Symbol. 655 - Wenyuan Xu:
Jamming Attack Defense. 655-661 - Srdjan Capkun:
Jamming Resistance. 661-662
K
- Pierangela Samarati:
k-Anonymity. 663-666 - André Weimerskirch:
Karatsuba Algorithm. 666-669 - Christophe De Cannière:
Kasumi/Misty1. 669-670 - Thomas Eisenbarth, Timo Kasper, Christof Paar, Sebastiaan Indesteege:
Keeloq. 671-673 - Radmilo Racic:
Kerberos. 673-674 - Carlisle Adams:
Kerberos Authentication Protocol. 674-675 - Kerckhoffs' Law. 675
- Fabien A. P. Petitcolas
:
Kerckhoffs' Principle. 675 - Friedrich L. Bauer:
Key. 676-677 - Mike Just
:
Key Agreement. 677-678 - Robert J. Zuccherato:
Key Authentication. 678-679 - Torben Pedersen:
Key Encryption Key. 679-681 - Mike Just
:
Key Escrow. 681-682 - Aggelos Kiayias, Bülent Yener:
Key Generation Using Physical Properties of Wireless Communication. 682-683 - Key Life Cycle Management. 683
- Steve Lloyd, Carlisle Adams:
Key Management. 683-688 - Key Recovery. 688
- Key Variation. 688
- Mitchell A. Thornton:
Keyboard Dynamics. 688-691 - Aaron Estes:
Keylogging. 691 - Keystream. 691
- Patrizio Campisi, Alessandro Neri:
Keystroke Dynamics. 692-695 - Keystroke Logging. 695
- Keyword-Based Retrieval over Encrypted Data. 695
- Yvo Desmedt:
Knapsack Cryptographic Schemes. 695-704 - Alex Biryukov:
Known Plaintext Attack. 704-705 - Darrel Hankerson, Alfred Menezes:
Koblitz Elliptic Curves. 705-706
L
- Arjen K. Lenstra:
L Notation. 709-710 - Lamport One-Time Signatures. 710
- Late Launch. 710
- Phong Q. Nguyen:
Lattice. 710-711 - Lattice Basis Reduction. 711
- Phong Q. Nguyen:
Lattice Reduction. 711-713 - Daniele Micciancio:
Lattice-Based Cryptography. 713-715 - LCM. 715
- Scott Contini:
Least Common Multiple. 715 - Sabrina De Capitani di Vimercati:
Least Privilege. 716 - Burt Kaliski:
Legendre Symbol. 716 - Stephen M. Papa, William D. Casper:
Levels of Trust. 716-720 - LFSR. 720
- Anne Canteaut:
Linear Complexity. 720 - Caroline Fontaine:
Linear Congruential Generator. 721 - Anne Canteaut:
Linear Consistency Attack. 721-722 - Alex Biryukov, Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers. 722-725 - Anne Canteaut:
Linear Cryptanalysis for Stream Ciphers. 725-726 - Anne Canteaut:
Linear Feedback Shift Register. 726-729 - Anne Canteaut:
Linear Syndrome Attack. 729 - List Decoding. 729
- Claudio A. Ardagna
:
Location Information (Privacy of). 729-732 - Location Privacy. 732
- Marco Gruteser:
Location Privacy in Wireless Networks. 732-734 - Sean W. Smith:
Logic Bomb. 734 - Piero A. Bonatti:
Logic-Based Authorization Languages. 734-736 - Longhand. 736
- Lars R. Knudsen:
Luby-Rackoff Ciphers. 736-737
M
- m-Sequence. 737
- Xiaokui Xiao:
M-Invariance. 739-741 - Bart Preneel:
MAA. 741-742 - Bart Preneel:
MAC Algorithms. 742-748 - Machine Readable Travel Document Security. 748
- Macrodata Disclosure Limitation. 748
- Macrodata Disclosure Protection. 748
- Sara Foresti:
Macrodata Protection. 749-750 - Maliciously Modified Set of Administrative Tools. 750
- Malware. 750
- Engin Kirda:
Malware Behavior Clustering. 751-752 - Stefan Katzenbeisser, Johannes Kinder, Helmut Veith:
Malware Detection. 752-755 - Yvo Desmedt:
Man-in-the-Middle Attack. 759 - Shambhu J. Upadhyaya:
Mandatory Access Control. 756-758 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Mandatory Access Control Policy (MAC). 758 - Christophe De Cannière:
MARS. 759-760 - Bart Preneel:
MASH Hash Functions (Modular Arithmetic Secure Hash). 761 - Carlisle Adams:
Master Key. 762 - Maurer's Algorithm. 762
- Moses D. Liskov:
Maurer's Method. 762-763 - Tor Helleseth:
Maximal-Length Sequences. 763-766 - Friedrich L. Bauer:
Maxims. 766 - Nicolas Sendrier:
McEliece Public Key Cryptosystem. 767-768 - MD4 Hash Function. 768
- Nicky Mouha:
MD4-MD5. 768-771 - MD5 Hash Function. 771
- Bart Preneel:
MDC-2 and MDC-4. 771-772 - Measurement Models of Software Security. 772
- Alex Biryukov:
Meet-in-the-Middle Attack. 772-773 - XiaoFeng Wang:
Memory and State Exhaustion Denial of Service. 773-774 - Memory and State Exhaustion DoS. 774
- Memory Overflow. 774
- Merkle-Hash-Trees Signatures. 774
- Jerome A. Solinas:
Mersenne Prime. 774-775 - Message Authentication Algorithm. 775
- Guido Salvaneschi, Paolo Salvaneschi:
Metrics of Software Security. 775-778 - Microdata Anonymization Techniques. 778
- Microdata Disclosure Limitation. 778
- Microdata Disclosure Protection. 778
- Josep Domingo-Ferrer:
Microdata Masking Techniques. 778-781 - Sara Foresti:
Microdata Protection. 781-783 - Microdata Statistical Disclosure Control. 784
- Miller-Rabin Test. 785
- Moses D. Liskov:
Miller-Rabin Probabilistic Primality Test. 784-785 - MILS. 785
- Anne Canteaut:
Minimal Polynomial. 785 - Minimal Privilege. 785
- Burt Kaliski:
MIPS-Year. 785-786 - Alex Biryukov:
Miss-in-the-Middle Attack. 786 - Matthew K. Franklin:
Mix Networks. 786-788 - ML-Sequence. 788
- Marijke De Soete:
Mobile Payments. 788-789 - Marijke De Soete:
Mobile Wallet. 789 - Bart Preneel:
Modes of Operation of a Block Cipher. 789-794 - Scott Contini, Çetin Kaya Koç, Colin D. Walter:
Modular Arithmetic. 795-798 - Scott Contini:
Modular Root. 798 - Scott Contini:
Modulus. 798-799 - Monitoring. 799
- David Naccache:
Monotone Signatures. 799 - Çetin Kaya Koç:
Montgomery Arithmetic. 799-803 - Burt Kaliski:
Moore's Law. 803 - MPKC. 804
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC). 804
- Multi-Exponentiation. 808
- Chen-Mou Cheng:
Multi-Threaded Implementation for Cryptography and Cryptanalysis. 823-824 - Arun Ross:
Multibiometrics. 804-808 - Multicast Authentication. 808
- Multicast Stream Authentication. 808
- Multidimensional Databases. 808
- Multifactor Authentication. 808
- Pierangela Samarati, Giovanni Livraga:
Multilevel Database. 809-811 - Frédéric Cuppens, Nora Cuppens-Boulahia:
Multilevel Security Policies. 811-812 - Berry Schoenmakers:
Multiparty Computation. 812-815 - Multiparty Computation (MPC). 815
- Alex Biryukov:
Multiple Encryption. 815 - Jim Alves-Foss:
Multiple Independent Levels of Security. 815-818 - David Naccache:
Multiplicative Knapsack Cryptosystem. 818 - Berk Sunar:
Multiprecision Multiplication. 818-821 - Berk Sunar:
Multiprecision Squaring. 821-822 - Alex Biryukov:
Multiset Attack. 822 - Louis Goubin, Jacques Patarin, Bo-Yin Yang:
Multivariate Cryptography. 824-828
N
- David Naccache:
Naccache-Stern Higher Residues Cryptosystem. 829 - Near Field Communication. 829
- Nearest Vector Problem. 829
- Mike Just
:
Needham-Schroeder Protocols. 829-831 - Bart Preneel:
NESSIE Project. 831-836 - Angelos D. Keromytis:
Network Bandwidth Denial of Service (DoS). 836-838 - Xiaowei Yang:
Network Capabilities. 838-840 - Network DoS. 840
- Network Flooding Attack. 840
- Marc Vauclair:
NFC. 840-842 - NFS. 842
- Nicolas Sendrier:
Niederreiter Encryption Scheme. 842-843 - Darrel Hankerson, Alfred Menezes:
NIST Elliptic Curves. 843-844 - Donggang Liu:
Node Clone Defense. 844-846 - Node Replication. 846
- Cynthia Dwork:
Non-Malleability. 849-852 - Berry Schoenmakers:
Noninteractive Proof. 846 - Caroline Fontaine:
Nonlinear Feedback Shift Register. 846-848 - Claude Carlet:
Nonlinearity of Boolean Functions. 848-849 - Nonrepudiable Agreement. 852
- Mike Just
:
Nonrepudiation of Digital Signatures. 852-854 - Nonrepudiation Protocol. 854
- Gerrit Bleumer:
Nonsecret Encryption. 854-857 - Darrel Hankerson, Alfred Menezes:
NSA Suite B. 857 - NSS. 857
- William Whyte, Jeffrey Hoffstein:
NTRU. 858-861 - NTRUEncrypt. 861
- NTRUSign. 861
- Nucleic Acid. 861
- Burt Kaliski:
Number Field. 861 - Number Field Sieve. 861
- Alexander Kruppa, Paul Leyland:
Number Field Sieve for Factoring. 862-867 - Antoine Joux
, Reynald Lercier:
Number Field Sieve for the DLP. 867-873 - Scott Contini:
Number Theory. 873-879 - Kazue Sako:
Nyberg-Rueppel Signature Scheme. 879 - Nym. 879
O
- Burt Kaliski:
O-Notation. 881-882 - David Pointcheval:
OAEP: Optimal Asymmetric Encryption Padding. 882-884 - Berry Schoenmakers:
Oblivious Transfer. 884-885 - Carlisle Adams:
One Time Password, from a Key Management Perspective. 885 - Mohamed Omar Rayes:
One-Time Password. 885-887 - One-Way Chain. 887
- Matthew J. B. Robshaw:
One-Way Function. 887-888 - One-way property. 888
- Online Analytical Processing. 888
- Operational Separation of Duties. 888
- Christof Paar:
Optimal Extension Fields (OEFs). 888-890 - Burt Kaliski:
Order. 890-891 - Outbound Authentication. 891
- Angelos Stavrou:
Overlay-Based DoS Defenses. 891-897 - Gerrit Bleumer:
Overspender Detection. 897 - Gerrit Bleumer:
Overspending Prevention. 898
P
- Packet Flooding Attack. 899
- Qijun Gu:
Packet-Dropping Attack. 899-902 - Pascal Paillier:
Paillier Encryption and Signature Schemes. 902-903 - Tanja Lange:
Pairing-Based Key Exchange. 903-904 - Edlyn Teske:
Pairing-Friendly Elliptic Curves. 904-907 - Darrel Hankerson, Alfred Menezes:
Pairings. 907-909 - Palmprint Authentication. 909
- David Zhang, Feng Yue, Wangmeng Zuo:
Palmprint Recognition. 909-913 - Parallelizable Message Authentication Code. 913
- Jean-Jacques Quisquater, Gildas Avoine:
Passport Security. 913-916 - Gerald Brose:
Password. 916-918 - Pattern of Blood Vessels. 918
- Marijke De Soete:
Payment Card. 918-919 - Torben Pedersen:
PEM, Privacy-Enhanced Mail. 919-920 - Tom Caddy:
Penetration Testing. 920-921 - Penmanship. 921
- Hugo Krawczyk:
Perfect Forward Secrecy. 921-922 - Yvo Desmedt, Qiushi Yang:
Perfectly Secure Message Transmission. 922-924 - Dwight Horne:
Permissions. 924-927 - Carlisle Adams:
Personal Identification Number (PIN). 927 - PGP. 927
- David Naccache:
Phenotyping. 927 - Phi Function. 927
- Physical Obfuscated Key. 927
- Physical Random Function. 928
- François-Xavier Standaert
, Jean-Jacques Quisquater:
Physical Security. 928-929 - Jorge Guajardo:
Physical Unclonable Functions (PUFs). 929-934 - Peter Landrock, Danny De Cock:
PKCS. 934-935 - Marijke De Soete:
PKI. 935-936 - Mike Just
:
PKI Trust Models. 936-939 - PKI Trust Relationships. 939
- Torben Pedersen:
PKIX, Public Key Infrastructure (X.509). 939-940 - Lorrie Faith Cranor:
Platform for Privacy Preferences (P3P). 940-941 - Friedrich L. Bauer:
Playfair Cipher. 941 - Bart Preneel:
PMAC. 941-942 - Pierrick Gaudry:
Point Counting. 942-944 - POK. 944
- Sabrina De Capitani di Vimercati:
Policy Composition. 944-945 - Friedrich L. Bauer:
Polybios Square Encryption. 945-946 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Polyinstantiation. 946-948 - Burt Kaliski:
Polynomial Time. 948-949 - Friedrich L. Bauer:
Porta Encryption. 949 - Daniel J. Bernstein:
Post-Quantum Cryptography. 949-950