Home > Computing and Information Technology > Computer security > Data encryption > Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Encyclopedia of Cryptography and Security

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A--Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification Block ciphers and stream ciphers Computational issues Copy protection Cryptanalysis and security Cryptographic protocols Electronic payment and digital certificates Elliptic curve cryptography Factorization algorithms and primality tests Hash functions and MACs Historical systems Identity-based cryptography Implementation aspects for smart cards and standards Key management Multiparty computations like voting schemes Public key cryptography Quantum cryptography Secret sharing schemes Sequences Web security The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject.

Table of Contents:
Preface.- Advisory board members.- List of contributors.- Acknowledgements.- A5/1.- ABA digital signature guidelines .- access control.- access structure.- acquirer.- adaptive chosen ciphertext attack.- adaptive chosen plaintext and chosen ciphertext attack.- adaptive chosen plaintext attack.- Alberti encryption.- alphabet.- anonymity.- asymmetric cryptosystem.- attribute certificate.- attributes management.- authenticated encryption.- authentication.- authentication token.- authorization architecture.- authorization management.- authorization policy.- auto-correlation.- availability.- Beaufort encryption.- Berlekamp-Massey algorithm.- Berlekamp Q matrix.- binary Euclidean algorithm .- binary exponentiation method.- binomial distribution.- biometrics.- birthday paradox.- blind signature.- blinding techniques.- block ciphers.- Blowfish.- BLS short digital signatures.- Blum integer.- Blum-Blum-Shub Pseudorandom bit generator.- Blum-Goldwasser public key encryption system.- Bolero.net.- Boolean functions.- boomerang attack.- broadcast encryption.- Caesar cipher.- Camellia.- CAST.- CBC-MAC and variants.- CCIT-2.- CEPS standard.- certificate.- certificate management.- certificate of primality.- certificate revocation.- certification authority.- certified mail.- chaffing and winnowing.- challenge-response protocol.- Chaum blind signature scheme.- Chinese Remainder Theorem.- chosen ciphertext attack.- chosen plaintext attack.- chosen plaintext-chosen ciphertext attack.- ciphertext only attack.- claw-free.- CLIP-scheme.- clock-controlled generator.- closest vector problem.- code book attack.- collision attack.- collision resistance.- combination generator.- commitment.- Common Criteria.- communication channel anonymity.- compromizing emanations.- computational complexity.- contract signing.- control vector.- copy protection.- correcting-block attack.- correlation attack for stream ciphers.- correlation-immune and resilient Boolean functions.- covert channel.- CPS, Certificate Practice Statement.- Cramer-Shoup public key scheme.- credentials .- cross-correlation.- cryptanalysis (classical).- crypto machines.- cryptology (classical).- cryptosystem.- CRYPTREC (Japanese algorithms evaluation).- cut-and-choose protocol.- cyclic codes.- Data Encryption Standard (DES).- data remanence.- Davies-Meyer.- DC Network.- de Bruijn sequence.- decisional Diffie-Hellmann problem.- decryption exponent.- deniable encryption.- denial-of-service.- derived key.- designated confirmer signature.- DES-X.- dictionary attack (1).- dictionary attack (2).- differential cryptanalysis .- differential power analysis .- differential-linear attack.- Diffie-Hellman key agreement.- Diffie-Hellman problem.- digital signature schemes.- Digital Signature Standard .- digital steganography.- discrete logarithm problem.- E0 (Bluetooth cipher).- eavesdropper.- ECC challenges .- electromagnetic attack.- electronic cash .- electronic cheque.- electronic negotiable instruments.- electronic payment.- electronic postage.- electronic voting schemes.- electronic wallet.- ElGamal digital signature scheme.- ElGamal public key encryption.- elliptic curve cryptography.- elliptic curve discrete logarithm problem .- Elliptic Curve key agreement schemes.- elliptic curve keys.- elliptic curve method for factoring.- elliptic curve point multiplication using halving.- Elliptic Curve public-key encryption schemes.- Elliptic Curve signature schemes.- elliptic curves.- elliptic curves for primality proving.- EMV-standard.- encryption.- encryption exponent.- entitlements management.- entity authentication.- Euclidean algorithm .- Euler's totient function.- exhaustive key search.- existential forgery.- exponential time.- exponentiation algorithms.- extension field.- factor base.- factoring circuits.- fail-stop signature.- fair exchange.- fast correlation attack.- fault attack.- FEAL.- Feistel cipher.- Fermat primality test.- Fermat's little theorem.- Fiat-Shamir identification protocol and Feige Fiat-Shamir signature scheme.- field.- field polynomial.- filter generator.- fingerprinting.- finite field.- FIPS 140.- firewall.- fixed-base exponentiation.- fixed-exponent exponentiation.- forgery.- gap.- generalized Mersenne prime.- generator.- GMR signature.- Goldwasser-Micali encryption scheme.- Golomb's randomness postulates.- GOST.- greatest common divisor.- group .- group key agreement.- group signature.- hard core bit.- Hardware Security Module.- hash function.- HMAC.- homomorphism.- HTTPS, secure HTTP.- IDEA.- identification.- identity based cryptosystems.- identity based encryption.- identity management.- identity verification protocol.- impersonation attack.- impossible-differential attack.- index-calculus method.- information theory.- integer factoring.- interactive argument.- interactive proof.- interpolation attack.- intrusion detection.- invasive attacks.- inversion attack.- inversion in finite fields and rings.- IPES.- IPsec.- irreducible polynomial .- issuer.- Itoh-Tsujii inversion algorithm.- Jacobi symbol.- Karatsuba algorithm.- KASUMI/MISTY1.- Kerberos authentication protocol.- key.- key agreement.- key authentication.- key encryption key.- key escrow.- key management.- knapsack cryptographic schemes.- known plaintext attack .- lattice.- lattice reduction.- lattice-based cryptography.- least common multiple.- Legendre symbol.- linear complexity (or linear equivalence).- linear congruential generator.- linear consistency attack.- linear cryptanalysis for block ciphers.- linear cryptanalysis for stream ciphers.- linear feedback shift register.- linear syndrome attack.- L-notation.- Luby-Rackoff cipher.- MAA.- MAC algorithms.- man-in-the-middle attack.- MARS.- MASH functions (Modular Arithmetic Secure Hash).- master key.- Maurer's method.- maxims.- maximum-length linear sequence.- McEliece public key cryptosystem.- MD4-MD5.- MDC2 and MDC 4 .- meet-in-the-middle attack.- Mersenne prime.- Miller-Rabin probabilistic primality test.- minimal polynomial.- MIPS-year.- miss-in-the-middle attack.- MIX networks.- modes of operation of a block cipher.- modular arithmetic.- modular root.- modulus.- MONDEX-scheme.- Montgomery arithmetic.- Moore's law.- multiparty computation.- multiple encryption.- multi-precision multiplication.- multi-precision squaring.- multi-set attacks.- Needham-Schroeder protocols.- NESSIE project.- Niederreiter encryption scheme.- non-interactive proofs .- nonlinear feedback shift register.- non-linearity of Boolean functions.- non-malleability.- non-repudiation.- non-secret key encryption.- NTRU.- Number field.- Number Field Sieve.- number theory.- Nyberg-Rueppel signature scheme.- OAEP: optimal asymmetric encryption padding.- oblivious transfer.- one-time password.- one-way function.- O-notation.- optimal extension fields.- order.- overspender detection.- overspending prevention.- Paillier encryption and signature schemes.- password.- payment card.- PEM, Privacy Enhanced Mail.- penetration testing.- perfect forward secrecy / PFS.- personal identification number (PIN).- physical attacks.- PKCS.- PKIX - Public Key Infrastructure (X.509).- Playfair cipher.- PMAC.- policy.- Polybios square encryption.- polynomial time.- Porta encryption.- preimage resistance.- Pretty Good Privacy.- primality proving algorithm.- primality test.- prime generation.- prime number.- primitive element.- privacy.- privilege management.- probabilistic primality test.- probabilistic public-key encryption.- product cipher, superencryption.- proof of knowledge vs proof of membership.- propagation characteristics of Boolean functions.- protocol.- Proton.- pseudo Mersenne primes.- pseudo-noise sequence.- pseudonyms.- pseudoprime.- pseudo-random function.- pseudo-random number generator .- public key cryptography.- Public Key Infrastructure.- public key proxy encryption.- public key proxy signatures.- quadratic residue.- Quadratic Residuosity Problem.- Quadratic Sieve.- quantum cryptography.- Rabin cryptosystem.- Rabin digital signature scheme.- radio frequency attacks.- random bit generation (hardware).- random oracle model.- RC4.- RC5.- RC6.- recipient anonymity.- Reed-Muller codes.- Registration Authority.- related key attack.- relatively prime.- relay attack.- replay attack.- response.- resynchronization attack.- rights management.- right-to-left exponentiation.- Rijndael/AES.- ring.- RIPEMD family.- RSA digital signature scheme.- RSA factoring challenge .- RSA problem.- RSA public-key encryption.- run.- running key.- safe prime.- salt.- Schnorr digital signature scheme.- Schnorr Identification Protocol .- SEAL.- second preimage resistance.- secret sharing schemes.- secure signatures from the "strong RSA" assumption.- Secure Socket Layer (SSL) .- security.- Security Architecture.- Security Evaluation Criteria.- security standards activities.- selective forgery.- self-shrinking generator.- self-synchronizing stream cipher.- semantic security.- sender anonymity.- sequences.- Serpent.- SET.- SHA family (Secure Hash Algorithm).- Shamir's threshold scheme.- Shannon's model.- share.- shortest vector problem.- shrinking generator.- side-channel analysis.- side-channel attacks.- sieving.- sieving in function fields .- signcryption.- signed digit exponentiation.- simultaneous exponentiation.- Skipjack.- slide attack.- sliding window exponentiation .- smartcard tamper resistance.- S/MIME.- smoothness.- smoothness probability.- solitaire.- SPKI.- SSH.- station-to-station protocol / STS protocol.- stream cipher.- strong prime.- strong RSA assumption.- structural cryptanalysis.- sub-exponential time.- subgroup.- subgroup cryptosystems.- substitutions and permutations.- substitution-permutation (SP) network.- summation generator.- symmetric cryptosystem.- synchronous stream cipher.- tamper detection.- tamper resistance.- tamper response.- tempest.- threshold cryptography.- threshold scheme.- threshold signature.- time stamping.- time-memory tradeoffs.- timing attack.- token.- traitor tracing.- Transport Layer Security (TLS).- trapdoor one-way function .- Triple DES.- Trojan horses, computer viruses and worms .- truncated differentials.- trust models.- trusted third party.- TWIRL.- two-factor authentication.- TWOFISH.- two-to-the-k-ary exponentiation.- undeniable signatures.- Universal One-Way Hash Functions (UOWHF).- unlinkability.- untraceability.- user authentication.- verifiable encryption.- verifiable secret sharing .- Vernam cipher.- Vigenere cryptosystem .- virus protection.- visual secret sharing scheme.- watermarking.- weak keys.- web security.- Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem.- witness hiding.- X.509.- zero-knowledge.- Index.


Best Sellers


Product Details
  • ISBN-13: 9780387335575
  • Publisher: Springer-Verlag New York Inc.
  • Publisher Imprint: Springer-Verlag New York Inc.
  • Height: 279 mm
  • No of Pages: 696
  • Series Title: English
  • Width: 216 mm
  • ISBN-10: 0387335579
  • Publisher Date: 21 Sep 2006
  • Binding: Undefined
  • Language: English
  • Returnable: Y
  • Weight: 700 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Encyclopedia of Cryptography and Security
Springer-Verlag New York Inc. -
Encyclopedia of Cryptography and Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Encyclopedia of Cryptography and Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA