Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Encyclopedia of Cryptography and Security 27 found (32 total)

alternate case: encyclopedia of Cryptography and Security

Message Authenticator Algorithm (945 words) [view diff] exact match in snippet view article find links to article

(SCN’96). Preneel, Bart (2011). "MAA". Encyclopedia of Cryptography and Security. Encyclopedia of Cryptography and Security. pp. 741–742. doi:10.1007/978-1-4419-5906-5_591
Product cipher (278 words) [view diff] exact match in snippet view article find links to article
Biryukov, Alex (2005). "Product Cipher, Superencryption". Encyclopedia of Cryptography and Security. Springer US. pp. 480–481. doi:10.1007/0-387-23483-7_320
Solinas prime (761 words) [view diff] exact match in snippet view article find links to article
In Tilborg, Henk C. A. van; Jajodia, Sushil (eds.). Encyclopedia of Cryptography and Security. Springer US. pp. 509–510. doi:10.1007/978-1-4419-5906-5_32
Christopher Tarnovsky (536 words) [view diff] exact match in snippet view article find links to article
April 2012. Van Tilborg H. (ed.) Christopher Tarnovsky. Encyclopedia of Cryptography and Security, Springer, 10 August 2005. ISBN 978-0387234731 Accessed
Digital signature forgery (763 words) [view diff] exact match in snippet view article find links to article
Selective Forgery. In: van Tilborg H.C.A., Jajodia S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_225
Ran Canetti (1,777 words) [view diff] exact match in snippet view article find links to article
Chapter on the Decisional Diffie-Hellman Assumption. Encyclopedia of Cryptography and Security, H. van Tilborg, Henk (Ed.), Springer-Verlag, 2005. Bellare
Quadratic residuosity problem (1,137 words) [view diff] exact match in snippet view article find links to article
Kaliski, Burt (2011). "Quadratic Residuosity Problem". Encyclopedia of Cryptography and Security. p. 1003. doi:10.1007/978-1-4419-5906-5_429. ISBN 978-1-4419-5905-8
Auguste Kerckhoffs (579 words) [view diff] exact match in snippet view article find links to article
Principle". In van Tilborg, H.C.A.; Jajodia, S (eds.). Encyclopedia of Cryptography and Security. Boston: Springer US. p. 675. doi:10.1007/978-1-4419-5906-5_487
Virtual machine introspection (510 words) [view diff] exact match in snippet view article find links to article
in van Tilborg, Henk C. A.; Jajodia, Sushil (eds.), Encyclopedia of Cryptography and Security, Boston, MA: Springer US, pp. 1360–1362, doi:10
Authenticated encryption (2,085 words) [view diff] exact match in snippet view article find links to article
2023-06-08. Black, J. (2005). "Authenticated encryption". Encyclopedia of Cryptography and Security. Springer US. pp. 11–21. doi:10.1007/0-387-23483-7_15
Melin-y-Wig (387 words) [view diff] exact match in snippet view article find links to article
2020. Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1
Challenge–response authentication (1,560 words) [view diff] exact match in snippet view article find links to article
Henk C.A. van Tilborg; Sushil Jajodia (8 July 2014). Encyclopedia of Cryptography and Security. Springer Science & Business Media. ISBN 978-1-4419-5906-5
Hash-based cryptography (2,264 words) [view diff] exact match in snippet view article find links to article
draft-mcgrew-hash-sigs-07". GitHub. T. Lange. "Hash-Based Signatures". Encyclopedia of Cryptography and Security, Springer U.S., 2011. [2] F. T. Leighton, S. Micali. "Large
Integer factorization (2,924 words) [view diff] exact match in snippet view article find links to article
in van Tilborg, Henk C. A.; Jajodia, Sushil (eds.), Encyclopedia of Cryptography and Security, Boston, MA: Springer US, pp. 611–618, doi:10.1007/978-1-4419-5906-5_455
Military intelligence (2,628 words) [view diff] exact match in snippet view article find links to article
disciplines Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1
Paulo S. L. M. Barreto (821 words) [view diff] exact match in snippet view article find links to article
2018. van Tilborg, Henk C. A.; Jajodia, Sushil (2011). Encyclopedia of Cryptography and Security (2nd ed.). Springer New York, NY. doi:10.1007/978-1-4419-5906-5
Multi-factor authentication (4,511 words) [view diff] exact match in snippet view article find links to article
van Tilborg, Henk C.A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security, Volume 1. Berlin, Germany: Springer Science & Business
Cryptonomicon (3,418 words) [view diff] exact match in snippet view article find links to article
van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security. Springer reference (2nd ed.). New York: Springer.
Data remanence (3,810 words) [view diff] case mismatch in snippet view article find links to article
NIST. 6 September 2012. Retrieved 2014-06-23. (542 KB) Encyclopedia of cryptography and security. Tilborg, Henk C. A. van, 1947-, Jajodia, Sushil. ([2nd
Extensible Authentication Protocol (4,172 words) [view diff] exact match in snippet view article find links to article
GitHub Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1
Data re-identification (3,093 words) [view diff] exact match in snippet view article find links to article
information Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1
Block cipher (6,542 words) [view diff] exact match in snippet view article find links to article
van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security. Springer. ISBN 978-1-4419-5905-8., p. 455. van Tilborg
Information security (22,104 words) [view diff] exact match in snippet view article find links to article
Landrock, Peter (2005). "Two-Factor Authentication". Encyclopedia of Cryptography and Security. p. 638. doi:10.1007/0-387-23483-7_443. ISBN 978-0-387-23473-1
Vigenère cipher (5,929 words) [view diff] exact match in snippet view article find links to article
ISBN 978-0-13-604729-2. Henk C.A. van Tilborg, ed. (2005). Encyclopedia of Cryptography and Security (First ed.). Springer. pp. 115. ISBN 0-387-23473-X. Mountjoy
Mersenne prime (6,328 words) [view diff] exact match in snippet view article find links to article
In Tilborg, Henk C. A. van; Jajodia, Sushil (eds.). Encyclopedia of Cryptography and Security. Springer US. pp. 509–510. doi:10.1007/978-1-4419-5906-5_32
United States Postal Service (20,708 words) [view diff] case mismatch in snippet view article find links to article
van Tilborg, Henk C. A. (2005). "Electronic Postage". Encyclopedia of cryptography and security. Springer. ISBN 978-0-387-23473-1. Archived from the original
Round (cryptography) (937 words) [view diff] exact match in snippet view article
Biryukov, Alex (2005). "Product Cipher, Superencryption". Encyclopedia of Cryptography and Security. Springer US. pp. 480–481. doi:10.1007/0-387-23483-7_320