language:
Find link is a tool written by Edward Betts.searching for encyclopedia of Cryptography and Security 27 found (32 total)
alternate case: Encyclopedia of Cryptography and Security
Message Authenticator Algorithm
(945 words)
[view diff]
exact match in snippet
view article
find links to article
(SCN’96). Preneel, Bart (2011). "MAA". Encyclopedia of Cryptography and Security. Encyclopedia of Cryptography and Security. pp. 741–742. doi:10.1007/978-1-4419-5906-5_591Product cipher (278 words) [view diff] exact match in snippet view article find links to article
Biryukov, Alex (2005). "Product Cipher, Superencryption". Encyclopedia of Cryptography and Security. Springer US. pp. 480–481. doi:10.1007/0-387-23483-7_320Solinas prime (761 words) [view diff] exact match in snippet view article find links to article
In Tilborg, Henk C. A. van; Jajodia, Sushil (eds.). Encyclopedia of Cryptography and Security. Springer US. pp. 509–510. doi:10.1007/978-1-4419-5906-5_32Digital signature forgery (763 words) [view diff] exact match in snippet view article find links to article
Selective Forgery. In: van Tilborg H.C.A., Jajodia S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_225Christopher Tarnovsky (536 words) [view diff] exact match in snippet view article find links to article
April 2012. Van Tilborg H. (ed.) Christopher Tarnovsky. Encyclopedia of Cryptography and Security, Springer, 10 August 2005. ISBN 978-0387234731 AccessedRan Canetti (1,777 words) [view diff] exact match in snippet view article find links to article
Chapter on the Decisional Diffie-Hellman Assumption. Encyclopedia of Cryptography and Security, H. van Tilborg, Henk (Ed.), Springer-Verlag, 2005. BellareQuadratic residuosity problem (1,204 words) [view diff] exact match in snippet view article find links to article
Kaliski, Burt (2011). "Quadratic Residuosity Problem". Encyclopedia of Cryptography and Security. p. 1003. doi:10.1007/978-1-4419-5906-5_429. ISBN 978-1-4419-5905-8Auguste Kerckhoffs (579 words) [view diff] exact match in snippet view article find links to article
Principle". In van Tilborg, H.C.A.; Jajodia, S (eds.). Encyclopedia of Cryptography and Security. Boston: Springer US. p. 675. doi:10.1007/978-1-4419-5906-5_487Virtual machine introspection (510 words) [view diff] exact match in snippet view article find links to article
in van Tilborg, Henk C. A.; Jajodia, Sushil (eds.), Encyclopedia of Cryptography and Security, Boston, MA: Springer US, pp. 1360–1362, doi:10Melin-y-Wig (387 words) [view diff] exact match in snippet view article find links to article
2020. Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1Authenticated encryption (2,085 words) [view diff] exact match in snippet view article find links to article
2023-06-08. Black, J. (2005). "Authenticated encryption". Encyclopedia of Cryptography and Security. Springer US. pp. 11–21. doi:10.1007/0-387-23483-7_15Challenge–response authentication (1,560 words) [view diff] exact match in snippet view article find links to article
Henk C.A. van Tilborg; Sushil Jajodia (8 July 2014). Encyclopedia of Cryptography and Security. Springer Science & Business Media. ISBN 978-1-4419-5906-5Hash-based cryptography (2,265 words) [view diff] exact match in snippet view article find links to article
draft-mcgrew-hash-sigs-07". GitHub. T. Lange. "Hash-Based Signatures". Encyclopedia of Cryptography and Security, Springer U.S., 2011. [2] F. T. Leighton, S. Micali. "LargeInteger factorization (2,924 words) [view diff] exact match in snippet view article find links to article
in van Tilborg, Henk C. A.; Jajodia, Sushil (eds.), Encyclopedia of Cryptography and Security, Boston, MA: Springer US, pp. 611–618, doi:10.1007/978-1-4419-5906-5_455Military intelligence (2,628 words) [view diff] exact match in snippet view article find links to article
disciplines Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1Paulo S. L. M. Barreto (821 words) [view diff] exact match in snippet view article find links to article
2018. van Tilborg, Henk C. A.; Jajodia, Sushil (2011). Encyclopedia of Cryptography and Security (2nd ed.). Springer New York, NY. doi:10.1007/978-1-4419-5906-5Multi-factor authentication (4,511 words) [view diff] exact match in snippet view article find links to article
van Tilborg, Henk C.A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security, Volume 1. Berlin, Germany: Springer Science & BusinessCryptonomicon (3,418 words) [view diff] exact match in snippet view article find links to article
van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security. Springer reference (2nd ed.). New York: Springer.Data remanence (3,810 words) [view diff] case mismatch in snippet view article find links to article
NIST. 6 September 2012. Retrieved 2014-06-23. (542 KB) Encyclopedia of cryptography and security. Tilborg, Henk C. A. van, 1947-, Jajodia, Sushil. ([2ndExtensible Authentication Protocol (4,172 words) [view diff] exact match in snippet view article find links to article
GitHub Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1Data re-identification (3,095 words) [view diff] exact match in snippet view article find links to article
information Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1Block cipher (6,475 words) [view diff] exact match in snippet view article find links to article
van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security. Springer. ISBN 978-1-4419-5905-8., p. 455. van TilborgVigenère cipher (5,929 words) [view diff] exact match in snippet view article find links to article
ISBN 978-0-13-604729-2. Henk C.A. van Tilborg, ed. (2005). Encyclopedia of Cryptography and Security (First ed.). Springer. pp. 115. ISBN 0-387-23473-X. MountjoyInformation security (22,122 words) [view diff] exact match in snippet view article find links to article
Landrock, Peter (2005). "Two-Factor Authentication". Encyclopedia of Cryptography and Security. p. 638. doi:10.1007/0-387-23483-7_443. ISBN 978-0-387-23473-1Mersenne prime (6,328 words) [view diff] exact match in snippet view article find links to article
In Tilborg, Henk C. A. van; Jajodia, Sushil (eds.). Encyclopedia of Cryptography and Security. Springer US. pp. 509–510. doi:10.1007/978-1-4419-5906-5_32United States Postal Service (20,667 words) [view diff] case mismatch in snippet view article find links to article
van Tilborg, Henk C. A. (2005). "Electronic Postage". Encyclopedia of cryptography and security. Springer. ISBN 978-0-387-23473-1. Archived from the originalRound (cryptography) (937 words) [view diff] exact match in snippet view article
Biryukov, Alex (2005). "Product Cipher, Superencryption". Encyclopedia of Cryptography and Security. Springer US. pp. 480–481. doi:10.1007/0-387-23483-7_320