skip to main content
Skip header Section
Encyclopedia of Cryptography and SecuritySeptember 2011
Publisher:
  • Springer Publishing Company, Incorporated
ISBN:978-1-4419-5905-8
Published:06 September 2011
Pages:
1475
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Expanded into two volumes, the Second Edition of Springers Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security. As a critical enhancement to the First Editions base of 464 entries, the information in the Encyclopedia is relevant for researchers and professionals alike. Topics for this comprehensive reference were elected, written, and peer-reviewed by a pool of distinguished researchers in the field. The Second Editions editorial board now includes 34 scholars, which was expanded from 18 members in the First Edition. Representing the work of researchers from over 30 countries, the Encyclopedia is broad in scope, covering everything from authentication and identification to quantum cryptography and web security. The texts practical style is instructional, yet fosters investigation. Each area presents concepts, designs, and specific implementations. The highly-structured essays in this work include synonyms, a definition and discussion of the topic, bibliographies, and links to related literature. Extensive cross-references to other entries within the Encyclopedia support efficient, user-friendly searches for immediate access to relevant information. Key concepts presented in the Encyclopedia of Cryptography and Security include: Authentication and identification; Block ciphers and stream ciphers; Computational issues; Copy protection; Cryptanalysis and security; Cryptographic protocols; Electronic payment and digital certificates; Elliptic curve cryptography; Factorization algorithms and primality tests; Hash functions and MACs; Historical systems; Identity-based cryptography; Implementation aspects for smart cards and standards; Key management; Multiparty computations like voting schemes; Public key cryptography; Quantum cryptography; Secret sharing schemes; Sequences; Web Security. Topics covered: Data Structures, Cryptography and Information Theory; Data Encryption; Coding and Information Theory; Appl.Mathematics/Computational Methods of Engineering; Applications of Mathematics; Complexity. This authoritative reference will be published in two formats: print and online. The online edition features hyperlinks to cross-references, in addition to significant research.

Cited By

  1. ACM
    Liu F and Zhao X Disclosure Risk from Homogeneity Attack in Differentially Private Release of Frequency Distribution Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, (343-345)
  2. ACM
    Parameshwarappa P, Chen Z and Koru G (2021). Anonymization of Daily Activity Data by Using ℓ-diversity Privacy Model, ACM Transactions on Management Information Systems, 12:3, (1-21), Online publication date: 17-Jul-2021.
  3. ACM
    Kominers S (2019). Good markets (really do) make good neighbors, ACM SIGecom Exchanges, 16:2, (12-26), Online publication date: 7-May-2019.
  4. Whitehill J How does knowledge of the AUC constrain the set of possible ground-truth labelings? Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (5425-5432)
  5. ACM
    Zhang Y, Zhao X, Li X, Zhong M, Curtis C and Chen C Enabling Privacy-Preserving Sharing of Genomic Data for GWASs in Decentralized Networks Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, (204-212)
  6. ACM
    Kotinas I and Fakotakis N Text Analysis for Decision Making under Adversarial Environments Proceedings of the 10th Hellenic Conference on Artificial Intelligence, (1-6)
  7. Rezakhani A, Shirazi H and Modiri N (2018). A novel multilayer AAA model for integrated applications, Neural Computing and Applications, 29:10, (887-901), Online publication date: 1-May-2018.
  8. Mandal S, Mohanty S and Majhi B (2018). Design of electronic payment system based on authenticated key exchange, Electronic Commerce Research, 18:2, (359-388), Online publication date: 1-Jun-2018.
  9. Palacios-Luengas L, Delgado-Gutiérrez G, Díaz-Méndez J and Vázquez-Medina R (2018). Symmetric cryptosystem based on skew tent map, Multimedia Tools and Applications, 77:2, (2739-2770), Online publication date: 1-Jan-2018.
  10. Qasaimeh M, Al-Qassas R and Tedmori S (2018). Software randomness analysis and evaluation of lightweight ciphers, Multimedia Tools and Applications, 77:14, (18415-18449), Online publication date: 1-Jul-2018.
  11. ACM
    Gazizullina A Fully homomorphic encryption scheme for secure computation Companion Proceedings of the 2nd International Conference on the Art, Science, and Engineering of Programming, (224-226)
  12. Neha and Chatterjee K (2017). An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment, Wireless Personal Communications: An International Journal, 97:3, (4729-4745), Online publication date: 1-Dec-2017.
  13. Stojanović B, Marques O and Nešković A (2017). Latent overlapped fingerprint separation, Multimedia Tools and Applications, 76:15, (16263-16290), Online publication date: 1-Aug-2017.
  14. ACM
    Pietro R, Lombardi F and Villani A (2016). CUDA Leaks, ACM Transactions on Embedded Computing Systems, 15:1, (1-25), Online publication date: 20-Feb-2016.
  15. ACM
    Neto A, Souza A, Cunha I, Nogueira M, Nunes I, Cotta L, Gentille N, Loureiro A, Aranha D, Patil H and Oliveira L AoT Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, (1-15)
  16. ACM
    Bahri L, Carminati B and Ferrari E (2016). COIP—Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles, ACM Transactions on the Web, 10:4, (1-41), Online publication date: 27-Dec-2016.
  17. Wan G, Lu D and Tong M (2016). An efficient encoding and decoding algorithm for tracking circulation of commodity by discretizing information matrix, International Journal of Numerical Modelling: Electronic Networks, Devices and Fields, 29:6, (1106-1117), Online publication date: 1-Nov-2016.
  18. ACM
    Bilogrevic I and Ortlieb M "If You Put All The Pieces Together..." Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (5215-5227)
  19. ACM
    Dwivedi S Computing Modular Exponentiation for Fixed-Exponent Proceedings of the 8th Annual ACM India Conference, (89-94)
  20. Macher G, Höller A, Sporer H, Armengaud E and Kreiner C A Comprehensive Safety, Security, and Serviceability Assessment Method Proceedings of the 34th International Conference on Computer Safety, Reliability, and Security - Volume 9337, (410-424)
  21. Chand Gupta K and Ghosh Ray I On Constructions of Circulant MDS Matrices for Lightweight Cryptography Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (564-576)
Contributors
  • George Mason University

Recommendations