Encyclopedia of Cryptography and Security 2005
Henk C. A. van Tilborg (Ed.):
Encyclopedia of Cryptography and Security.
Springer 2005, ISBN 978-0-387-23473-1
A
B
C
D
E
- Caroline Fontaine:
E0 (Bluetooth).
- Jean-Jacques Quisquater:
Eavesdropper.
- Darrel Hankerson, Alfred Menezes:
ECC Challenges.
- Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack.
- Gerrit Bleumer:
Electronic Cash.
- Peter Landrock:
Electronic Cheque.
- Peter Landrock:
Electronic Negotiable Instruments.
- Gerrit Bleumer:
Electronic payment.
- Gerrit Bleumer:
Electronic Postage.
- Kazue Sako:
Electronic Voting Schemes.
- Gerrit Bleumer:
Electronic Wallet.
- Dan Boneh:
Elgamal Digital Signature Scheme.
- Yvo Desmedt:
ElGamal Public Key Encryption.
- Darrel Hankerson, Alfred Menezes:
Elliptic Curve.
- Darrel Hankerson, Alfred Menezes:
Elliptic Curve Cryptography.
- Darrel Hankerson, Alfred Menezes:
Elliptic Curve Discrete Logarithm Problem.
- Darrel Hankerson, Alfred Menezes:
Elliptic Curve Key Agreement Schemes.
- Darrel Hankerson, Alfred Menezes:
Elliptic Curve Keys.
- Paul Zimmermann:
Elliptic Curve Method.
- Darrel Hankerson, Alfred Menezes:
Elliptic Curve Point Multiplication Using Halving.
- Darrel Hankerson, Alfred Menezes:
Elliptic Curve Public-Key Encryption Schemes.
- Darrel Hankerson, Alfred Menezes:
Elliptic Curve Signature Schemes.
- François Morain:
Elliptic Curves for Primality Proving.
- Marijke De Soete, Michael Ward:
EMV.
- Friedrich L. Bauer:
Encryption.
- Burton S. Kaliski Jr.:
Encryption Exponent.
- Carlisle Adams:
Entitlements Management.
- Robert J. Zuccherato:
Entity Authentication.
- Berk Sunar:
Euclidean Algorithm.
- Burton S. Kaliski Jr.:
Euler's Totient Function.
- Michael Wiener:
Exhaustive Key Search.
- Gerrit Bleumer:
Existential Forgery.
- Burton S. Kaliski Jr.:
Exponential Time.
- Christof Paar:
Exponentiation Algorithms.
- Burton S. Kaliski Jr.:
Extension Field.
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Copyright © Fri Mar 12 17:34:44 2010
by Michael Ley (ley@uni-trier.de)