scientific article
zbMath1011.68034MaRDI QIDQ2784264
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry Wallis
Publication date: 22 April 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
identificationRSADEScryptanalysisnetwork securityindistinguishabilityauthenticationcomputer securitythreshold schemesfiltersauthentication codesElGamalelliptic curve cryptographydigital signaturesdifferential cryptanalysishash functionelectronic electionsaccess controlbirthday paradoxpseudorandomnessviruslinear cryptanalysiskey establishmentblind signaturessecret sharing schemeszero-knowledge protocolsAESintrusion detection systemsbiometricsDiffie-Hellman protocolpublic-key cryptosystemsthreshold decryptionthreshold signaturepasswordsundeniable signaturesdatabase securitySPXBAN logicKerberosfail-stop signatureschallenge-response protocolsprobabilistic encryptiontime-stampsOAEPpseudorandom bit generatorsSSLdigital moneybit commitment protocolsIPsec protocolkey-distributionmultiparty key establishment protocolsone-time passwordsprivate-key cryptosystemspseudorandom function generatorspseudorandom permutation generatorsSHA-1 and RIPEMD
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Data encryption (aspects in computer science) (68P25)
Related Items (12)
This page was built for publication: