Back to Results
First PageMeta Content
FEAL / Lecture Notes in Computer Science / International Cryptology Conference / Computational hardness assumptions / Cryptographic protocols / Diffie–Hellman problem / Index of cryptography articles / Cryptography / LOKI / Data Encryption Standard


This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi
Add to Reading List

Document Date: 2011-07-10 02:35:13


Open Document

File Size: 448,27 KB

Share Result on Facebook

City

San Francisco / Springer-Verlag / Reading / Palo Alto / New York / Berlin / Rome / Cambridge / /

Company

Cipher Systems / MIT Press / IEEE Global Telecommunications / Digital Equipment Corporation / References SIAM Journal / Clarendon Press / IEEE Computer Society Press / Secure Information Systems / AND S.A. / Aegean Park Press / ACM Press / SIAM Journal / IEEE Press / IEEE Journal / CRC Press Inc. / John Wiley & Sons / Fast Software Encryption / /

Country

Italy / /

Event

FDA Phase / /

Facility

University of California / Institute of Mathematics / /

IndustryTerm

retail environment / subexponential algorithm / personal communications services / institution multiple center key management / Internet Society Symposium / multiplication algorithm / identification systems / secrecy applications / cryptography using reversible algorithms / lightweight protocols / institution retail message authentication / symmetric key generation systems / services retail key management / secure hash algorithm / computer data communications / acceptable key escrow systems / incremental search / insecure server / secure communications / cryptographic protocols / portable communications system / factorization algorithm / cryptographic systems / cryptography using irreversible algorithms / public key encryption algorithm / signal processor / communication security services / signature algorithm / /

Organization

American Bankers Association / American National Standards Institute / ASC X9 Secretariat / Computer Science Division / Institute of Mathematics / Providence / American Mathematical Society / MIT / University of California / Berkeley / Association for Computing Machinery / /

Person

Rabin / B. Preneel / J. Vandewalle / D. Gollmann / G.J. Simmons / F. C HANG / H.W. Lenstra Jr. / OMER ANCE / TOR NETTA / Y. YA COBI / Contemporary Cryptology / Applied Cryptography / A. VAN T ILBORG / W. Wolfowicz / R. Anderson / Algebric Coding / R. Govaerts / A.K. Lenstra / Integrity Primitives / P.G. Farrell / M. B URMESTER / V / /

Position

editor / References editor / /

Product

20th Annual Symposium / 25th Annual Symposium / DiffieHellman / 23rd Annual Symposium / 22nd Annual Symposium / 26th Annual Symposium / X9 / EEC-RACE / /

ProgrammingLanguage

E / L / R / C / /

ProvinceOrState

Quebec / New York / Rhode Island / California / Laguna / North Carolina / Massachusetts / /

PublishedMedium

The Computer Journal / SIAM Journal on Computing / IEEE Transactions on Information Theory / Scientific American / The Quarterly Journal / IEEE Transactions on Computers / Mathematics of Computation / Annals of Mathematics / Theory of Computing / /

Technology

Public key cryptography using irreversible algorithms / lightweight protocols / secure hash algorithm / secret key / subexponential algorithm / Financial institution encryption / RSA signature algorithm / PCS / WAN / improved Monte Carlo factorization algorithm / Encryption / Data Encryption Algorithm / cryptography / Hash algorithms / digital signature / digital signature algorithm / Sieve algorithms / computer algorithm / password-based protocol / key distribution protocol / data encryption / Public key cryptography using reversible algorithms / private key / Number-Theoretic Algorithms / public key / multiplication algorithm / simulation / public key encryption algorithm / stream cipher / /

URL

www.cacr.math.uwaterloo.ca/hac / /

SocialTag