Skip to main content
  • Reference work
  • Oct 2005

Encyclopedia of Cryptography and Security

  • Broad A-Z coverage in over 460 entries of up to 7 pages length
  • Easily accessible to professionals in all fields who are interested in a particular aspect of the broad field of computer security or cryptology but who lack the time to study one of the many technically-detailed books on the subject
  • No other accessible reference book on information security is currently available
  • Includes over 2500 useful literature references

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (463 entries)

  1. Front Matter

  2. A

    1. A5/1

      • Anne Canteaut
      Pages 1-2
    2. ABA digital signature guidelines

      • Peter Landrock
      Pages 2-2
    3. Access Control

      • Gerald Brose
      Pages 2-7
    4. Access structure

      • Yvo Desmedt
      Pages 7-7
    5. Acquirer

      • Peter Landrock
      Pages 7-7
    6. Adaptive Chosen Ciphertext Attack

      • Alex Biryukov
      Pages 7-7
    7. Adaptive Chosen Plaintext Attack

      • Alex Biryukov
      Pages 8-8
    8. Alberti encryption

      • Friedrich L. Bauer
      Pages 8-9
    9. Alphabet

      • Friedrich L. Bauer
      Pages 9-10
    10. Anonymity

      • Gerrit Bleumer
      Pages 10-11
    11. Asymmetric Cryptosystem

      • Burt Kaliski
      Pages 11-11
    12. Attribute certificate

      • Peter Landrock
      Pages 11-11
    13. Attributes management

      • Carlisle Adams
      Pages 11-11
    14. Authenticated encryption

      • J. Black
      Pages 11-21
    15. Authentication

      • Grigory Kabatiansky, Ben Smeets
      Pages 21-22
    16. Authentication token

      • Robert Zuccherato
      Pages 23-23
    17. Authorization architecture

      • Carlisle Adams
      Pages 23-27
    18. Authorizations management

      • Carlisle Adams
      Pages 27-27

About this book

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total.

Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world’s leading scholars and practitioners. Main subject areas include:

Authentication and identification.- Block ciphers and stream ciphers.- Computational issues.- Copy protection.- Cryptanalysis and security.- Cryptographic protocols.- Electronic payment and digital certificates.- Elliptic curve cryptography.- Factorization algorithms and primality tests.- Hash functions and MACs.- Historical systems.- Identity-based cryptography.- Implementation aspects for smart cards and standards.- Key management.- Multiparty computations like voting schemes.- Public key cryptography.- Quantum cryptography.- Secret sharing schemes.- Sequences.- Web security.

The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest.

The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject.

Reviews

From the reviews:

"Readers of this book will first be impressed by its size and high-quality binding. The first impression suggests a monumental piece of work … . Information security specialists will benefit by having this concise reference. … The real strength of the book is that it is an excellent reference; taking this reference along while traveling would be great … . this book is the best work reference available, and thus a must-have for all researchers and writers working with information technology (IT) security." (Edgar R. Weippl, Computing Reviews, May, 2006)

Editors and Affiliations

  • Eindhoven, The Netherlands

    Henk C. A. Tilborg

About the editor

Advisory Board Members

Carlisle Adams, Entrust, Inc.

Friedrich Bauer, Technische Universität München

Gerrit Bleumer, Francotyp-Postalia

Dan Boneh, Stanford University

Pascale Charpin, INRIA-Rocquencourt

Claude Crepeau, McGill University

Yvo Desmedt, University of London

Grigory Kabatiansky, Institute for Information Transmission Problems

Burt Kaliski, RSA Security

Peter Landrock, University of Aarhus

Patrick McDaniel, Penn State University

Alfred Menezes, University of Waterloo

David Naccache, Gemplus

Christof Paar, Ruhr-Universität Bochum

Bart Preneel, Katholieke Universiteit Leuven

Jean-Jacques Quisquater, Université Catholique de Louvain

Kazue Sako, NEC Corporation

Berry Schoenmakers, Technische Universiteit Eindhoven

Bibliographic Information