Skip to main content
  • Reference work
  • © 2011

Encyclopedia of Cryptography and Security

  • Definitive information on cryptography and information security from highly regarded researchers
  • Effective tool for professionals in many fields and researchers of all levels
  • 5643 references, more than twice the number of references that appear in the First Edition

Buy it now

Buying options

eBook USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (1175 entries)

  1. Front Matter

    Pages i-xl
  2. A

    1. A5/1

      • Anne Canteaut
      Pages 1-2
    2. Access Control

      • Gerald Brose
      Pages 2-7
    3. Access Control Lists

      • Hakki C. Cankaya
      Pages 9-12
    4. Access Control Matrix

      • Aaron Estes
      Pages 12-13
    5. Access Control Policies, Models, and Mechanisms

      • Sabrina De Capitani di Vimercati
      Pages 13-14
    6. Access Control Rules

      Pages 14-14
    7. Access Limitation

      Pages 14-14
    8. Access Lists

      Pages 14-14
    9. Access Matrix

      • Sabrina De Capitani di Vimercati
      Pages 14-17
    10. Access Pattern

      • Davide Martinenghi
      Pages 17-20
    11. Access Rights

      Pages 20-20
    12. Access Structure

      • Yvo Desmedt
      Pages 20-20
    13. ACM

      Pages 20-20
    14. Acquirer

      • Marijke De Soete
      Pages 20-20
    15. Adaptive Chosen Ciphertext Attack

      • Alex Biryukov
      Pages 21-21
    16. Adaptive Chosen Plaintext Attack

      • Alex Biryukov
      Pages 21-21
    17. Administrative Policies

      • Pierangela Samarati
      Pages 21-23

About this book

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition  5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security. As a critical enhancement to the First Edition’s base of 464 entries, the information in the Encyclopedia is relevant for researchers and professionals alike. Topics for this comprehensive reference were elected, written, and peer-reviewed by a pool of distinguished researchers in the field. The Second Edition’s editorial board now includes 34 scholars, which was expanded from 18 members in the First Edition. Representing the work of researchers from over 30 countries, the Encyclopedia is broad in scope, covering everything from authentication and identification to quantum cryptography and web security. The text’s practical style is instructional, yet fosters investigation. Each area presents concepts, designs, and specific implementations. The highly-structured essays in this work include synonyms, a definition and discussion of the topic, bibliographies, and links to related literature.  Extensive cross-references to other entries within the Encyclopedia support efficient, user-friendly searches for immediate access to relevant information.  Key concepts presented in the Encyclopedia of Cryptography and Security include: Authentication and identification; Block ciphers and stream ciphers; Computational issues; Copy protection; Cryptanalysisand security; Cryptographic protocols; Electronic payment and digital certificates; Elliptic curve cryptography; Factorization algorithms and primality tests; Hash functions and MACs; Historical systems; Identity-based cryptography; Implementation aspects for smart cards and standards; Key management; Multiparty computations like voting schemes; Public key cryptography; Quantum cryptography; Secret sharing schemes; Sequences; Web Security. Topics covered: Data Structures, Cryptography and Information Theory; Data Encryption; Coding and Information Theory; Appl.Mathematics/Computational Methods of Engineering; Applications of Mathematics; Complexity. This authoritative reference will be published in two formats: print and online.  The online edition features hyperlinks to cross-references, in addition to significant research.  

Editors and Affiliations

  • Department of Mathematics and Computing Science, Eindhoven University of Technology, Eindhoven, The Netherlands

    Henk C. A. van Tilborg

  • Center for Secure Information Systems, George Mason University, Fairfax, USA

    Sushil Jajodia

About the editors

Henk C.A. van Tilborg is the Scientific Director of the research school EIDMA (Euler Institute for DiscreteMathematics and its Applications) and the Eindhoven Institute for the Protection of Systems and Information EIPSI. He is a board member ofWIC (Werkgemeenschap voor Informatie en Communicatietheorie). Dr. van Tilborg received his M.Sc. () and Ph.D. degree () from the Eindhoven University of Technology, the Netherlands. He was working as associate professor at the university, before he became a full professor in . During – he also served a part-time professorship at the Dutch Open University. He has also been a visiting professor at California Institute of Technology, the University of Pretoria and Macquarie University and visiting scientist at the IBM Almaden Research Center and Bell Laboratories. He has been involved in the organization ofmany international conferences.He was the program committee co-chair of ISIT- (IEEE International Symposium on InformationTheory), Germany. He was Program Committee Member of WCC,WCC,WCC,WCC, and WCC (Workshop on Coding theory and Cryptography). He has been the advisor of about  Ph.D. and M.Sc. students in the area of coding theory and cryptography. Dr. van Tilborg has written three books, two on cryptology and one on coding theory. He is the (co-)author of more than  articles in leading journals and also holds two patents. He is the Associate editor of Designs, Codes and Cryptography and Journal of Combinatorics, Information & System Sciences. From April –December  he was the Associate editor for the Journal of the Indonesian Mathematical Society. He is also the Advisory editor of Advances in Mathematics of Communications since  January  and editor of the Asian-European Journal of Mathematics.

Sushil Jajodia is University Professor, BDM International Professor of Information Technology, and the director of Center for Secure Information Systems at the George Mason University, Fairfax, Virginia. He served as the chair of the Department of Information and Software Engineering during -0.He joined GMU after serving as the director of the Database and Expert Systems Program within the Division of Information, Robotics, and Intelligent Systems at the National Science Foundation. Before that he was the head of the Database and Distributed Systems Section in the Computer Science and Systems Branch at the Naval Research Laboratory, Washington and Associate Professor of Computer Science and Director of Graduate Studies at the University of Missouri, Columbia. He has also been a visiting professor at the University ofMilan and University of Rome “La Sapienza”, Italy and at the Isaac Newton Institute forMathematical Sciences, Cambridge University, England. Dr. Jajodia received his Ph.D. from the University of Oregon, Eugene. The scope of his current research interests encompasses information secrecy, privacy, integrity, and availability problems in military, civil, and commercial sectors. He has authored six books, edited thirty four books and conference proceedings, and published more than  technical papers in the refereed journals and conference proceedings. He is also a holder of eight patents and has several patent applications pending.He received the Kristian Beckman award fromIFIP TC for his contributions to the discipline of Information Security,  Outstanding Research Faculty Award from Mason’s Volgenau School of Engineering, and  ACM SIGSAC Outstanding Contributions Award for his research and teaching contributions to the information security field and his service to ACM SIGSAC and the computing community. He was recognized for the most accepted papers at the th anniversary of the IEEE Symposium on Security and Privacy. His h-index is . Dr. Jajodia has served in different capacities for various journals and conferences. He serves on the editorial boards of IET Information Security, International Journal of Cooperative Information Systems, International Journal of Information and Computer Security, and International Journal of Information Security and Privacy. He was the founding editor-in-chief of the Journal of Computer Security (–) and a past editor of ACM Transactions on Information and Systems Security (–) and IEEE Transactions on Knowledge and Data Engineering. He is the consulting editor of the Springer International Series on Advances in Information Security. He has been named a Golden Core member for his service to the IEEE Computer Society, and received International Federation for Information Processing (IFIP) Silver Core Award “in recognition of outstanding services to IFIP” in .He is a past chair of the ACM Special Interest Group on Security, Audit, and Control (SIGSAC), IEEE Computer Society Technical Committee on Data Engineering, and IFIPWG . on Systems Integrity and Control. He is a seniormember of the IEEE and a member ofIEEE Computer Society and Association for Computing Machinery.

Bibliographic Information

Buy it now

Buying options

eBook USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access