Encyclopedia of Cryptography and Security
Encyclopedia
The Encyclopedia of Cryptography and Security is a comprehensive work on Cryptography
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

 for both information security professionals and experts in the fields of Computer Science
Computer science
Computer science or computing science is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems...

, Applied Mathematics
Applied mathematics
Applied mathematics is a branch of mathematics that concerns itself with mathematical methods that are typically used in science, engineering, business, and industry. Thus, "applied mathematics" is a mathematical science with specialized knowledge...

, Engineering
Engineering
Engineering is the discipline, art, skill and profession of acquiring and applying scientific, mathematical, economic, social, and practical knowledge, in order to design and build structures, machines, devices, systems, materials and processes that safely realize improvements to the lives of...

, Information Theory
Information theory
Information theory is a branch of applied mathematics and electrical engineering involving the quantification of information. Information theory was developed by Claude E. Shannon to find fundamental limits on signal processing operations such as compressing data and on reliably storing and...

, Data Encryption, etc . It consists of 460 articles in alphabetical order and is available electronically and in print. The Encyclopedia has a representative Advisory Board consisting of 18 leading international specialists.

Topics include but are not limited to authentication and identification, copy protection, cryptoanalysis and security, factorization algorithms and primality tests, cryptographic protocols, key management, electronic payments and digital certificates, hash
Hash
Hash may refer to:* Hash symbol, the glyph #* Hash mark , one of various symbols* Hash , a coarse mixture of ingredients* Hash chain, a method of producing many one-time keys from a single key or password...

 functions and MACs, elliptic curve
Elliptic curve
In mathematics, an elliptic curve is a smooth, projective algebraic curve of genus one, on which there is a specified point O. An elliptic curve is in fact an abelian variety — that is, it has a multiplication defined algebraically with respect to which it is a group — and O serves as the identity...

 cryptography, quantum cryptography
Quantum cryptography
Quantum key distribution uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages...

 and web security.

The style of the articles is of explanatory character and can be used for undergraduate or graduate courses.

Reviews

R. Weippl, Computing Reviews, May, 2006 http://www.reviews.com

Related encyclopedias

Gollmann, D. Computer security. Wiley, New York, 1999.

Bishop, M. The art and science of computer security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002

Gattiker, Urs E. The Information Security Dictionary. Springer US, 2004.

Krause, M, Tipto, H.F. Information Security Management Handbook, CRC Press LLC, 2007.

Leeuw, K. de, Bergstra, J. A History of Information Security: A Comprehensive Handbook, Elsevier, 2007.

Advisory Board Members

  • Carlisle Adams
    Carlisle Adams
    Carlisle M. Adams is a cryptographer and computer security researcher. Formerly senior cryptographer at Entrust, he is currently a professor at the University of Ottawa. His notable work includes the design of the block ciphers CAST-128 and CAST-256. He also helped organize the first Selected...

    , Entrust, Inc.
  • Friedrich Bauer, Technische Universität München
  • Gerrit Bleumer, Francotyp-Postalia
  • Dan Boneh
    Dan Boneh
    Dan Boneh is a Professor of Computer Science and Electrical Engineering atStanford University. He is a well-known researcher in the areas of applied cryptographyand computer security.-Education:...

    , Stanford University
    Stanford University
    The Leland Stanford Junior University, commonly referred to as Stanford University or Stanford, is a private research university on an campus located near Palo Alto, California. It is situated in the northwestern Santa Clara Valley on the San Francisco Peninsula, approximately northwest of San...

  • Pascale Charpin, INRIA-Rocquencourt
  • Claude Crepeau, McGill University
  • Yvo G. Desmedt
    Yvo G. Desmedt
    Yvo G. Desmedt is the Chair of Information Communication Technology at University College London. He was a pioneer of threshold cryptography and is an International Association for Cryptologic Research Fellow...

    , University College London
    University College London
    University College London is a public research university located in London, United Kingdom and the oldest and largest constituent college of the federal University of London...

     (University of London
    University of London
    -20th century:Shortly after 6 Burlington Gardens was vacated, the University went through a period of rapid expansion. Bedford College, Royal Holloway and the London School of Economics all joined in 1900, Regent's Park College, which had affiliated in 1841 became an official divinity school of the...

    )
  • Grigory Kabatiansky, Institute for Information Transmission Problems
  • Burt Kaliski
    Burt Kaliski
    Burton S. "Burt" Kaliski, Jr. is a cryptographer, director of the EMC Innovation Network at EMC Corporation since its 2006 acquisition of RSA Security...

    , RSA Security
  • Peter Landrock, University of Aarhus
    University of Aarhus
    Aarhus University , located in the city of Aarhus, Denmark, is Denmark's second oldest and second largest university...

  • Patrick McDaniel, Penn State University
  • Alfred Menezes
    Alfred Menezes
    Alfred Menezes is co-author of several books on cryptography, most notably the Handbook of Applied Cryptography.Menezes is a professor in the Department of Combinatorics & Optimization at the University of Waterloo. He is also the Managing Director of the Centre for Applied Cryptographic...

    , University of Waterloo
  • David Naccache, Gemplus
  • Christof Paar, Ruhr-Universität Bochum
  • Bart Preneel
    Bart Preneel
    Bart Preneel is a Belgian cryptographer and cryptanalyst. He is a professor at Katholieke Universiteit Leuven, in the COSIC group, president of the International Association for Cryptologic Research, and project manager of ECRYPT....

    , Katholieke Universiteit Leuven
    Katholieke Universiteit Leuven
    The Katholieke Universiteit Leuven is a Dutch-speaking university in Flanders, Belgium.It is located at the centre of the historic town of Leuven, and is a prominent part of the city, home to the university since 1425...

  • Jean-Jacques Quisquater, Université Catholique de Louvain
  • Kazue Sako, NEC Corporation
  • Berry Schoenmakers, Technische Universiteit Eindhoven
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK