Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,185 papers from all fields of science
Search
Sign In
Create Free Account
Encyclopedia of Cryptography and Security
The Encyclopedia of Cryptography and Security is a comprehensive work on Cryptography for both information security professionals and experts in the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Burt Kaliski
Cryptography
Hash function
Outline of cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Determining Relevant Relations for Datalog Queries under Access Limitations is Undecidable
D. Martinenghi
arXiv.org
2013
Corpus ID: 18476141
Access limitations are restrictions in the way in which the tuples of a relation can be accessed. Under access limitations, query…
Expand
2011
2011
Encyclopedia of Cryptography and Security
Fabio Scotti
,
S. Cimato
,
R. Sassi
2011
Corpus ID: 268523778
2011
2011
OAEP: Optimal Asymmetric Encryption Padding
D. Pointcheval
Encyclopedia of Cryptography and Security
2011
Corpus ID: 195614274
Review
2005
Review
2005
Encyclopedia of Cryptography and Security, 2nd Ed
H. V. Tilborg
2005
Corpus ID: 34221135
Expanded into two volumes, the Second Edition of Springers Encyclopedia of Cryptography and Security brings the latest and most…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE