Complexity Issues for Public Key Cryptography View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

1988

AUTHORS

Ian F. Blake , Paul C. van Oorschot , Scott A. Vanstone

ABSTRACT

The proliferation of large computer networks, of both a public and private variety and either local, national or international, has intensified the need for the security of data transmission. One component of the solution to the security problem is the use of a cryptosystem which, together with the appropriate protocols, might provide authentication, digital signatures as well as data integrity and security. The Data Encryption Standard has been in use over the past decade as a reliable and secure data encipherment algorithm and thus an important component in many such systems. More... »

PAGES

75-97

Book

TITLE

Performance Limits in Communication Theory and Practice

ISBN

978-94-010-7757-6
978-94-009-2794-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5

DOI

http://dx.doi.org/10.1007/978-94-009-2794-0_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1038302779


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Waterloo, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "University of Waterloo, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Blake", 
        "givenName": "Ian F.", 
        "id": "sg:person.07544420130.11", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07544420130.11"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Waterloo, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "University of Waterloo, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "van Oorschot", 
        "givenName": "Paul C.", 
        "id": "sg:person.014304371661.89", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014304371661.89"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Waterloo, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "University of Waterloo, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vanstone", 
        "givenName": "Scott A.", 
        "id": "sg:person.010344544767.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1988", 
    "datePublishedReg": "1988-01-01", 
    "description": "The proliferation of large computer networks, of both a public and private variety and either local, national or international, has intensified the need for the security of data transmission. One component of the solution to the security problem is the use of a cryptosystem which, together with the appropriate protocols, might provide authentication, digital signatures as well as data integrity and security. The Data Encryption Standard has been in use over the past decade as a reliable and secure data encipherment algorithm and thus an important component in many such systems.", 
    "editor": [
      {
        "familyName": "Skwirzynski", 
        "givenName": "J. K.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-94-009-2794-0_5", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-94-010-7757-6", 
        "978-94-009-2794-0"
      ], 
      "name": "Performance Limits in Communication Theory and Practice", 
      "type": "Book"
    }, 
    "keywords": [
      "large computer networks", 
      "public key cryptography", 
      "Data Encryption Standard", 
      "digital signature", 
      "key cryptography", 
      "computer networks", 
      "data integrity", 
      "Encryption Standard", 
      "security problems", 
      "data transmission", 
      "complexity issues", 
      "such systems", 
      "security", 
      "authentication", 
      "cryptography", 
      "cryptosystem", 
      "algorithm", 
      "network", 
      "appropriate protocol", 
      "private varieties", 
      "protocol", 
      "past decade", 
      "system", 
      "issues", 
      "important component", 
      "transmission", 
      "solution", 
      "use", 
      "standards", 
      "need", 
      "components", 
      "signatures", 
      "integrity", 
      "variety", 
      "decades", 
      "proliferation", 
      "problem"
    ], 
    "name": "Complexity Issues for Public Key Cryptography", 
    "pagination": "75-97", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1038302779"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-94-009-2794-0_5"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-94-009-2794-0_5", 
      "https://app.dimensions.ai/details/publication/pub.1038302779"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:53", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_16.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-94-009-2794-0_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5'


 

This table displays all metadata directly associated to this object as RDF triples.

114 TRIPLES      22 PREDICATES      63 URIs      55 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-94-009-2794-0_5 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 anzsrc-for:0804
4 schema:author Nf2d1378374c5494ea8c0551784ed243a
5 schema:datePublished 1988
6 schema:datePublishedReg 1988-01-01
7 schema:description The proliferation of large computer networks, of both a public and private variety and either local, national or international, has intensified the need for the security of data transmission. One component of the solution to the security problem is the use of a cryptosystem which, together with the appropriate protocols, might provide authentication, digital signatures as well as data integrity and security. The Data Encryption Standard has been in use over the past decade as a reliable and secure data encipherment algorithm and thus an important component in many such systems.
8 schema:editor N61712bf0c6384d3383e435a6e8e61fb7
9 schema:genre chapter
10 schema:isAccessibleForFree false
11 schema:isPartOf Ne335dc62909442189d2125c231d462f9
12 schema:keywords Data Encryption Standard
13 Encryption Standard
14 algorithm
15 appropriate protocol
16 authentication
17 complexity issues
18 components
19 computer networks
20 cryptography
21 cryptosystem
22 data integrity
23 data transmission
24 decades
25 digital signature
26 important component
27 integrity
28 issues
29 key cryptography
30 large computer networks
31 need
32 network
33 past decade
34 private varieties
35 problem
36 proliferation
37 protocol
38 public key cryptography
39 security
40 security problems
41 signatures
42 solution
43 standards
44 such systems
45 system
46 transmission
47 use
48 variety
49 schema:name Complexity Issues for Public Key Cryptography
50 schema:pagination 75-97
51 schema:productId N2a20c56be0e243199c682e9b207009bb
52 Nc1837bbd3f514b789a0bbc418d4477da
53 schema:publisher N52484db4b7d24cdab1c4ca8691a528f1
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038302779
55 https://doi.org/10.1007/978-94-009-2794-0_5
56 schema:sdDatePublished 2022-10-01T06:53
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher N3a3930c516c248f79bc56bd285d4caf9
59 schema:url https://doi.org/10.1007/978-94-009-2794-0_5
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N2a20c56be0e243199c682e9b207009bb schema:name doi
64 schema:value 10.1007/978-94-009-2794-0_5
65 rdf:type schema:PropertyValue
66 N3a3930c516c248f79bc56bd285d4caf9 schema:name Springer Nature - SN SciGraph project
67 rdf:type schema:Organization
68 N52484db4b7d24cdab1c4ca8691a528f1 schema:name Springer Nature
69 rdf:type schema:Organisation
70 N61712bf0c6384d3383e435a6e8e61fb7 rdf:first N672faac2d0974c79acafcd4626e84c80
71 rdf:rest rdf:nil
72 N672faac2d0974c79acafcd4626e84c80 schema:familyName Skwirzynski
73 schema:givenName J. K.
74 rdf:type schema:Person
75 Nc1837bbd3f514b789a0bbc418d4477da schema:name dimensions_id
76 schema:value pub.1038302779
77 rdf:type schema:PropertyValue
78 Nd1108c05dff24dd2ba631783c17d5e8b rdf:first sg:person.014304371661.89
79 rdf:rest Nf22cb6b8daae4a4fb289a06decef14c6
80 Ne335dc62909442189d2125c231d462f9 schema:isbn 978-94-009-2794-0
81 978-94-010-7757-6
82 schema:name Performance Limits in Communication Theory and Practice
83 rdf:type schema:Book
84 Nf22cb6b8daae4a4fb289a06decef14c6 rdf:first sg:person.010344544767.07
85 rdf:rest rdf:nil
86 Nf2d1378374c5494ea8c0551784ed243a rdf:first sg:person.07544420130.11
87 rdf:rest Nd1108c05dff24dd2ba631783c17d5e8b
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
92 schema:name Computation Theory and Mathematics
93 rdf:type schema:DefinedTerm
94 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
95 schema:name Data Format
96 rdf:type schema:DefinedTerm
97 sg:person.010344544767.07 schema:affiliation grid-institutes:grid.46078.3d
98 schema:familyName Vanstone
99 schema:givenName Scott A.
100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07
101 rdf:type schema:Person
102 sg:person.014304371661.89 schema:affiliation grid-institutes:grid.46078.3d
103 schema:familyName van Oorschot
104 schema:givenName Paul C.
105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014304371661.89
106 rdf:type schema:Person
107 sg:person.07544420130.11 schema:affiliation grid-institutes:grid.46078.3d
108 schema:familyName Blake
109 schema:givenName Ian F.
110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07544420130.11
111 rdf:type schema:Person
112 grid-institutes:grid.46078.3d schema:alternateName University of Waterloo, Waterloo, Ontario, Canada
113 schema:name University of Waterloo, Waterloo, Ontario, Canada
114 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...