Complexity Issues for Public Key Cryptography View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

1988

AUTHORS

Ian F. Blake , Paul C. van Oorschot , Scott A. Vanstone

ABSTRACT

The proliferation of large computer networks, of both a public and private variety and either local, national or international, has intensified the need for the security of data transmission. One component of the solution to the security problem is the use of a cryptosystem which, together with the appropriate protocols, might provide authentication, digital signatures as well as data integrity and security. The Data Encryption Standard has been in use over the past decade as a reliable and secure data encipherment algorithm and thus an important component in many such systems. More... »

PAGES

75-97

Book

TITLE

Performance Limits in Communication Theory and Practice

ISBN

978-94-010-7757-6
978-94-009-2794-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5

DOI

http://dx.doi.org/10.1007/978-94-009-2794-0_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1038302779


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Waterloo, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "University of Waterloo, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Blake", 
        "givenName": "Ian F.", 
        "id": "sg:person.07544420130.11", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07544420130.11"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Waterloo, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "University of Waterloo, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "van Oorschot", 
        "givenName": "Paul C.", 
        "id": "sg:person.014304371661.89", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014304371661.89"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Waterloo, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "University of Waterloo, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vanstone", 
        "givenName": "Scott A.", 
        "id": "sg:person.010344544767.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1988", 
    "datePublishedReg": "1988-01-01", 
    "description": "The proliferation of large computer networks, of both a public and private variety and either local, national or international, has intensified the need for the security of data transmission. One component of the solution to the security problem is the use of a cryptosystem which, together with the appropriate protocols, might provide authentication, digital signatures as well as data integrity and security. The Data Encryption Standard has been in use over the past decade as a reliable and secure data encipherment algorithm and thus an important component in many such systems.", 
    "editor": [
      {
        "familyName": "Skwirzynski", 
        "givenName": "J. K.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-94-009-2794-0_5", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-94-010-7757-6", 
        "978-94-009-2794-0"
      ], 
      "name": "Performance Limits in Communication Theory and Practice", 
      "type": "Book"
    }, 
    "keywords": [
      "large computer networks", 
      "public key cryptography", 
      "Data Encryption Standard", 
      "digital signature", 
      "key cryptography", 
      "computer networks", 
      "data integrity", 
      "Encryption Standard", 
      "security problems", 
      "data transmission", 
      "complexity issues", 
      "such systems", 
      "security", 
      "authentication", 
      "cryptography", 
      "cryptosystem", 
      "algorithm", 
      "network", 
      "appropriate protocol", 
      "private varieties", 
      "protocol", 
      "past decade", 
      "system", 
      "issues", 
      "important component", 
      "transmission", 
      "solution", 
      "use", 
      "standards", 
      "need", 
      "components", 
      "signatures", 
      "integrity", 
      "variety", 
      "decades", 
      "proliferation", 
      "problem"
    ], 
    "name": "Complexity Issues for Public Key Cryptography", 
    "pagination": "75-97", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1038302779"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-94-009-2794-0_5"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-94-009-2794-0_5", 
      "https://app.dimensions.ai/details/publication/pub.1038302779"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:46", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_116.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-94-009-2794-0_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-94-009-2794-0_5'


 

This table displays all metadata directly associated to this object as RDF triples.

114 TRIPLES      22 PREDICATES      63 URIs      55 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-94-009-2794-0_5 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 anzsrc-for:0804
4 schema:author N885ec215153343258f7d671f65dfbee7
5 schema:datePublished 1988
6 schema:datePublishedReg 1988-01-01
7 schema:description The proliferation of large computer networks, of both a public and private variety and either local, national or international, has intensified the need for the security of data transmission. One component of the solution to the security problem is the use of a cryptosystem which, together with the appropriate protocols, might provide authentication, digital signatures as well as data integrity and security. The Data Encryption Standard has been in use over the past decade as a reliable and secure data encipherment algorithm and thus an important component in many such systems.
8 schema:editor N7b2a52c8f6864ad3b6fee5bab6299d97
9 schema:genre chapter
10 schema:isAccessibleForFree false
11 schema:isPartOf N7fd1c9a3657143a9bc19b5d4b4e2fd9b
12 schema:keywords Data Encryption Standard
13 Encryption Standard
14 algorithm
15 appropriate protocol
16 authentication
17 complexity issues
18 components
19 computer networks
20 cryptography
21 cryptosystem
22 data integrity
23 data transmission
24 decades
25 digital signature
26 important component
27 integrity
28 issues
29 key cryptography
30 large computer networks
31 need
32 network
33 past decade
34 private varieties
35 problem
36 proliferation
37 protocol
38 public key cryptography
39 security
40 security problems
41 signatures
42 solution
43 standards
44 such systems
45 system
46 transmission
47 use
48 variety
49 schema:name Complexity Issues for Public Key Cryptography
50 schema:pagination 75-97
51 schema:productId N0a2f8344bcba4bf9988eae64ed36162d
52 Nd9347a4dc8d4493e9c3b780f8c4cb491
53 schema:publisher N8e2a5afe674345a9bc28aeb3d8b6a02d
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038302779
55 https://doi.org/10.1007/978-94-009-2794-0_5
56 schema:sdDatePublished 2022-12-01T06:46
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher N11f96a50720741efb25b1e47e4870b61
59 schema:url https://doi.org/10.1007/978-94-009-2794-0_5
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N0a2f8344bcba4bf9988eae64ed36162d schema:name dimensions_id
64 schema:value pub.1038302779
65 rdf:type schema:PropertyValue
66 N11f96a50720741efb25b1e47e4870b61 schema:name Springer Nature - SN SciGraph project
67 rdf:type schema:Organization
68 N32b8d74addad47589bf17d1424665861 rdf:first sg:person.014304371661.89
69 rdf:rest N7d81d0d04bf2444f84377f354495ce40
70 N5e816006695d4483a0f1eaf72be1ed5f schema:familyName Skwirzynski
71 schema:givenName J. K.
72 rdf:type schema:Person
73 N7b2a52c8f6864ad3b6fee5bab6299d97 rdf:first N5e816006695d4483a0f1eaf72be1ed5f
74 rdf:rest rdf:nil
75 N7d81d0d04bf2444f84377f354495ce40 rdf:first sg:person.010344544767.07
76 rdf:rest rdf:nil
77 N7fd1c9a3657143a9bc19b5d4b4e2fd9b schema:isbn 978-94-009-2794-0
78 978-94-010-7757-6
79 schema:name Performance Limits in Communication Theory and Practice
80 rdf:type schema:Book
81 N885ec215153343258f7d671f65dfbee7 rdf:first sg:person.07544420130.11
82 rdf:rest N32b8d74addad47589bf17d1424665861
83 N8e2a5afe674345a9bc28aeb3d8b6a02d schema:name Springer Nature
84 rdf:type schema:Organisation
85 Nd9347a4dc8d4493e9c3b780f8c4cb491 schema:name doi
86 schema:value 10.1007/978-94-009-2794-0_5
87 rdf:type schema:PropertyValue
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
92 schema:name Computation Theory and Mathematics
93 rdf:type schema:DefinedTerm
94 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
95 schema:name Data Format
96 rdf:type schema:DefinedTerm
97 sg:person.010344544767.07 schema:affiliation grid-institutes:grid.46078.3d
98 schema:familyName Vanstone
99 schema:givenName Scott A.
100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07
101 rdf:type schema:Person
102 sg:person.014304371661.89 schema:affiliation grid-institutes:grid.46078.3d
103 schema:familyName van Oorschot
104 schema:givenName Paul C.
105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014304371661.89
106 rdf:type schema:Person
107 sg:person.07544420130.11 schema:affiliation grid-institutes:grid.46078.3d
108 schema:familyName Blake
109 schema:givenName Ian F.
110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07544420130.11
111 rdf:type schema:Person
112 grid-institutes:grid.46078.3d schema:alternateName University of Waterloo, Waterloo, Ontario, Canada
113 schema:name University of Waterloo, Waterloo, Ontario, Canada
114 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...