
doi: 10.1007/11964254_2
Cryptography is a fundamental component of any information security infrastructure. It allows two parties, a sender and a receiver, to exchange messages in a secure and authentic way. For this goal the parties use a publicly known algorithm that depends on a secret key. The main assumption in cryptography is that the honest parties have some secure hardware containing the secret key. This is the so-called black-box model. Within this model, cryptography has developed many useful secure algorithms and protocols. The security level of these algorithms is well understood. It can for instance be guaranteed that mathematical attacks are very difficult. This difficulty is even made precise in terms of a security parameter. When the black-box assumption does not hold however, the security guarantees provided by cryptography do not hold anymore.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
