Cryptography and Security: From Theory to Applications (häftad)
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
502
Utgivningsdatum
2012-03-01
Upplaga
2012
Förlag
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Medarbetare
Naccache, David (ed.)
Illustratör/Fotograf
103 schwarz-weiße Abbildungen
Illustrationer
XIII, 502 p.
Dimensioner
236 x 152 x 28 mm
Vikt
740 g
Antal komponenter
1
Komponenter
1 Paperback / softback
ISBN
9783642283673

Cryptography and Security: From Theory to Applications

Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

Häftad,  Engelska, 2012-03-01
586
  • Skickas från oss inom 7-10 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Finns även som
Visa alla 1 format & utgåvor
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests".
Visa hela texten

Passar bra ihop

  1. Cryptography and Security: From Theory to Applications
  2. +
  3. Meriam's Engineering Mechanics

De som köpt den här boken har ofta också köpt Meriam's Engineering Mechanics av James L Meriam, L G Kraige, J N Bolton (häftad).

Köp båda 2 för 1281 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av David Naccache

Innehållsförteckning

Personal Tributes and Re-visits of Jean-Jacquess Legacy The Hidden Side of Jean-Jacques Quisquater.-On Quisquaters Multiplication Algorithm.-A Brief Survey of Research Jointly with Jean-Jacques Quisquater.-DES Collisions Revisited .-Line Directed Hypergraphs. Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment.- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-Efficient Encryption andStorage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots Line Directed Hypergraphs. Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment.- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-EfficientEncryption and Storage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simu