Naccache | Cryptography and Security: From Theory to Applications | Buch | 978-3-642-28367-3 | sack.de

Buch, Englisch, 502 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 789 g

Reihe: Security and Cryptology

Naccache

Cryptography and Security: From Theory to Applications

Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
1. Auflage 2012
ISBN: 978-3-642-28367-3
Verlag: Springer

Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

Buch, Englisch, 502 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 789 g

Reihe: Security and Cryptology

ISBN: 978-3-642-28367-3
Verlag: Springer


This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career.
Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests".

Naccache Cryptography and Security: From Theory to Applications jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Personal Tributes and Re-visits of Jean-Jacques’s Legacy

 The Hidden Side of Jean-Jacques Quisquater.-On Quisquater’s Multiplication Algorithm.-A Brief Survey of Research Jointly with Jean-Jacques Quisquater.-DES Collisions Revisited.-Line Directed Hypergraphs.

 Symmetric Cryptography

 Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment.-

 Asymmetric Cryptography

 Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.-

 Side Channel Attacks

 Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders

Hardware and Implementations

 Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors.

 Smart Cards and Information Security

 The Challenges Raised by the Privacy-Preserving Identity Card.-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-Efficient Encryption andStorage of Close Distance Messages with Applications to Cloud Storage

 As Diverse as Jean-Jacques’ Scientific Interests

 A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots Line Directed Hypergraphs.

 Symmetric Cryptography

Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment.-

Asymmetric Cryptography

Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.-

Side Channel Attacks

Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders

 Hardware and Implementations

Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors.

Smart Cards and Information Security

 The Challenges Raised by the Privacy-Preserving Identity Card.-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-EfficientEncryption and Storage of Close Distance Messages with Applications to Cloud Storage

As Diverse as Jean-Jacques’ Scientific Interests

A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.