<電子ブック>
Cryptography and security : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday

責任表示
著者
本文言語
出版者
出版年
出版地
関連情報
目次 The hidden side of Jean-Jacques Quisquater
Michaël Quisquater
On Quisquater's multiplication algorithm
Marc Joye
A brief survey of research jointly with Jean-Jacques Cascaded
Yvo Desmedt
DES collisions revisited
Sebastiaan Indesteege and Bart Preneel
Line directed hypergraphs
Jean-Claude Bermond, Fahir Ergincan, and Michel Syska
Random permutation statistics and an improved slide-determine attack on KeeLoq
Nicolas T. Courtois and Gregory V. Bard
Self-similarity attacks on block ciphers and application to KeeLoq
Nicolas T. Courtois
Increasing block sizes using Feistel networks: the example of the AES
Jacques Patarin, Benjamin Gittins, and Joana Treger
Authenticated-encryption with padding: a formal security treatment
Kenneth G. Paterson and Gaven J. Watson
Traceable signature with stepping capabilities
Olivier Blazy and David Pointcheval
Deniable RSA signature: the raise and fall of Ali Baba
Serge Vaudenay
Autotomic signatures
David Naccache and David Pointecheval
Fully forward-secure group signatures
Benoît Libert and Moti Yung
Public key encryption for the forgetful
Pu wen Wei, Yulang Zheng, and Xiaoyn Wang
Supplemental access control (PACE v2): security analysis of PACE integrated mapping
Jean-Sébastien Coron, Aline Gouget, Thomas Icart, and Pascal Paillier
Secret key leakage from public key perturbation of DLP-based cryptosystems
Alexandre Berzati, Cécile Canovas-Dumas, and Louis Goubin
EM probes characterisation for security analysis
Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, and Assia Tria
An updated survey on secure ECC implementations: attacks, countermeasures and cost
Junfeng Fan and Ingrid Verbauwhede
Masking with randomized look up tables: towards preventing side-channel attacks of all orders
Franc̦ois-Xavier Standaert, Christophe Petit, and Nicolas Veyrat-Charvillon
Efficient implementation of true random number generator based on SRAM PUFs
Vincent van der Leest, Erik van der Sluis, Geert-Jan Schrijen, Pim Tuyls, and Helena Handschuh
Operand folding hardware multipliers
Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, and Karim Sabeg
SIMPL systems as a keyless cryptographic and security primitive
Ulrich Rührmair
Cryptography with asynchronous logic automata
Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld
A qualitative security analysis of a new class of 3-D integrated crypto co-processors
Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, C̦etin Kaya Koc̦, Timothy Levin, and Timothy Sherwood
The challenges raised by the privacy-preserving identity card
Yves Deswarte and Sébastien Gambs
The next smart card nightmare: logical attacks, combined attacks, mutant applications and other funny things
Guillaume Bouffard and Jean-Louis Lanet
Localization privacy
Mike Burmester
Dynamic secure cloud storage with provenance
Sherman S.M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, and Robert H. Deng
Efficient encryption and storage of close distance messages with applications to cloud storage
George Davida and Yair Frankel
A Nagell algorithm in any characteristic
Mehdi Tibouchi
How to read a signature?
Vanessa Gratzer and David Naccache
Fooling a liveness-detecting capacitive fingerprint scanner
Edwin Bowden-Peters, Raphael C.-W. Phan, John N. Whitley, and David J. Parish
Physical simulation of inarticulate robots
Guillaume Claret, Michaël Mathieu, David Naccache, and Guillaume Seguin.
続きを見る
本文を見る Full text available from Springer Computer Science eBooks 2012 English/International
Full text available from SpringerLINK Lecture Notes in Computer Science (2015)

詳細

レコードID
刊行頻度
主題
SSID
LCCN
eISBN
登録日 2020.06.27
更新日 2020.06.28