Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
The new codebreakersessays dedicated...
~
Naccache, David.
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
Record Type:
Electronic resources : Monograph/item
Title/Author:
The new codebreakersedited by Peter Y.A. Ryan, David Naccache, Jean-Jacques Quisquater.
Reminder of title:
essays dedicated to David Kahn on the occasion of his 85th birthday /
other author:
Ryan, Peter Y.A.
Published:
Berlin, Heidelberg :Springer Berlin Heidelberg :2016.
Description:
xiv, 551 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science)
Online resource:
http://dx.doi.org/10.1007/978-3-662-49301-4
ISBN:
9783662493014$q(electronic bk.)
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
The new codebreakers
essays dedicated to David Kahn on the occasion of his 85th birthday /[electronic resource] :edited by Peter Y.A. Ryan, David Naccache, Jean-Jacques Quisquater. - Berlin, Heidelberg :Springer Berlin Heidelberg :2016. - xiv, 551 p. :ill., digital ;24 cm. - Lecture notes in computer science,91000302-9743 ;. - Lecture notes in computer science ;4891..
History -- Mary of Guise's enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa.
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The Cryptographers", written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology - past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols.
ISBN: 9783662493014$q(electronic bk.)
Standard No.: 10.1007/978-3-662-49301-4doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
LDR
:03949nmm a2200325 a 4500
001
483858
003
DE-He213
005
20160913100009.0
006
m d
007
cr nn 008maaau
008
161012s2016 gw s 0 eng d
020
$a
9783662493014$q(electronic bk.)
020
$a
9783662493007$q(paper)
024
7
$a
10.1007/978-3-662-49301-4
$2
doi
035
$a
978-3-662-49301-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
N532 2016
245
0 4
$a
The new codebreakers
$h
[electronic resource] :
$b
essays dedicated to David Kahn on the occasion of his 85th birthday /
$c
edited by Peter Y.A. Ryan, David Naccache, Jean-Jacques Quisquater.
260
$a
Berlin, Heidelberg :
$b
Springer Berlin Heidelberg :
$b
Imprint: Springer,
$c
2016.
300
$a
xiv, 551 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9100
505
0
$a
History -- Mary of Guise's enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa.
520
$a
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The Cryptographers", written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology - past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols.
650
0
$a
Data encryption (Computer science)
$3
184520
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Data Encryption.
$3
273765
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Management of Computing and Information Systems.
$3
274191
650
2 4
$a
Algorithm Analysis and Problem Complexity.
$3
273702
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
700
1
$a
Ryan, Peter Y.A.
$3
376633
700
1
$a
Naccache, David.
$3
468529
700
1
$a
Quisquater, Jean-Jacques.
$3
468304
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
856
4 0
$u
http://dx.doi.org/10.1007/978-3-662-49301-4
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000123648
電子館藏
1圖書
電子書
EB QA76.9.A25 N532 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-662-49301-4
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login