語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The new codebreakersessays dedicated...
~
Naccache, David.
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The new codebreakersedited by Peter Y.A. Ryan, David Naccache, Jean-Jacques Quisquater.
其他題名:
essays dedicated to David Kahn on the occasion of his 85th birthday /
其他作者:
Ryan, Peter Y.A.
出版者:
Berlin, Heidelberg :Springer Berlin Heidelberg :2016.
面頁冊數:
xiv, 551 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Data encryption (Computer science)
電子資源:
http://dx.doi.org/10.1007/978-3-662-49301-4
ISBN:
9783662493014$q(electronic bk.)
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
The new codebreakers
essays dedicated to David Kahn on the occasion of his 85th birthday /[electronic resource] :edited by Peter Y.A. Ryan, David Naccache, Jean-Jacques Quisquater. - Berlin, Heidelberg :Springer Berlin Heidelberg :2016. - xiv, 551 p. :ill., digital ;24 cm. - Lecture notes in computer science,91000302-9743 ;. - Lecture notes in computer science ;4891..
History -- Mary of Guise's enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa.
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The Cryptographers", written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology - past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols.
ISBN: 9783662493014$q(electronic bk.)
Standard No.: 10.1007/978-3-662-49301-4doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
The new codebreakersessays dedicated to David Kahn on the occasion of his 85th birthday /
LDR
:03949nmm a2200325 a 4500
001
483858
003
DE-He213
005
20160913100009.0
006
m d
007
cr nn 008maaau
008
161012s2016 gw s 0 eng d
020
$a
9783662493014$q(electronic bk.)
020
$a
9783662493007$q(paper)
024
7
$a
10.1007/978-3-662-49301-4
$2
doi
035
$a
978-3-662-49301-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
N532 2016
245
0 4
$a
The new codebreakers
$h
[electronic resource] :
$b
essays dedicated to David Kahn on the occasion of his 85th birthday /
$c
edited by Peter Y.A. Ryan, David Naccache, Jean-Jacques Quisquater.
260
$a
Berlin, Heidelberg :
$b
Springer Berlin Heidelberg :
$b
Imprint: Springer,
$c
2016.
300
$a
xiv, 551 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9100
505
0
$a
History -- Mary of Guise's enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa.
520
$a
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The Cryptographers", written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology - past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols.
650
0
$a
Data encryption (Computer science)
$3
184520
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Data Encryption.
$3
273765
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Management of Computing and Information Systems.
$3
274191
650
2 4
$a
Algorithm Analysis and Problem Complexity.
$3
273702
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
700
1
$a
Ryan, Peter Y.A.
$3
376633
700
1
$a
Naccache, David.
$3
468529
700
1
$a
Quisquater, Jean-Jacques.
$3
468304
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
856
4 0
$u
http://dx.doi.org/10.1007/978-3-662-49301-4
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000123648
電子館藏
1圖書
電子書
EB QA76.9.A25 N532 2016
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-3-662-49301-4
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入