Compra 10 libros por 10 € aquí!
Bookbot

Bart Preneel

    Advances in cryptology
    Topics in cryptology
    Selected areas in cryptography
    Progress in cryptology
    Cryptographic hardware and embedded systems
    Privacy technologies and policy
    • Privacy technologies and policy

      • 215 páginas
      • 8 horas de lectura

      This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

      Privacy technologies and policy
    • This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

      Cryptographic hardware and embedded systems
    • Progress in cryptology

      • 434 páginas
      • 16 horas de lectura

      This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.

      Progress in cryptology
    • Selected areas in cryptography

      • 371 páginas
      • 13 horas de lectura

      SAC 2005 marked the 12th annual workshop on Selected Areas in Cryptography and was hosted for the fifth time at Queen’s University in Kingston. Previous workshops took place at various institutions, including Carleton University, the Fields Institute, Memorial University, and the University of Waterloo. This workshop fostered a relaxed environment for researchers to present and discuss their work in cryptography. The themes for SAC 2005 included the design and analysis of symmetric key cryptosystems, primitives for symmetric key cryptography such as block and stream ciphers, hash functions, and MAC algorithms, as well as efficient implementations of symmetric and public key algorithms. Additionally, the workshop addressed cryptographic algorithms and protocols for ubiquitous computing, including sensor networks and RFID. A total of 96 papers were submitted, with three excluded due to multiple submissions. After a thorough double-blind review process, the program committee accepted 25 papers for presentation. The workshop featured two invited speakers: Alfred Menezes, who discussed provable security, and Mike Wiener, who examined the full cost of cryptanalytic attacks, both delivering engaging and thought-provoking talks.

      Selected areas in cryptography
    • Topics in cryptology

      • 311 páginas
      • 11 horas de lectura

      This volume continues the tradition of publishing contributions from the Cryptographers’ Track (CT-RSA) at the RSA Security Conference in Springer-Verlag’s Lecture Notes in Computer Science series. As the largest e-security and cryptography conference, the RSA Security Conference features 14 parallel tracks and thousands of participants. The Cryptographers’ Track showcases the latest scientific developments in the field. The program committee reviewed 49 submissions and selected 20 for presentation, with one paper withdrawn by the authors. The program also included two invited talks by Ron Rivest and Victor Shoup. Each paper underwent a thorough review process, with at least three committee members evaluating each submission; papers by committee members received six reviews. Authors of accepted papers made significant efforts to incorporate feedback into their submissions. In some cases, revisions were double-checked by committee members. Special thanks are due to the 20 program committee members for their commitment to maintaining rigorous scientific standards, providing thoughtful reviews, and engaging in extensive discussions, which resulted in over 400 Kbytes of comments. Many members attended the program committee meeting despite the allure of Santa Barbara's sunny beaches.

      Topics in cryptology
    • Advances in cryptology

      • 621 páginas
      • 22 horas de lectura

      This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2000, held in Bruges, Belgium, in May 2000. The 39 revised full papers presented were carefully selected from a total of 150 submissions during a highly competitive reviewing process. The book is divided in topical sections of factoring and discrete logarithm, digital signatures, private information retrieval, key management protocols, threshold cryptography, public-key encryption, quantum cryptography, multi-party computation and information theory, zero-knowledge, symmetric cryptography, Boolean functions and hardware, voting schemes, and stream ciphers and block ciphers.

      Advances in cryptology
    • State of the art in applied cryptography

      • 395 páginas
      • 14 horas de lectura

      The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven has been offering a biennial course on computer security and industrial cryptography since 1983. Designed for researchers and practitioners from both industry and government, the course covers fundamental principles and the latest developments, with a strong emphasis on cryptography while also addressing key topics in computer security. It seeks to balance basic theory with practical applications, mathematical foundations with legal aspects, and recent technological advancements with standardization issues. A notable strength of the course is its ability to foster dialogue among participants from diverse professional backgrounds. In 1993, the formal proceedings were published in the Lecture Notes in Computer Science series (Volume 741). Given the significant advancements in cryptography since then, there is a clear need for a new edition. The publication of numerous excellent textbooks and handbooks on cryptology has reduced the demand for introductory-level papers, while the growth of major cryptology conferences such as Eurocrypt, Crypto, and Asiacrypt indicates an increasing interest in the field.

      State of the art in applied cryptography