Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9947364508302882
    Format: XIII, 502 p. , online resource.
    ISBN: 9783642283680
    Series Statement: Lecture Notes in Computer Science, 6805
    Content: This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jacques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests".
    Note: Personal Tributes and Re-visits of Jean-Jacques’s Legacy  The Hidden Side of Jean-Jacques Quisquater.-On Quisquater’s Multiplication Algorithm.-A Brief Survey of Research Jointly with Jean-Jacques Quisquater.-DES Collisions Revisited .-Line Directed Hypergraphs.  Symmetric Cryptography  Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment --  Asymmetric Cryptography  Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping --  Side Channel Attacks  Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations  Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors.  Smart Cards and Information Security  The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage  As Diverse as Jean-Jacques’ Scientific Interests  A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots Line Directed Hypergraphs.  Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment -- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping -- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders  Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security  The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques’ Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642283673
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Festschrift ; Aufsatzsammlung
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_BV039949700
    Format: XIII, 502 S. : , Ill., graph. Darst. ; , 24 cm.
    ISBN: 978-3-642-28367-3 , 3-642-28367-5 , 978-3-642-28368-0
    Series Statement: Lecture notes in computer science 6805 : Festschrift
    Additional Edition: Erscheint auch als Online-Ausgabe Cryptography and Security: From Theory to Applications
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Private-Key-Kryptosystem ; Public-Key-Kryptosystem ; Kryptoanalyse ; Chipkarte ; Privatsphäre ; Datensicherung ; Hardware ; Implementierung ; Kryptologie ; Public-Key-Kryptosystem ; Biometrie ; Elliptische Kurve ; Data Encryption Standard ; Datenschutz ; Aufsatzsammlung ; Festschrift
    Author information: Naccache, David, 1967-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    kobvindex_ZLB15461894
    Format: XIII, 502 Seiten , Ill., graph. Darst. , 24 cm
    ISBN: 9783642283673 , 3642283675
    Series Statement: Lecture notes in computer science 6805
    Language: English
    Keywords: Kryptologie ; Aufsatzsammlung ; Private-Key-Kryptosystem ; Public-Key-Kryptosystem ; Kryptoanalyse ; Aufsatzsammlung ; Chipkarte ; Privatsphäre ; Datensicherung ; Aufsatzsammlung ; Hardware ; Implementierung 〈Informatik〉 ; Kryptologie ; Aufsatzsammlung ; Aufsatzsammlung ; Festschrift ; Aufsatzsammlung
    Author information: Naccache, David
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV039949700
    Format: XIII, 502 S. , Ill., graph. Darst. , 24 cm
    ISBN: 9783642283673 , 3642283675 , 9783642283680
    Series Statement: Lecture notes in computer science 6805 : Festschrift
    Additional Edition: Erscheint auch als Online-Ausgabe Cryptography and Security: From Theory to Applications
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Private-Key-Kryptosystem ; Public-Key-Kryptosystem ; Kryptoanalyse ; Chipkarte ; Privatsphäre ; Datensicherung ; Hardware ; Implementierung ; Kryptologie ; Public-Key-Kryptosystem ; Biometrie ; Elliptische Kurve ; Data Encryption Standard ; Datenschutz ; Aufsatzsammlung ; Festschrift
    Author information: Naccache, David 1967-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783642128363?
Did you mean 9783642203633?
Did you mean 9783642212673?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages