Cryptography and Security: From Theory to Applications : Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career. Focusing on personal tributes and re-vi...

Description complète

Détails bibliographiques
Auteur principal : Naccache David (Auteur, Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Cryptography and Security: From Theory to Applications : Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday / edited by David Naccache.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2012
Cham : Springer Nature
Collection : Security and Cryptology ; 6805
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Sujets :
Documents associés : Autre format: Cryptography and Security: From Theory to Applications
Autre format: Cryptography and Security: From Theory to Applications
LEADER 07169clm a2200637 4500
001 PPN159087716
003 http://www.sudoc.fr/159087716
005 20241001154900.0
010 |a 978-3-642-28368-0 
017 7 0 |a 10.1007/978-3-642-28368-0  |2 DOI 
035 |a (OCoLC)807333388 
035 |a Springer978-3-642-28368-0 
035 |a Springer-11645-978-3-642-28368-0 
100 |a 20120309d2012 u u0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Cryptography and Security: From Theory to Applications  |e Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday  |f edited by David Naccache. 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d 2012 
225 0 |a Security and Cryptology  |x 2946-1863  |v 6805 
330 |a This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jacques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests". 
359 1 |a Personal Tributes and Re-visits of Jean-Jacques s Legacy The Hidden Side of Jean-Jacques Quisquater.-On Quisquater s Multiplication Algorithm.-A Brief Survey of Research Jointly with Jean-Jacques Quisquater.-DES Collisions Revisited .-Line Directed Hypergraphs. Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment -- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping -- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-Efficient Encryption andStorage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots Line Directed Hypergraphs. Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment -- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping -- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-EfficientEncryption and Storage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots. 
371 0 |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition 
410 | |t Security and Cryptology  |x 2946-1863  |v 6805 
452 | |t Cryptography and Security: From Theory to Applications  |b Texte imprimé  |y 9783642283673 
452 | |t Cryptography and Security: From Theory to Applications  |b Texte imprimé  |y 9783642283697 
610 1 |a Computer Science 
610 2 |a Data Encryption 
610 2 |a Algorithm Analysis and Problem Complexity 
610 2 |a Management of Computing and Information Systems 
610 2 |a Systems and Data Security 
610 2 |a Computer Communication Networks 
610 2 |a Discrete Mathematics in Computer Science 
610 1 |a Cryptology. 
610 2 |a IT Operations 
610 2 |a Data and Information Security 
610 2 |a Algorithms 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 005.82  |v 23 
680 |a QA76.9.D335 
700 1 |3 PPN057368511  |a Naccache  |b David  |f 1967-....  |4 070 
701 1 |3 PPN057368511  |a Naccache  |b David  |f 1967-....  |4 651 
801 3 |a FR  |b Abes  |c 20240611  |g AFNOR 
801 1 |a DE  |b Springer  |c 20240603  |g AACR2 
856 4 |5 441099901:830850465  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-28368-0 
915 |5 441099901:830850465  |b SPRING13-00151 
930 |5 441099901:830850465  |b 441099901  |j g 
991 |5 441099901:830850465  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:09 
997 |a NUM  |b SPRING13-00151  |d NUMpivo  |e EM  |s d 
998 |a 977968