Cryptography and Security: From Theory to Applications : Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career. Focusing on personal tributes and re-vi...
Auteur principal : | |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Cryptography and Security: From Theory to Applications : Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday / edited by David Naccache. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2012 Cham : Springer Nature |
Collection : | Security and Cryptology ; 6805 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Sujets : | |
Documents associés : | Autre format:
Cryptography and Security: From Theory to Applications Autre format: Cryptography and Security: From Theory to Applications |
LEADER | 07169clm a2200637 4500 | ||
---|---|---|---|
001 | PPN159087716 | ||
003 | http://www.sudoc.fr/159087716 | ||
005 | 20241001154900.0 | ||
010 | |a 978-3-642-28368-0 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-28368-0 |2 DOI |
035 | |a (OCoLC)807333388 | ||
035 | |a Springer978-3-642-28368-0 | ||
035 | |a Springer-11645-978-3-642-28368-0 | ||
100 | |a 20120309d2012 u u0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Cryptography and Security: From Theory to Applications |e Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday |f edited by David Naccache. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2012 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 6805 | |
330 | |a This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jacques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests". | ||
359 | 1 | |a Personal Tributes and Re-visits of Jean-Jacques s Legacy The Hidden Side of Jean-Jacques Quisquater.-On Quisquater s Multiplication Algorithm.-A Brief Survey of Research Jointly with Jean-Jacques Quisquater.-DES Collisions Revisited .-Line Directed Hypergraphs. Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment -- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping -- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-Efficient Encryption andStorage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots Line Directed Hypergraphs. Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment -- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping -- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-EfficientEncryption and Storage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots. | |
371 | 0 | |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 6805 | |
452 | | | |t Cryptography and Security: From Theory to Applications |b Texte imprimé |y 9783642283673 | |
452 | | | |t Cryptography and Security: From Theory to Applications |b Texte imprimé |y 9783642283697 | |
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Algorithm Analysis and Problem Complexity | |
610 | 2 | |a Management of Computing and Information Systems | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Discrete Mathematics in Computer Science | |
610 | 1 | |a Cryptology. | |
610 | 2 | |a IT Operations | |
610 | 2 | |a Data and Information Security | |
610 | 2 | |a Algorithms | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 005.82 |v 23 | ||
680 | |a QA76.9.D335 | ||
700 | 1 | |3 PPN057368511 |a Naccache |b David |f 1967-.... |4 070 | |
701 | 1 | |3 PPN057368511 |a Naccache |b David |f 1967-.... |4 651 | |
801 | 3 | |a FR |b Abes |c 20240611 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20240603 |g AACR2 | |
856 | 4 | |5 441099901:830850465 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-28368-0 | |
915 | |5 441099901:830850465 |b SPRING13-00151 | ||
930 | |5 441099901:830850465 |b 441099901 |j g | ||
991 | |5 441099901:830850465 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:09 | ||
997 | |a NUM |b SPRING13-00151 |d NUMpivo |e EM |s d | ||
998 | |a 977968 |