LEADER 06077nam 22008175 450 001 9910483434703321 005 20200704021448.0 010 $a3-662-49301-2 024 7 $a10.1007/978-3-662-49301-4 035 $a(CKB)3710000000627377 035 $a(SSID)ssj0001659731 035 $a(PQKBManifestationID)16439084 035 $a(PQKBTitleCode)TC0001659731 035 $a(PQKBWorkID)14986592 035 $a(PQKB)11235757 035 $a(DE-He213)978-3-662-49301-4 035 $a(MiAaPQ)EBC6296685 035 $a(MiAaPQ)EBC5590845 035 $a(Au-PeEL)EBL5590845 035 $a(OCoLC)946028744 035 $a(PPN)192771515 035 $a(EXLCZ)993710000000627377 100 $a20160330d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 14$aThe New Codebreakers $eEssays Dedicated to David Kahn on the Occasion of His 85th Birthday /$fedited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (XIV, 551 p. 135 illus.) 225 1 $aSecurity and Cryptology ;$v9100 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-662-49300-4 327 $aHistory -- Mary of Guise?s enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. . 330 $aThis Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn?s 80th birthday. The title of this books leans on the title of a serious history of cryptology named ?The Codebreakers?, written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology ? past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols. . 410 0$aSecurity and Cryptology ;$v9100 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aApplication software. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.82 702 $aRyan$b Peter Y. A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNaccache$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aQuisquater$b Jean-Jacques$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483434703321 996 $aThe New Codebreakers$92593597 997 $aUNINA