Cryptography and Security: From Theory to Applications [[electronic resource] ] : Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday / / edited by David Naccache |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIII, 502 p.) |
Disciplina | 005.8/2 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Management information systems Computer science Computer security Computer science—Mathematics Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Systems and Data Security Discrete Mathematics in Computer Science |
ISBN | 3-642-28368-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Personal Tributes and Re-visits of Jean-Jacques’s Legacy The Hidden Side of Jean-Jacques Quisquater.-On Quisquater’s Multiplication Algorithm.-A Brief Survey of Research Jointly with Jean-Jacques Quisquater.-DES Collisions Revisited .-Line Directed Hypergraphs. Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment -- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping -- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques’ Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots Line Directed Hypergraphs. Symmetric Cryptography Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.-Self-similarity Attacks on Block Ciphers and Application to KeeLoq.-Increasing Block Sizes Using Feistel Networks: The Example of the AES Authenticated-Encryption with Padding: A Formal Security Treatment -- Asymmetric Cryptography Traceable Signature with Stepping Capabilities.-Deniable RSA Signature: The Raise and Fall of Ali Baba.-Autotomic Signatures.-Fully Forward-Secure Group Signatures.-Public Key Encryption for the Forgetful.-Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping -- Side Channel Attacks Secret Key Leakage from Public Key Perturbation of DLP-BasedCryptosystems.-EM Probes Characterisation for Security Analysis.-An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.-Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders Hardware and Implementations Efficient Implementation of True Random Number Generator Based on SRAM PUFs.-Operand Folding Hardware Multipliers.-SIMPL Systems as a Keyless Cryptographic and Security Primitive.-A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Smart Cards and Information Security The Challenges Raised by the Privacy-Preserving Identity Card..-he Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.-Localization Privacy.-Dynamic Secure Cloud Storage with Provenance.-Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage As Diverse as Jean-Jacques’ Scientific Interests A Nagell Algorithm in Any Characteristic.-How to Read a Signature?.-Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.-Physical Simulation of Inarticulate Robots. |
Record Nr. | UNISA-996465944603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security [[electronic resource] ] : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings / / edited by Michael Reiter, David Naccache |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 257 p. 41 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computer communication systems Cryptology Systems and Data Security Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-26823-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466218203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings / / edited by Michael Reiter, David Naccache |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 257 p. 41 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computer communication systems Cryptology Systems and Data Security Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-26823-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483471603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Fault Diagnosis and Tolerance in Cryptography [[electronic resource] ] : Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings / / edited by Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 258 p.) |
Disciplina | 005.820151 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Management information systems Computer science Computers and civilization Information storage and retrieval Cryptology Computer Communication Networks Operating Systems Management of Computing and Information Systems Computers and Society Information Storage and Retrieval |
ISBN | 3-540-46251-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attacks on Public Key Systems -- Is It Wise to Publish Your Public RSA Keys? -- Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered -- Attacking Right-to-Left Modular Exponentiation with Timely Random Faults -- Sign Change Fault Attacks on Elliptic Curve Cryptosystems -- Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection -- Protection of Public Key Systems -- Blinded Fault Resistant Exponentiation -- Incorporating Error Detection in an RSA Architecture -- Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation -- Attacks on and Protection of Symmetric Key Systems -- Case Study of a Fault Attack on Asynchronous DES Crypto-Processors -- A Fault Attack Against the FOX Cipher Family -- Fault Based Collision Attacks on AES -- An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers -- Models for Fault Attacks on Cryptographic Devices -- An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices -- Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults -- A Comparative Cost/Security Analysis of Fault Attack Countermeasures -- Fault-Resistant Arithmetic for Cryptography -- Non-linear Residue Codes for Robust Public-Key Arithmetic -- Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection -- Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography -- Fault Attacks and Other Security Threats -- DPA on Faulty Cryptographic Hardware and Countermeasures -- Fault Analysis of DPA-Resistant Algorithms -- Java Type Confusion and Fault Attacks. |
Record Nr. | UNISA-996466089803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and Communications Security [[electronic resource] ] : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XV, 818 p. 200 illus., 109 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data structures (Computer science)
Software engineering Computer organization Computers Data Structures and Information Theory Software Engineering/Programming and Operating Systems Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service |
ISBN | 3-030-01950-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management. |
Record Nr. | UNISA-996466450103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XV, 818 p. 200 illus., 109 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data structures (Computer science)
Software engineering Computer organization Computers Data Structures and Information Theory Software Engineering/Programming and Operating Systems Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service |
ISBN | 3-030-01950-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management. |
Record Nr. | UNINA-9910349397203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Theory and Practice. Securing the Internet of Things [[electronic resource] ] : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings / / edited by David Naccache, Damien Sauveron |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 201 p. 47 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer organization Systems and Data Security Cryptology Computer Systems Organization and Communication Networks |
ISBN | 3-662-43826-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks -- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks -- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards -- A Pre-processing Composition for Secret Key Recovery on Android Smartphone -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection -- End-to-End Secure and Privacy Preserving Mobile Chat Application -- S-box, SET, Match: A Toolbox for S-box Analysis -- Policy-Based Access Control for Body Sensor Networks -- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider -- CAN Bus Risk Analysis Revisit -- AU2EU: Privacy-Preserving Matching of DNA Sequences -- Early DDoS Detection Based on Data Mining Techniques. |
Record Nr. | UNISA-996199992103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Theory and Practice. Securing the Internet of Things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings / / edited by David Naccache, Damien Sauveron |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 201 p. 47 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer organization Systems and Data Security Cryptology Computer Systems Organization and Communication Networks |
ISBN | 3-662-43826-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks -- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks -- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards -- A Pre-processing Composition for Secret Key Recovery on Android Smartphone -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection -- End-to-End Secure and Privacy Preserving Mobile Chat Application -- S-box, SET, Match: A Toolbox for S-box Analysis -- Policy-Based Access Control for Body Sensor Networks -- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider -- CAN Bus Risk Analysis Revisit -- AU2EU: Privacy-Preserving Matching of DNA Sequences -- Early DDoS Detection Based on Data Mining Techniques. |
Record Nr. | UNINA-9910484440403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers / / edited by Ion Bica, David Naccache, Emil Simion |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XXIV, 281 p. 88 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Information storage and retrieval Application software Data encryption (Computer science) Computer communication systems Algorithms Systems and Data Security Information Storage and Retrieval Information Systems Applications (incl. Internet) Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity |
ISBN | 3-319-27179-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Authenticated-Encryption: Security Notions, Designs and Applications -- New Results on Identity-based Encryption from Quadratic Residuosity -- Efficient techniques for extracting secrets from electronic devices -- Secure and Trusted Application Execution on Embedded Devices -- A Number-Theoretic Error-Correcting Code -- Full duplex OTP cryptosystem based on DNA key for text transmissions -- Evaluation of Lightweight Block Ciphers for Embedded Systems -- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error Correction -- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs -- Up-high to Down-low: Applying Machine Learning to an Exploit Database -- Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies -- On a Lightweight Authentication Protocol for RFID -- Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure -- Contributions to Steganographic Techniques on Mobile Devices -- Secure implementation of Stream cipher: Trivium -- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting. |
Record Nr. | UNISA-996466227703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Innovative Security Solutions for Information Technology and Communications : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers / / edited by Ion Bica, David Naccache, Emil Simion |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XXIV, 281 p. 88 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Information storage and retrieval Application software Data encryption (Computer science) Computer communication systems Algorithms Systems and Data Security Information Storage and Retrieval Information Systems Applications (incl. Internet) Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity |
ISBN | 3-319-27179-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Authenticated-Encryption: Security Notions, Designs and Applications -- New Results on Identity-based Encryption from Quadratic Residuosity -- Efficient techniques for extracting secrets from electronic devices -- Secure and Trusted Application Execution on Embedded Devices -- A Number-Theoretic Error-Correcting Code -- Full duplex OTP cryptosystem based on DNA key for text transmissions -- Evaluation of Lightweight Block Ciphers for Embedded Systems -- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error Correction -- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs -- Up-high to Down-low: Applying Machine Learning to an Exploit Database -- Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies -- On a Lightweight Authentication Protocol for RFID -- Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure -- Contributions to Steganographic Techniques on Mobile Devices -- Secure implementation of Stream cipher: Trivium -- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting. |
Record Nr. | UNINA-9910484003003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|