Boolean functions in cryptology and information security [[electronic resource] /] / edited by Bart Preneel and Oleg A. Logachev |
Pubbl/distr/stampa | Amsterdam ; ; Washington, DC, : IOS Press, c2008 |
Descrizione fisica | 1 online resource (364 p.) |
Disciplina | 511.3/24 |
Altri autori (Persone) |
LogachevOleg A
PreneelBart <1963-> |
Collana | NATO science for peace and security series. D, Information and communication security |
Soggetto topico |
Algebra, Boolean
Computer security Cryptography |
Soggetto genere / forma | Electronic books. |
ISBN |
6611786309
1-281-78630-6 9786611786304 1-4356-7812-5 600-00-0648-9 1-60750-344-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; Contents; Invited Talks; Students' Talks; Some Open Problems; Subject Index; Author Index |
Record Nr. | UNINA-9910453596603321 |
Amsterdam ; ; Washington, DC, : IOS Press, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Boolean functions in cryptology and information security [[electronic resource] /] / edited by Bart Preneel and Oleg A. Logachev |
Pubbl/distr/stampa | Amsterdam ; ; Washington, DC, : IOS Press, c2008 |
Descrizione fisica | 1 online resource (364 p.) |
Disciplina | 511.3/24 |
Altri autori (Persone) |
LogachevOleg A
PreneelBart <1963-> |
Collana | NATO science for peace and security series. D, Information and communication security |
Soggetto topico |
Algebra, Boolean
Computer security Cryptography |
ISBN |
6611786309
1-281-78630-6 9786611786304 1-4356-7812-5 600-00-0648-9 1-60750-344-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; Contents; Invited Talks; Students' Talks; Some Open Problems; Subject Index; Author Index |
Record Nr. | UNINA-9910782319103321 |
Amsterdam ; ; Washington, DC, : IOS Press, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Boolean functions in cryptology and information security / / edited by Bart Preneel and Oleg A. Logachev |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Washington, DC, : IOS Press, c2008 |
Descrizione fisica | 1 online resource (364 p.) |
Disciplina | 511.3/24 |
Altri autori (Persone) |
LogachevOleg A
PreneelBart <1963-> |
Collana | NATO science for peace and security series. D, Information and communication security |
Soggetto topico |
Algebra, Boolean
Computer security Cryptography |
ISBN |
6611786309
1-281-78630-6 9786611786304 1-4356-7812-5 600-00-0648-9 1-60750-344-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; Contents; Invited Talks; Students' Talks; Some Open Problems; Subject Index; Author Index |
Record Nr. | UNINA-9910806986603321 |
Amsterdam ; ; Washington, DC, : IOS Press, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / / Bart Preneel, Stafford Tavares (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
Descrizione fisica | 1 online resource (XI, 371 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
PreneelBart <1963->
TavaresStafford <1940-> |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Cryptography
Computer security Data encryption (Computer science) |
ISBN | 3-540-33109-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Stream Ciphers I -- Conditional Estimators: An Effective Attack on A5/1 -- Cryptanalysis of the F-FCSR Stream Cipher Family -- Fault Attacks on Combiners with Memory -- Block Ciphers -- New Observation on Camellia -- Proving the Security of AES Substitution-Permutation Network -- Modes of Operation -- An Attack on CFB Mode Encryption as Used by OpenPGP -- Parallelizable Authentication Trees -- Improved Time-Memory Trade-Offs with Multiple Data -- Public Key Cryptography -- A Space Efficient Backdoor in RSA and Its Applications -- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism -- Stream Ciphers II -- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners -- Rekeying Issues in the MUGI Stream Cipher -- Key Establishment Protocols and Access Control -- Tree-Based Key Distribution Patterns -- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves -- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security -- Hash Functions -- Breaking a New Hash Function Design Strategy Called SMASH -- Analysis of a SHA-256 Variant -- Impact of Rotations in SHA-1 and Related Hash Functions -- Protocols for RFID Tags -- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags -- Reducing Time Complexity in RFID Systems -- Efficient Implementations -- Accelerated Verification of ECDSA Signatures -- Pairing-Friendly Elliptic Curves of Prime Order -- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving -- SPA Resistant Left-to-Right Integer Recodings -- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over . |
Altri titoli varianti | SAC 2005 |
Record Nr. | UNINA-9910484328403321 |
Berlin ; ; New York, : Springer, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / / Bart Preneel, Vincent Rijmen (editors) |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [1998] |
Descrizione fisica | 1 online resource (VIII, 400 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-540-49248-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey -- Cryptographic Primitives for Information Authentication — State of the Art -- Recent Developments in the Design of Conventional Cryptographic Algorithms -- Elliptic Curve Public-Key Cryptosystems — An Introduction -- Key Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet Electronic Mail -- GSM: Security, Services, and the SIM -- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View -- Management of Secret Keys: Dynamic Key Handling -- On Solutions to the Key Escrow Problem -- Smart Cards — Requirements, Properties, and Applications -- Smart Card Security ‘How Can We Be So Sure?’ -- Security Aspects of the Ecash™ Payment System -- International Standardisation of IT Security -- Security Management — The Process -- to Computer Security. |
Record Nr. | UNINA-9910143466003321 |
Berlin ; ; Heidelberg : , : Springer, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / / Bart Preneel, Vincent Rijmen (editors) |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [1998] |
Descrizione fisica | 1 online resource (VIII, 400 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-540-49248-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey -- Cryptographic Primitives for Information Authentication — State of the Art -- Recent Developments in the Design of Conventional Cryptographic Algorithms -- Elliptic Curve Public-Key Cryptosystems — An Introduction -- Key Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet Electronic Mail -- GSM: Security, Services, and the SIM -- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View -- Management of Secret Keys: Dynamic Key Handling -- On Solutions to the Key Escrow Problem -- Smart Cards — Requirements, Properties, and Applications -- Smart Card Security ‘How Can We Be So Sure?’ -- Security Aspects of the Ecash™ Payment System -- International Standardisation of IT Security -- Security Management — The Process -- to Computer Security. |
Record Nr. | UNISA-996465897403316 |
Berlin ; ; Heidelberg : , : Springer, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|