Cryptography and security [electronic resource] : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday / David Naccache (ed.)
Annotation This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2012.
|
Series: | Lecture notes in computer science ;
6805. LNCS sublibrary. Security and cryptology. |
Subjects: |
MARC
LEADER | 00000cam a2200000xa 4500 | ||
---|---|---|---|
001 | b7089481 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 120306s2012 gw ac ob 011 0 eng d | ||
005 | 20240418144233.2 | ||
019 | |a 847508610 |a 857261869 |a 902702246 |a 964922055 |a 1005746494 |a 1027360705 |a 1066452153 |a 1081250657 |a 1086945075 |a 1110998285 |a 1162757904 |a 1204092556 | ||
020 | |a 9783642283680 |q (electronic bk.) | ||
020 | |a 3642283683 |q (electronic bk.) | ||
020 | |a 3642283675 | ||
020 | |a 9783642283673 | ||
020 | |z 9783642283673 | ||
024 | 7 | |a 10.1007/978-3-642-28368-0 | |
035 | |a (OCoLC)spr779341351 | ||
035 | |a (OCoLC)779341351 |z (OCoLC)847508610 |z (OCoLC)857261869 |z (OCoLC)902702246 |z (OCoLC)964922055 |z (OCoLC)1005746494 |z (OCoLC)1027360705 |z (OCoLC)1066452153 |z (OCoLC)1081250657 |z (OCoLC)1086945075 |z (OCoLC)1110998285 |z (OCoLC)1162757904 |z (OCoLC)1204092556 | ||
037 | |a spr978-3-642-28368-0 | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d UKMGB |d COO |d OCLCQ |d E7B |d MEAUC |d OCLCO |d OCLCF |d BEDGE |d DKDLA |d OCLCQ |d YDXCP |d OCLCQ |d EBLCP |d OCLCQ |d VT2 |d VGM |d ESU |d OCLCQ |d IOG |d NJR |d OCLCA |d BUF |d CEF |d U3W |d WYU |d UWO |d YOU |d TKN |d OCLCQ |d LEAUB |d OCLCQ |d AJS |d DCT |d OCLCQ |d OCLCO | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 |b C79 2012 | |
245 | 0 | 0 | |a Cryptography and security |h [electronic resource] : |b from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday / |c David Naccache (ed.) |
260 | |a Berlin ; |a New York : |b Springer, |c ©2012. | ||
300 | |a 1 online resource (xiii, 502 pages) : |b illustrations, color portraits. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file. | ||
347 | |b PDF. | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 6805. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
504 | |a Includes bibliographical references and author index. | ||
505 | 0 | |a The hidden side of Jean-Jacques Quisquater / Michaël Quisquater -- On Quisquater's multiplication algorithm / Marc Joye -- A brief survey of research jointly with Jean-Jacques Cascaded / Yvo Desmedt -- DES collisions revisited / Sebastiaan Indesteege and Bart Preneel -- Line directed hypergraphs / Jean-Claude Bermond, Fahir Ergincan, and Michel Syska -- Random permutation statistics and an improved slide-determine attack on KeeLoq / Nicolas T. Courtois and Gregory V. Bard -- Self-similarity attacks on block ciphers and application to KeeLoq / Nicolas T. Courtois -- Increasing block sizes using Feistel networks: the example of the AES / Jacques Patarin, Benjamin Gittins, and Joana Treger -- Authenticated-encryption with padding: a formal security treatment / Kenneth G. Paterson and Gaven J. Watson -- Traceable signature with stepping capabilities / Olivier Blazy and David Pointcheval -- Deniable RSA signature: the raise and fall of Ali Baba / Serge Vaudenay -- Autotomic signatures / David Naccache and David Pointecheval -- Fully forward-secure group signatures / Benoît Libert and Moti Yung -- Public key encryption for the forgetful / Pu wen Wei, Yulang Zheng, and Xiaoyn Wang -- Supplemental access control (PACE v2): security analysis of PACE integrated mapping / Jean-Sébastien Coron, Aline Gouget, Thomas Icart, and Pascal Paillier -- Secret key leakage from public key perturbation of DLP-based cryptosystems / Alexandre Berzati, Cécile Canovas-Dumas, and Louis Goubin -- EM probes characterisation for security analysis / Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, and Assia Tria -- An updated survey on secure ECC implementations: attacks, countermeasures and cost / Junfeng Fan and Ingrid Verbauwhede -- Masking with randomized look up tables: towards preventing side-channel attacks of all orders / Franc̦ois-Xavier Standaert, Christophe Petit, and Nicolas Veyrat-Charvillon -- Efficient implementation of true random number generator based on SRAM PUFs / Vincent van der Leest, Erik van der Sluis, Geert-Jan Schrijen, Pim Tuyls, and Helena Handschuh -- Operand folding hardware multipliers / Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, and Karim Sabeg -- SIMPL systems as a keyless cryptographic and security primitive / Ulrich Rührmair -- Cryptography with asynchronous logic automata / Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld -- A qualitative security analysis of a new class of 3-D integrated crypto co-processors / Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, C̦etin Kaya Koc̦, Timothy Levin, and Timothy Sherwood -- The challenges raised by the privacy-preserving identity card / Yves Deswarte and Sébastien Gambs -- The next smart card nightmare: logical attacks, combined attacks, mutant applications and other funny things / Guillaume Bouffard and Jean-Louis Lanet -- Localization privacy / Mike Burmester -- Dynamic secure cloud storage with provenance / Sherman S.M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, and Robert H. Deng -- Efficient encryption and storage of close distance messages with applications to cloud storage / George Davida and Yair Frankel -- A Nagell algorithm in any characteristic / Mehdi Tibouchi -- How to read a signature? / Vanessa Gratzer and David Naccache -- Fooling a liveness-detecting capacitive fingerprint scanner / Edwin Bowden-Peters, Raphael C.-W. Phan, John N. Whitley, and David J. Parish -- Physical simulation of inarticulate robots / Guillaume Claret, Michaël Mathieu, David Naccache, and Guillaume Seguin. | |
520 | 8 | |a Annotation This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests." | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524. | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862. | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484. | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935. | |
700 | 1 | |a Naccache, David, |d 1967- |0 http://id.loc.gov/authorities/names/n2001007652 |1 http://isni.org/isni/0000000114634280. | |
776 | 0 | 8 | |i Printed edition: |z 9783642283673. |
830 | 0 | |a Lecture notes in computer science ; |v 6805. |0 http://id.loc.gov/authorities/names/n42015162. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. |0 http://id.loc.gov/authorities/names/no2007042442. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-28368-0 |z Full Text (via Springer) |
907 | |a .b70894814 |b 04-01-21 |c 04-24-12 | ||
998 | |a web |b 03-31-21 |c b |d b |e - |f eng |g gw |h 0 |i 1 | ||
907 | |a .b70894814 |b 03-31-21 |c 04-24-12 | ||
944 | |a MARS - RDA ENRICHED | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2012 English International | ||
915 | |a - | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2012 English International | ||
999 | f | f | |i e78a7151-e731-5314-b807-bd8a7865d529 |s 051a3a20-7dbd-57f7-b237-ee49d42e8152 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 C79 2012 |h Library of Congress classification |i Ebooks, Prospector |n 1 |