Cryptography and security [electronic resource] : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday / David Naccache (ed.)

Annotation This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Other Authors: Naccache, David, 1967-
Format: Electronic eBook
Language:English
Published: Berlin ; New York : Springer, ©2012.
Series:Lecture notes in computer science ; 6805.
LNCS sublibrary. Security and cryptology.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b7089481
006 m o d
007 cr |||||||||||
008 120306s2012 gw ac ob 011 0 eng d
005 20240418144233.2
019 |a 847508610  |a 857261869  |a 902702246  |a 964922055  |a 1005746494  |a 1027360705  |a 1066452153  |a 1081250657  |a 1086945075  |a 1110998285  |a 1162757904  |a 1204092556 
020 |a 9783642283680  |q (electronic bk.) 
020 |a 3642283683  |q (electronic bk.) 
020 |a 3642283675 
020 |a 9783642283673 
020 |z 9783642283673 
024 7 |a 10.1007/978-3-642-28368-0 
035 |a (OCoLC)spr779341351 
035 |a (OCoLC)779341351  |z (OCoLC)847508610  |z (OCoLC)857261869  |z (OCoLC)902702246  |z (OCoLC)964922055  |z (OCoLC)1005746494  |z (OCoLC)1027360705  |z (OCoLC)1066452153  |z (OCoLC)1081250657  |z (OCoLC)1086945075  |z (OCoLC)1110998285  |z (OCoLC)1162757904  |z (OCoLC)1204092556 
037 |a spr978-3-642-28368-0 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d UKMGB  |d COO  |d OCLCQ  |d E7B  |d MEAUC  |d OCLCO  |d OCLCF  |d BEDGE  |d DKDLA  |d OCLCQ  |d YDXCP  |d OCLCQ  |d EBLCP  |d OCLCQ  |d VT2  |d VGM  |d ESU  |d OCLCQ  |d IOG  |d NJR  |d OCLCA  |d BUF  |d CEF  |d U3W  |d WYU  |d UWO  |d YOU  |d TKN  |d OCLCQ  |d LEAUB  |d OCLCQ  |d AJS  |d DCT  |d OCLCQ  |d OCLCO 
049 |a GWRE 
050 4 |a QA76.9.A25  |b C79 2012 
245 0 0 |a Cryptography and security  |h [electronic resource] :  |b from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday /  |c David Naccache (ed.) 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2012. 
300 |a 1 online resource (xiii, 502 pages) :  |b illustrations, color portraits. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 6805. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
504 |a Includes bibliographical references and author index. 
505 0 |a The hidden side of Jean-Jacques Quisquater / Michaël Quisquater -- On Quisquater's multiplication algorithm / Marc Joye -- A brief survey of research jointly with Jean-Jacques Cascaded / Yvo Desmedt -- DES collisions revisited / Sebastiaan Indesteege and Bart Preneel -- Line directed hypergraphs / Jean-Claude Bermond, Fahir Ergincan, and Michel Syska -- Random permutation statistics and an improved slide-determine attack on KeeLoq / Nicolas T. Courtois and Gregory V. Bard -- Self-similarity attacks on block ciphers and application to KeeLoq / Nicolas T. Courtois -- Increasing block sizes using Feistel networks: the example of the AES / Jacques Patarin, Benjamin Gittins, and Joana Treger -- Authenticated-encryption with padding: a formal security treatment / Kenneth G. Paterson and Gaven J. Watson -- Traceable signature with stepping capabilities / Olivier Blazy and David Pointcheval -- Deniable RSA signature: the raise and fall of Ali Baba / Serge Vaudenay -- Autotomic signatures / David Naccache and David Pointecheval -- Fully forward-secure group signatures / Benoît Libert and Moti Yung -- Public key encryption for the forgetful / Pu wen Wei, Yulang Zheng, and Xiaoyn Wang -- Supplemental access control (PACE v2): security analysis of PACE integrated mapping / Jean-Sébastien Coron, Aline Gouget, Thomas Icart, and Pascal Paillier -- Secret key leakage from public key perturbation of DLP-based cryptosystems / Alexandre Berzati, Cécile Canovas-Dumas, and Louis Goubin -- EM probes characterisation for security analysis / Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, and Assia Tria -- An updated survey on secure ECC implementations: attacks, countermeasures and cost / Junfeng Fan and Ingrid Verbauwhede -- Masking with randomized look up tables: towards preventing side-channel attacks of all orders / Franc̦ois-Xavier Standaert, Christophe Petit, and Nicolas Veyrat-Charvillon -- Efficient implementation of true random number generator based on SRAM PUFs / Vincent van der Leest, Erik van der Sluis, Geert-Jan Schrijen, Pim Tuyls, and Helena Handschuh -- Operand folding hardware multipliers / Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, and Karim Sabeg -- SIMPL systems as a keyless cryptographic and security primitive / Ulrich Rührmair -- Cryptography with asynchronous logic automata / Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld -- A qualitative security analysis of a new class of 3-D integrated crypto co-processors / Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, C̦etin Kaya Koc̦, Timothy Levin, and Timothy Sherwood -- The challenges raised by the privacy-preserving identity card / Yves Deswarte and Sébastien Gambs -- The next smart card nightmare: logical attacks, combined attacks, mutant applications and other funny things / Guillaume Bouffard and Jean-Louis Lanet -- Localization privacy / Mike Burmester -- Dynamic secure cloud storage with provenance / Sherman S.M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, and Robert H. Deng -- Efficient encryption and storage of close distance messages with applications to cloud storage / George Davida and Yair Frankel -- A Nagell algorithm in any characteristic / Mehdi Tibouchi -- How to read a signature? / Vanessa Gratzer and David Naccache -- Fooling a liveness-detecting capacitive fingerprint scanner / Edwin Bowden-Peters, Raphael C.-W. Phan, John N. Whitley, and David J. Parish -- Physical simulation of inarticulate robots / Guillaume Claret, Michaël Mathieu, David Naccache, and Guillaume Seguin. 
520 8 |a Annotation This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests." 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524. 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935. 
700 1 |a Naccache, David,  |d 1967-  |0 http://id.loc.gov/authorities/names/n2001007652  |1 http://isni.org/isni/0000000114634280. 
776 0 8 |i Printed edition:  |z 9783642283673. 
830 0 |a Lecture notes in computer science ;  |v 6805.  |0 http://id.loc.gov/authorities/names/n42015162. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology.  |0 http://id.loc.gov/authorities/names/no2007042442. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-28368-0  |z Full Text (via Springer) 
907 |a .b70894814  |b 04-01-21  |c 04-24-12 
998 |a web  |b 03-31-21  |c b  |d b   |e -  |f eng  |g gw   |h 0  |i 1 
907 |a .b70894814  |b 03-31-21  |c 04-24-12 
944 |a MARS - RDA ENRICHED 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
915 |a - 
956 |a Springer e-books 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
999 f f |i e78a7151-e731-5314-b807-bd8a7865d529  |s 051a3a20-7dbd-57f7-b237-ee49d42e8152 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 C79 2012  |h Library of Congress classification  |i Ebooks, Prospector  |n 1