Plus d’un million de livres, à portée de main !
Bookbot

Bart Preneel

    Advances in cryptology
    Topics in cryptology
    Selected areas in cryptography
    Progress in cryptology
    Cryptographic hardware and embedded systems
    Privacy technologies and policy
    • 2014

      Privacy technologies and policy

      • 215pages
      • 8 heures de lecture

      This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

      Privacy technologies and policy
    • 2011

      This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

      Cryptographic hardware and embedded systems
    • 2009

      Progress in cryptology

      • 434pages
      • 16 heures de lecture

      This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.

      Progress in cryptology
    • 2006

      Selected areas in cryptography

      • 371pages
      • 13 heures de lecture

      SAC 2005 marked the 12th annual workshop on Selected Areas in Cryptography and was hosted for the fifth time at Queen’s University in Kingston. Previous workshops took place at various institutions, including Carleton University, the Fields Institute, Memorial University, and the University of Waterloo. This workshop fostered a relaxed environment for researchers to present and discuss their work in cryptography. The themes for SAC 2005 included the design and analysis of symmetric key cryptosystems, primitives for symmetric key cryptography such as block and stream ciphers, hash functions, and MAC algorithms, as well as efficient implementations of symmetric and public key algorithms. Additionally, the workshop addressed cryptographic algorithms and protocols for ubiquitous computing, including sensor networks and RFID. A total of 96 papers were submitted, with three excluded due to multiple submissions. After a thorough double-blind review process, the program committee accepted 25 papers for presentation. The workshop featured two invited speakers: Alfred Menezes, who discussed provable security, and Mike Wiener, who examined the full cost of cryptanalytic attacks, both delivering engaging and thought-provoking talks.

      Selected areas in cryptography
    • 2002

      Topics in cryptology

      • 311pages
      • 11 heures de lecture

      This volume continues the tradition of publishing contributions from the Cryptographers’ Track (CT-RSA) at the RSA Security Conference in Springer-Verlag’s Lecture Notes in Computer Science series. As the largest e-security and cryptography conference, the RSA Security Conference features 14 parallel tracks and thousands of participants. The Cryptographers’ Track showcases the latest scientific developments in the field. The program committee reviewed 49 submissions and selected 20 for presentation, with one paper withdrawn by the authors. The program also included two invited talks by Ron Rivest and Victor Shoup. Each paper underwent a thorough review process, with at least three committee members evaluating each submission; papers by committee members received six reviews. Authors of accepted papers made significant efforts to incorporate feedback into their submissions. In some cases, revisions were double-checked by committee members. Special thanks are due to the 20 program committee members for their commitment to maintaining rigorous scientific standards, providing thoughtful reviews, and engaging in extensive discussions, which resulted in over 400 Kbytes of comments. Many members attended the program committee meeting despite the allure of Santa Barbara's sunny beaches.

      Topics in cryptology
    • 2000

      Advances in cryptology

      • 621pages
      • 22 heures de lecture

      This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2000, held in Bruges, Belgium, in May 2000. The 39 revised full papers presented were carefully selected from a total of 150 submissions during a highly competitive reviewing process. The book is divided in topical sections of factoring and discrete logarithm, digital signatures, private information retrieval, key management protocols, threshold cryptography, public-key encryption, quantum cryptography, multi-party computation and information theory, zero-knowledge, symmetric cryptography, Boolean functions and hardware, voting schemes, and stream ciphers and block ciphers.

      Advances in cryptology
    • 1998

      State of the art in applied cryptography

      • 395pages
      • 14 heures de lecture

      The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven has been offering a biennial course on computer security and industrial cryptography since 1983. Designed for researchers and practitioners from both industry and government, the course covers fundamental principles and the latest developments, with a strong emphasis on cryptography while also addressing key topics in computer security. It seeks to balance basic theory with practical applications, mathematical foundations with legal aspects, and recent technological advancements with standardization issues. A notable strength of the course is its ability to foster dialogue among participants from diverse professional backgrounds. In 1993, the formal proceedings were published in the Lecture Notes in Computer Science series (Volume 741). Given the significant advancements in cryptography since then, there is a clear need for a new edition. The publication of numerous excellent textbooks and handbooks on cryptology has reduced the demand for introductory-level papers, while the growth of major cryptology conferences such as Eurocrypt, Crypto, and Asiacrypt indicates an increasing interest in the field.

      State of the art in applied cryptography