Narrow your search

Library

KBR (11)

ULiège (7)

KU Leuven (6)

ULB (6)

UCLouvain (4)

UGent (4)

UNamur (3)

UAntwerpen (2)

Belgian Parliament (1)

VUB (1)


Resource type

book (11)

dissertation (1)

periodical (1)


Language

English (7)

French (4)


Year
From To Submit

2000 (1)

1999 (1)

1998 (1)

1997 (1)

1996 (1)

More...
Listing 1 - 10 of 11 << page
of 2
>>
Sort by
Le décryptement
Author:
ISBN: 2130380204 9782130380207 Year: 1983 Volume: 2112 Publisher: Paris: PUF,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Coding theory and cryptography: the essentials
Authors: --- ---
ISBN: 0824704657 9780824704650 Year: 2000 Volume: 234 Publisher: New York (N.Y.): Dekker,

Advances in cryptology--EUROCRYPT '91 : workshop on the theory and application of cryptography techniques, Brighton, UK, April 8-11, 1991 : proceedings
Author:
ISBN: 3540546200 0387546200 Year: 1991 Volume: 547 Publisher: Berlin New York Budapest Springer-Verlag


Book
Cryptologie contemporaine
Authors: ---
ISSN: 09952179 ISBN: 2225839700 9782225839702 Year: 1993 Volume: 9 Publisher: Paris: Masson,


Book

Book
Digital signature schemes : general framework and fail-stop signatures
Author:
ISBN: 3540615172 3540687122 Year: 1996 Volume: 1100 Publisher: Berlin ; Heidelberg ; New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track. Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is vital to democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author develops the new class of digital fail-stop signatures. This monograph is self-contained regarding the historical background and cryptographic primitives used. For the first time, a general and sophisticated framework is introduced in which innovative fail-stop signatures are systematically presented and evaluated, from theoretical foundations to engineering aspects.

The nature and power of mathematics
Author:
ISBN: 0691025622 0691087830 9780691025629 Year: 1993 Publisher: Princeton (N.J.): Princeton university press,

Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 1991 : final report
Authors: --- --- ---
ISBN: 0387552154 3540552154 3540467807 Year: 1992 Volume: 578 Publisher: Berlin New York Springer-Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

This report on the state of the art and future directions of public-key cryptography is published in accordance with the terms of reference of the European Institute for System Security (EISS). The EISS was founded in 1988 by cabinet resolution of the state government of Baden-W}rttemberg and its basic task is scientific research and knowledge transfer in the field of security in telecommunications and computer and information systems. This report gives the results of an EISS workshop on public-keycryptography and contains seven chapters: an introduction, the scope of the workshop, the topics chosen, classification and description of the most prominent public-key systems, the dependence of public-key cryptography on computational number theory, mistakes and problems with public-key systems, and a projection of needs and requirements for public-key systems. It is addressed to all members of the computer science community: systems developers, researchers, decision makers, standardization committees, patent offices, and users and customers of secure computer systems.

Keywords

Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Computers --- Access control --- -Public key cryptography --- 681.3*E3 --- 681.3*F21 --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encryption: data encryption standard; DES; public key cryptosystems --- Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- 681.3*F21 Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cryptography. --- Public key cryptography --- Computer security --- Computers - Access control. --- Data encryption (Computer science). --- Computer software. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science)

Listing 1 - 10 of 11 << page
of 2
>>
Sort by