Narrow your search

Library

KU Leuven (6)

AP (5)

EhB (5)

KDG (5)

ULB (5)

ULiège (5)

VUB (5)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

More...

Resource type

book (12)

digital (5)


Language

English (17)


Year
From To Submit

2017 (1)

2013 (2)

2012 (2)

2008 (2)

2006 (9)

More...
Listing 1 - 10 of 17 << page
of 2
>>
Sort by
Progress on cryptography : 25 years of cryptography in China
Author:
ISBN: 1402079877 1402079869 Year: 2004 Publisher: New York : Kluwer Academic Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.

Keywords

Computer security --- Cryptography --- Engineering & Applied Sciences --- Computer Science --- History --- Coding theory. --- Information theory. --- Computer engineering. --- Data structures (Computer science). --- Computers. --- Computer science—Mathematics. --- Management information systems. --- Computer science. --- Coding and Information Theory. --- Computer Engineering. --- Data Structures and Information Theory. --- Theory of Computation. --- Discrete Mathematics in Computer Science. --- Management of Computing and Information Systems. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Communication theory --- Communication --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Communication systems --- Design and construction

Information security practice and experience : second international conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006 : proceedings
Authors: ---
ISBN: 9783540330523 3540330526 3540330585 Year: 2006 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which took place in Hangzhou, China, April 11–14, 2006. The inaugural ISPEC 2005 was held exactly one year earlier in Singapore. As applications of information security technologies become pervasive, issues pertaining to their deployment and operations are becoming increasingly imp- tant. ISPEC is an annual conference that brings together researchers and pr- titioners to provide a con?uence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. ISPEC 2006 received 307 submissions. This is probably the highest number of paper submissions in any information security-related technical conferences. Due to this exceptionally large number of submissions and the high quality of the submitted papers, not all the papers that contained innovative ideas could be accepted. Each paper was sent to at least three Program Committee m- bers for comments. Based on the reviewers’ comments and discussion by the Program Committee, of the 307 submissions, 35 were selected for inclusion in these proceedings as research track papers and another 21 papers were selected as industrial track papers and are published in the Journal of Shanghai Jiaotong University (Science).

Keywords

Computer security --- Data protection --- Sécurité informatique --- Protection de l'information (Informatique) --- Congresses. --- Congrès --- Computer networks --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Storage and Retrieval. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Information Systems. --- Information storage and retrieva. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Information retrieval. --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems


Digital
Advances in Cryptology -- ASIACRYPT 2006 : 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings
Authors: ---
ISBN: 9783540494768 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Cryptographic Protocol : Security Analysis Based on Trusted Freshness
Authors: ---
ISBN: 9783642240737 Year: 2012 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Information Security and Cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Authors: --- ---
ISBN: 3319547054 3319547046 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.

Keywords

Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Data Encryption. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Civilization and computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer software engineering --- Informatics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Security measures --- Protection of computer systems --- Protection --- Civilization --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Engineering --- Science --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Cryptology. --- Data encryption (Computer science) --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Advances in Cryptology -- ASIACRYPT 2006
Authors: --- ---
ISBN: 9783540494768 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH.

Loading...
Export citation

Choose an application

Bookmark

Abstract

ASIACRYPT 2006 was held in Shanghai, China, during December 3-7, 2006. This was the 12th annual ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with theStateKeyLabsofInformationSecurity,ChineseAcademyofSciences(LOIS), Lab for Cryptography and Information Security, Shanghai Jiaotong University (CIS/SJTU) and Natural Science Foundation of China (NSFC). This year we received a record number of 314 submissions, of which 303 re- lar submissions were reviewed by 32 members of the Program Committee, with thehelp of250externalreferees.After a two-monthreviewprocess,the Program Committee selected 30 papers for presentation. This volume of proceedings c- tains the revisedversionof the 30 selected papers. The IACR 2006 distinguished lecture by Ivan Damgaard was also in the program. The paper Finding SHA-1 Characteristics  by Christophe De Canni´ ere and Christian Rechberger received the best paper award. Thereviewingprocesswasachallengingtask,andwehadto rejectmanygood submissions that could have been accepted under normal circumstances. I am verygratefultoProgramCommitteefortheire?ortstocarryoutthischallenging task and to keep the high standard of ASIACRYPT conferences. We gratefully acknowledge our 250 external referees; without their help it would be infeasible to provide1008high-quality,oftenextensive,reviews.Moreimportantly,Iwould like to thank all the authors who submitted their work to ASIACRYPT 2006. This year submissions were processed using Web-based software iChair, and would like to thank Thomas Baigneres, Matthieu Finiasz and Serge Vaudenay for providing this valuable tool. I am grateful to Ruimin Shen for his generous and indispensable support and I would like to thank Changzhe Gao, Haining Lu and Jingjing Wu for the smooth operation of our Web-sites.


Book
Cryptographic Protocol
Authors: --- ---
ISBN: 9783642240737 Year: 2012 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism's efficiency, rigorousness, and the possibility of its automation are also presented. The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world. Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.


Digital
Cryptology and Network Security (vol. # 4301) : 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings
Authors: --- ---
ISBN: 9783540494638 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Book
Cryptology and Network Security (vol. # 4301)
Authors: --- --- ---
ISBN: 9783540494638 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH.

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ?fth International Conference on Cryptology and Network Security (CANS 2006)washeld in Suzhou, Jiangsu,China, December 8-10,2006.The conference was organized in cooperation with the International Association for Cryptologic Research(IACR)andtheNationalNatureScienceFoundationofChina(NSFC). The 1st International Workshop on Cryptology and Network Security was held in Taipei, Taiwan, 2001. The second one was in San Francisco, Calif- nia, USA, September 26-28, 2002, the third in Miami, Florida, USA, September 24-26,2003,andthe fourth in Xiamen,Fujian Province,China, December 14-16, 2005. CANS 2005 was the ?rst CANS with proceedings published in the Lecture Notes in Computer Science series by Springer and granted the success of last year and this year, CANS 2006 was also published in the same series. The P- gram Committee received 148 submissions, and accepted 26 papers, all included in the proceedings. The reviewing process, which took eight weeks, was run using the iChair software, written by Thomas Baign` eres and Matthieu Finiasz (EPFL, Switz- land). Each paper was carefully evaluated by at least three members from the Program Committee. We appreciate the hard work of the members of the ProgramCommitteeandexternalrefereeswhogavemanyhoursoftheirvaluable time. Notethattheseproceedingscontaintherevisedversionsoftheselectedpapers. Since the revisions were not checked again before publication, the authors (and not the committee) bear full responsibility of the contents of their papers. Inadditiontothe contributedpapers,thereweretwoinvitedtalks:MoniNaor and Xiaoyun Wang.


Digital
Information Security Practice and Experience (vol. # 3903) : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings
Authors: --- --- ---
ISBN: 9783540330585 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH

Listing 1 - 10 of 17 << page
of 2
>>
Sort by