Listing 1 - 10 of 26 | << page >> |
Sort by
|
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- cryptografie --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.
Choose an application
La cryptographie asymétrique introduite par Diffie et Hellman en 1976 a été rapidement mise en oeuvre avec des constructions de chiffrement et de signature. Cela a conduit à un tout nouveau domaine de recherche, avec des définitions formelles et des modèles de sécurité. Depuis lors, des outils impressionnants ont été développés, avec des propriétés innovatrices, notamment en exploitant les couplages sur les courbes elliptiques.Cryptographie asymétrique présente le chiffrement à clé publique et la signature, puis les primitives de base de la cryptographie asymétrique. Il analyse ensuite la notion de sécurité prouvable, qui définit le fait d'être « sécurisé » pour un schéma cryptographique. En outre, une sélection de protocoles est proposée, avec notamment les preuves à divulgation nulle de connaissance, le calcul multi-parties et l'échange de clé. Après un rappel sur la cryptographie basée sur les couplages, cet ouvrage expose des schémas cryptographiques avancés pour la confidentialité et l'authentification, avec des propriétés supplémentaires, tels que des signatures anonymes et du chiffrement multi-receveurs. Enfin, il traite le sujet plus récent du calcul vérifiable.
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africacrypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols, and Lattice-based Cryptography.
Data encryption (Computer science) --- Computer security --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Electronic data processing. --- Computer science. --- Information Systems. --- Systems and Data Security. --- Cryptology. --- Coding and Information Theory. --- Numeric Computing. --- Computation by Abstract Devices. --- Management of Computing and Information Systems. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Office practice --- Informatics --- Science --- Protection --- Security measures --- Automation --- Information theory. --- Numerical analysis. --- Computers. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Mathematical analysis --- Communication theory --- Communication --- Communication systems
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- cryptologie --- complexe analyse (wiskunde) --- computerbeveiliging --- informatica management --- OS (operating system) --- computernetwerken --- Africa
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africacrypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols, and Lattice-based Cryptography.
Ergodic theory. Information theory --- Mathematical control systems --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- cryptologie --- computers --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computerkunde --- numerieke analyse --- informatietheorie --- gegevensverwerking --- Africa
Choose an application
This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.
Engineering & Applied Sciences --- Computer Science --- Data encryption (Computer science) --- Computer security --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Management of Computing and Information Systems. --- Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Computational complexity. --- Information Systems. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.
Choose an application
The RSA R Conference, with over 15,000attendees, as well as over 225 sponsors and exhibitors, is the largest computer security event of the year. The Cr- tographers' Track is one of the many parallel tracks. These proceedings contain the papers presented during the sixth edition. The tradition indeed started in 2001, and is by now well established: the Cryptographers' Track at the RSA Conference is among the major events in cryptography. There were 72 submitted contributions, of which 22 were selected for p- sentation. They cover all aspects of cryptography (symmetric and asymmetric cryptography, constructions and attacks, new trends). In addition, the program includes two invited talks, by Xiaoyun Wang on Cryptanalysis of Hash fu- tions and Potential Dangers, and Philip MacKenzie on Passwords Will Not Die: How Cryptography Can Help Deal with Them. All the submissions were reviewed by at least three members of the Program Committee. Iamverygratefultothe24membersfortheirhardandconscientious work.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- cryptografie --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- MIS (management informatie systeem) --- cryptografie --- discrete wiskunde --- complexe analyse (wiskunde) --- computers --- informatica --- externe fixatie (geneeskunde --- algoritmen --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Listing 1 - 10 of 26 | << page >> |
Sort by
|