Narrow your search

Library

AP (8)

KDG (8)

KU Leuven (8)

Odisee (8)

Thomas More Kempen (8)

Thomas More Mechelen (8)

UCLL (8)

ULB (8)

ULiège (8)

VIVES (8)

More...

Resource type

book (18)

digital (8)


Language

English (24)

French (2)


Year
From To Submit

2024 (1)

2022 (1)

2016 (1)

2014 (2)

2012 (3)

More...
Listing 1 - 10 of 26 << page
of 3
>>
Sort by

Digital
Topics in Cryptology -- CT-RSA 2006 : The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings
Author:
ISBN: 9783540326489 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Book
Asymmetric cryptography : primitives and protocols
Author:
ISBN: 1394188366 139418834X Year: 2022 Publisher: Hoboken : ISTE Ltd : John Wiley and Sons Inc,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.


Book
Cryptographie Asymétrique : Primitives et Protocoles.
Author:
ISBN: 1789490960 Year: 2024 Publisher: London : ISTE Editions Ltd.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

La cryptographie asymétrique introduite par Diffie et Hellman en 1976 a été rapidement mise en oeuvre avec des constructions de chiffrement et de signature. Cela a conduit à un tout nouveau domaine de recherche, avec des définitions formelles et des modèles de sécurité. Depuis lors, des outils impressionnants ont été développés, avec des propriétés innovatrices, notamment en exploitant les couplages sur les courbes elliptiques.Cryptographie asymétrique présente le chiffrement à clé publique et la signature, puis les primitives de base de la cryptographie asymétrique. Il analyse ensuite la notion de sécurité prouvable, qui définit le fait d'être « sécurisé » pour un schéma cryptographique. En outre, une sélection de protocoles est proposée, avec notamment les preuves à divulgation nulle de connaissance, le calcul multi-parties et l'échange de clé. Après un rappel sur la cryptographie basée sur les couplages, cet ouvrage expose des schémas cryptographiques avancés pour la confidentialité et l'authentification, avec des propriétés supplémentaires, tels que des signatures anonymes et du chiffrement multi-receveurs. Enfin, il traite le sujet plus récent du calcul vérifiable.

Keywords


Book
Progress in Cryptology – AFRICACRYPT 2014 : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings
Authors: ---
ISBN: 3319067338 3319067346 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented  together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africacrypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols, and Lattice-based Cryptography.

Keywords

Data encryption (Computer science) --- Computer security --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Electronic data processing. --- Computer science. --- Information Systems. --- Systems and Data Security. --- Cryptology. --- Coding and Information Theory. --- Numeric Computing. --- Computation by Abstract Devices. --- Management of Computing and Information Systems. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Office practice --- Informatics --- Science --- Protection --- Security measures --- Automation --- Information theory. --- Numerical analysis. --- Computers. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Mathematical analysis --- Communication theory --- Communication --- Communication systems


Digital
Progress in Cryptology – AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings
Authors: ---
ISBN: 9783642219696 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Advances in Cryptology – EUROCRYPT 2012 : 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings
Authors: ---
ISBN: 9783642290114 Year: 2012 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Progress in Cryptology – AFRICACRYPT 2014 : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings
Authors: ---
ISBN: 9783319067346 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented  together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africacrypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols, and Lattice-based Cryptography.


Book
Advances in cryptology--EUROCRYPT 2012 : 31st annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012 : proceedings
Authors: --- ---
ISBN: 3642290108 3642290116 Year: 2012 Publisher: Heidelberg ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.

Keywords

Engineering & Applied Sciences --- Computer Science --- Data encryption (Computer science) --- Computer security --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Management of Computing and Information Systems. --- Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Computational complexity. --- Information Systems. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.


Book
Topics in Cryptology -- CT-RSA 2006
Authors: ---
ISBN: 9783540326489 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH.

Loading...
Export citation

Choose an application

Bookmark

Abstract

The RSA R Conference, with over 15,000attendees, as well as over 225 sponsors and exhibitors, is the largest computer security event of the year. The Cr- tographers' Track is one of the many parallel tracks. These proceedings contain the papers presented during the sixth edition. The tradition indeed started in 2001, and is by now well established: the Cryptographers' Track at the RSA Conference is among the major events in cryptography. There were 72 submitted contributions, of which 22 were selected for p- sentation. They cover all aspects of cryptography (symmetric and asymmetric cryptography, constructions and attacks, new trends). In addition, the program includes two invited talks, by Xiaoyun Wang on Cryptanalysis of Hash fu- tions and Potential Dangers,  and Philip MacKenzie on Passwords Will Not Die: How Cryptography Can Help Deal with Them.  All the submissions were reviewed by at least three members of the Program Committee. Iamverygratefultothe24membersfortheirhardandconscientious work.


Digital
Public Key Cryptography - PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings
Authors: ---
ISBN: 9783642130137 9783642130120 9783642130144 Year: 2010 Publisher: Berlin, Heidelberg Springer

Listing 1 - 10 of 26 << page
of 3
>>
Sort by