Narrow your search

Library

KU Leuven (46)

ULB (13)

ULiège (13)

Odisee (11)

Thomas More Kempen (11)

Thomas More Mechelen (11)

UCLL (11)

VIVES (11)

VUB (10)

UGent (8)

More...

Resource type

dissertation (30)

book (29)

digital (6)


Language

English (59)

Undetermined (2)

Dutch (1)


Year
From To Submit

2024 (6)

2023 (1)

2022 (3)

2021 (1)

2020 (6)

More...
Listing 1 - 10 of 62 << page
of 7
>>
Sort by
The design of Rijndael : AES, the Advanced Encryption Standard
Authors: ---
ISBN: 3540425802 3642076467 3662047225 9783540425809 Year: 2002 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference. (flaptekst)

Keywords

Mathematical control systems --- Programming --- Computer science --- Computer security --- Data encryption (Computer science) --- Passwords --- 681.3*E3 --- 681.3*C2 --- 681.3*D46 --- 681.3*K65 --- AES --- Computerbeveiliging --- Data encryptie --- Rijndael --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Passwords. --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption (Computer science). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 681.3 *C2 --- Computer security. --- Computer communication systems. --- Algorithms. --- Systems and Data Security. --- Cryptology. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Computer security - Passwords


Book
Advances in Cryptology – EUROCRYPT 2019 : 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part III
Authors: ---
ISBN: 3030176592 3030176584 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Keywords

Data encryption (Computer science). --- Software engineering. --- Coding theory. --- Computer science. --- Data mining. --- Artificial intelligence. --- Cryptology. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Informatics --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data encryption (Computer science) --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Information theory. --- Computers and civilization. --- Civilization and computers --- Civilization --- Communication theory --- Communication --- Cybernetics


Book
Advances in Cryptology – EUROCRYPT 2019 : 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II
Authors: ---
ISBN: 3030176568 303017655X Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Keywords

Data encryption (Computer science). --- Software engineering. --- Coding theory. --- Computer science. --- Data mining. --- Artificial intelligence. --- Cryptology. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Informatics --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data encryption (Computer science) --- Information theory. --- Computers and civilization. --- Civilization and computers --- Civilization --- Communication theory --- Communication --- Cybernetics


Book
The Design of Rijndael : The Advanced Encryption Standard (AES)
Authors: ---
ISBN: 3662607697 3662607689 Year: 2020 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology. The authors developed the Rijndael algorithm and in this book they explain the AES selection process and their motivation in the light of the earlier Data Encryption Standard. They explain their design philosophy and implementation and optimization aspects, and the strength of their approach against cryptanalysis. They support the text with the relevant mathematics, reference code, and test vectors. In this new edition the authors updated content throughout, added new chapters, and adapted their text to the new terminology in use since the first edition. This is a valuable reference for all professionals, researchers, and graduate students engaged with data encryption.


Multi
The Design of Rijndael : The Advanced Encryption Standard (AES)
Authors: ---
ISBN: 9783662607695 Year: 2020 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology. The authors developed the Rijndael algorithm and in this book they explain the AES selection process and their motivation in the light of the earlier Data Encryption Standard. They explain their design philosophy and implementation and optimization aspects, and the strength of their approach against cryptanalysis. They support the text with the relevant mathematics, reference code, and test vectors. In this new edition the authors updated content throughout, added new chapters, and adapted their text to the new terminology in use since the first edition. This is a valuable reference for all professionals, researchers, and graduate students engaged with data encryption.


Multi
Cryptanalysis and design of iterated block cipher : proefschrift...
Authors: ---
ISBN: 9056820877 Year: 1997 Publisher: Heverlee Katholieke Universiteit Leuven. Faculteit der Toegepaste Wetenschappen

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Advances in Cryptology – EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I
Authors: ---
ISBN: 3319783815 3319783807 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cryptography. .

Keywords

Computer science. --- Software engineering. --- Data encryption (Computer science). --- Coding theory. --- Data mining. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Civilization and computers --- Civilization --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer software engineering --- Engineering --- Informatics --- Science --- Cryptology. --- Artificial Intelligence. --- Data encryption (Computer science) --- Computer networks --- Security measures --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Advances in Cryptology – EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III
Authors: ---
ISBN: 3319783726 3319783718 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. .

Keywords

Computer science. --- Software engineering. --- Data encryption (Computer science). --- Coding theory. --- Data mining. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Civilization and computers --- Civilization --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer software engineering --- Engineering --- Informatics --- Science --- Cryptology. --- Artificial Intelligence. --- Data encryption (Computer science) --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Advances in Cryptology – EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II
Authors: ---
ISBN: 3319783750 3319783742 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. .

Keywords

Computer science. --- Software engineering. --- Data encryption (Computer science). --- Coding theory. --- Data mining. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Civilization and computers --- Civilization --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer software engineering --- Engineering --- Informatics --- Science --- Cryptology. --- Artificial Intelligence. --- Computers --- Access control --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Advances in Cryptology – EUROCRYPT 2019 : 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I
Authors: --- ---
ISBN: 3030176533 3030176525 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Keywords

Data encryption (Computer science). --- Coding theory. --- Software engineering. --- Computer science. --- Data mining. --- Artificial intelligence. --- Cryptology. --- Coding and Information Theory. --- Software Engineering/Programming and Operating Systems. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Informatics --- Science --- Computer software engineering --- Engineering --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data encryption (Computer science) --- Information theory. --- Computers and civilization. --- Civilization and computers --- Civilization --- Communication theory --- Communication --- Cybernetics

Listing 1 - 10 of 62 << page
of 7
>>
Sort by