Narrow your search

Library

ULiège (5)

KU Leuven (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

ULB (4)

VIVES (4)

EhB (2)

LUCA School of Arts (1)

More...

Resource type

book (5)


Language

English (5)


Year
From To Submit

2013 (1)

2012 (1)

2010 (2)

2008 (1)

Listing 1 - 5 of 5
Sort by

Book
Public key cryptography : applications and attacks
Author:
ISBN: 1283960524 111848231X 9781118482261 9781118317129 9781118482315 1118482263 Year: 2013 Publisher: Piscataway, NJ: Hoboken, N.J.: IEEE Press. Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur


Book
Black-box models of computation in cryptology
Author:
ISBN: 3834819891 9786613711410 3834819905 1280812583 Year: 2012 Publisher: Wiesbaden : Springer Spektrum,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms.   Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation: Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?


Book
An introduction to mathematical cryptography
Authors: --- ---
ISBN: 9780387779935 9780387779942 0387779930 9786611954215 1281954217 0387779949 Year: 2008 Publisher: New York (N.Y.): Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: * classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; * fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; * an in-depth treatment of important recent cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. This book is an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online.

Keywords

Computer science --- Cryptography --- Cryptographie --- Mathematics. --- Mathématiques --- Mathematics --- Coding theory. --- Cryptography --Mathematics. --- Coding theory --- Education --- Social Sciences --- Physical Sciences & Mathematics --- Algebra --- Book Studies & Arts --- Signs and symbols. --- Mathématiques --- EPUB-LIV-FT LIVMATHE LIVSTATI SPRINGER-B --- Representation, Symbolic --- Semeiotics --- Signs --- Symbolic representation --- Symbols --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Data structures (Computer science). --- Data encryption (Computer science). --- Algebra. --- Ordered algebraic structures. --- Information theory. --- Number theory. --- Number Theory. --- Coding and Information Theory. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Information and Communication, Circuits. --- Order, Lattices, Ordered Algebraic Structures. --- Abbreviations --- Omens --- Semiotics --- Sign language --- Symbolism --- Visual communication --- Signs and symbols --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Mathematical analysis --- Math --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Number study --- Numbers, Theory of --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Communication theory --- Communication --- Cybernetics --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Cryptography - Mathematics


Book
Understanding Cryptography : A Textbook for Students and Practitioners
Authors: ---
ISBN: 9783642041013 9783642041006 3642041000 3642041019 3642446493 9786613563170 1280385251 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Keywords

Computer Science. --- Data Structures, Cryptology and Information Theory. --- Circuits and Systems. --- Systems and Data Security. --- Computer science. --- Data protection. --- Data structures (Computer science). --- Systems engineering. --- Informatique --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Ingénierie des systèmes --- Cryptography. --- Cryptography --- Data encryption (Computer science) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Mathematics. --- Cryptography -- Mathematics. --- Data encryption (Computer science). --- Electronic books. -- local. --- Book Studies & Arts --- Computer Science --- Engineering & Applied Sciences --- Education --- Social Sciences --- Mathematics --- Computer programming. --- Computer security. --- Electrical engineering. --- Electronic circuits. --- Programming Techniques. --- Communications Engineering, Networks. --- Data structures (Computer scienc. --- Telecommunication. --- Data Structures and Information Theory. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Design and construction --- Protection --- Security measures --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Electric engineering --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Programming --- Data structures (Computer science)


Book
The LLL algorithm : survey and applications
Authors: ---
ISBN: 3642022944 9786612836398 1282836390 3642022952 Year: 2010 Publisher: Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applications. It includes many detailed motivations, explanations and examples.

Keywords

Cryptography -- Mathematics. --- Euclidean algorithm. --- Integer programming. --- Lattice theory. --- Cryptography --- Lattice theory --- Integer programming --- Euclidean algorithm --- Mathematics --- Engineering & Applied Sciences --- Physical Sciences & Mathematics --- Computer Science --- Mathematical Theory --- Algorithms. --- Mathematics. --- Algorithm of Euclid --- Continued division --- Division, Continued --- Euclid algorithm --- Euclidian algorithm --- Euclid's algorithm --- Lattices (Mathematics) --- Space lattice (Mathematics) --- Structural analysis (Mathematics) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Algorism --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Data Structures. --- Data Encryption. --- Mathematics of Computing. --- Data Structures, Cryptology and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Algebra --- Arithmetic --- Foundations --- Algorithms --- Number theory --- Programming (Mathematics) --- Algebra, Abstract --- Algebra, Boolean --- Group theory --- Set theory --- Topology --- Transformations (Mathematics) --- Crystallography, Mathematical --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Computer software. --- Cryptology. --- Data Structures and Information Theory. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Software, Computer --- Computer systems --- Computer science—Mathematics. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Artificial intelligence --- Cryptography. --- Information theory. --- Data Science. --- Data processing. --- Communication theory --- Communication --- Cybernetics --- Computer mathematics

Listing 1 - 5 of 5
Sort by