Listing 1 - 5 of 5 |
Sort by
|
Choose an application
The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.
Cryptography. --- Criptografia --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Escriptura secreta --- Escriptura --- Símbols --- Xifratge (Informàtica)
Choose an application
Xifratge (Informàtica) --- Criptografia --- Escriptura --- Símbols --- Escriptura secreta --- Protecció de dades --- Seguretat informàtica --- Signatures electròniques --- Generadors de nombres aleatoris --- Nombres primers --- Criptografia (Informàtica) --- Criptografia (Matemàtica) --- Criptologia --- Encriptació (Informàtica) --- Encriptació de dades (Informàtica) --- Esteganografia --- Llenguatges xifrats --- Xifratge de dades (Informàtica) --- Cryptography. --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers
Choose an application
"Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more"
Coding theory --- Cryptography --- Codage --- Cryptographie --- Mathematics --- Mathématiques --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Mathématiques --- Mathematics. --- Coding theory. --- Codificació, Teoria de la. --- Criptografia --- Matemàtica. --- Escriptura secreta --- Escriptura xifrada --- Esteganografia --- Escriptura --- Simbolisme --- Símbols --- Xifratge (Informàtica) --- Xifres i claus --- Teoria de la codificació --- Dades --- Electrònica digital --- Informació, Teoria de la --- Màquines, Teoria de --- Senyal, Teoria del (Telecomunicació) --- Programació (Ordinadors) --- Compressió (Informàtica) --- Compressió (Telecomunicació) --- Teoria de la informació --- Compressió de dades (Telecomunicació) --- Compressió de dades (Informàtica)
Choose an application
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
Computer engineering. --- Computer science. --- Computers -- Access control. --- Data encryption (Computer science). --- Engineering & Applied Sciences --- Computer Science --- Data protection. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer hardware. --- Data structures (Computer science). --- Electrical engineering. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Computer Hardware. --- Electrical Engineering. --- Electronic data processing --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Computers --- Design and construction --- Electric engineering --- Engineering --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Criptografia. --- Avaries --- Localització. --- Errors de sistemes (Enginyeria) --- Enginyeria de sistemes --- Fiabilitat (Enginyeria) --- Escriptura secreta --- Escriptura xifrada --- Escriptura --- Simbolisme --- Símbols --- Xifratge (Informàtica) --- Xifres i claus --- Esteganografia
Choose an application
This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.
Data encryption (Computer science). --- Computer security. --- Special purpose computers. --- Application software. --- Computer communication systems. --- Cryptology. --- Systems and Data Security. --- Special Purpose and Application-Based Systems. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Special purpose computers --- Computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Distributed processing --- Protection --- Security measures --- Smart cards --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Criptografia --- Seguretat informàtica --- Targetes intel·ligents --- Targetes amb circuits integrats --- Targetes chip --- Sistemes de seguretat --- Microprocessadors --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Protecció de dades --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Xifratge (Informàtica) --- Pirates informàtics --- Escriptura secreta --- Escriptura --- Símbols
Listing 1 - 5 of 5 |
Sort by
|