Narrow your search

Library

ULiège (4)

KU Leuven (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

ULB (3)

VIVES (3)

KBC (2)

VUB (2)

More...

Resource type

book (5)


Language

English (5)


Year
From To Submit

2022 (1)

2021 (2)

2012 (2)

Listing 1 - 5 of 5
Sort by

Book
Computational cryptography : algorithmic aspects of cryptology
Authors: ---
ISBN: 1108854206 1108848427 Year: 2021 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.


Book
Mathematics of public key cryptography
Author:
ISBN: 9781107013926 1107013925 9781139012843 9781139221146 1139221140 9781139224581 1139224581 9781139218061 1139218069 1139012843 1280393335 9781280393334 1107229715 1139222864 9786613571250 1139214977 Year: 2012 Publisher: Cambridge Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more"


Book
Fault analysis in cryptography
Authors: ---
ISBN: 3642436773 3642296556 9786613939678 3642296564 1283627221 9783642296567 Year: 2012 Publisher: Berlin ; Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.


Book
Smart card research and advanced applications : 19th International Conference, CARDIS 2020, Virtual Event, November 18-19, 2020, revised selected papers
Authors: ---
ISBN: 3030684873 3030684865 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.

Keywords

Data encryption (Computer science). --- Computer security. --- Special purpose computers. --- Application software. --- Computer communication systems. --- Cryptology. --- Systems and Data Security. --- Special Purpose and Application-Based Systems. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Special purpose computers --- Computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Distributed processing --- Protection --- Security measures --- Smart cards --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Criptografia --- Seguretat informàtica --- Targetes intel·ligents --- Targetes amb circuits integrats --- Targetes chip --- Sistemes de seguretat --- Microprocessadors --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Protecció de dades --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Xifratge (Informàtica) --- Pirates informàtics --- Escriptura secreta --- Escriptura --- Símbols

Listing 1 - 5 of 5
Sort by