Narrow your search

Library

KU Leuven (59)

ULiège (49)

ULB (46)

Thomas More Mechelen (37)

Odisee (36)

Thomas More Kempen (36)

UCLL (36)

VIVES (36)

UGent (16)

KBC (13)

More...

Resource type

book (72)

periodical (1)


Language

English (73)


Year
From To Submit

2024 (2)

2023 (2)

2022 (2)

2021 (5)

2020 (2)

More...
Listing 1 - 10 of 73 << page
of 8
>>
Sort by

Book
Public key cryptography : applications and attacks
Author:
ISBN: 1283960524 111848231X 9781118482261 9781118317129 9781118482315 1118482263 Year: 2013 Publisher: Hoboken, New Jersey : Piscataway, NJ : John Wiley & Sons, IEEE Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur


Book
IEEE Standard Specifications for Password-Based Public-Key Cryptographic Techniques
Author:
ISBN: 0738160172 0738160164 Year: 2008 Publisher: New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval. Keywords: authentication, key agreement, password, public-key cryptography.


Book
Report on post-quantum cryptography
Authors: --- --- --- --- --- et al.
Year: 2016 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In recent years, there has been a substantial amount of research on quantum computers machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. This Internal Report shares the National Institute of Standards and Technology (NIST) s current understanding about the status of quantum computing and post-quantum cryptography, and outlines NIST s initial plan to move forward in this space. The report also recognizes the challenge of moving to new cryptographic infrastructures and therefore emphasizes the need for agencies to focus on crypto agility.


Book
IEEE Std 1363a-2004 (Amendment to IEEE Std 1363-2000)
Author:
Year: 2004 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.


Book
Advances in elliptic curve cryptography
Authors: --- ---
ISBN: 1107127610 1280414928 9786610414925 0511170793 0511111614 051119630X 0511297955 0511546572 0511111282 Year: 2004 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.


Book
Report on post-quantum cryptography
Authors: --- --- --- --- --- et al.
Year: 2016 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In recent years, there has been a substantial amount of research on quantum computers machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. This Internal Report shares the National Institute of Standards and Technology (NIST) s current understanding about the status of quantum computing and post-quantum cryptography, and outlines NIST s initial plan to move forward in this space. The report also recognizes the challenge of moving to new cryptographic infrastructures and therefore emphasizes the need for agencies to focus on crypto agility.


Book
Public-key cryptography and computational number theory : proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000
Authors: --- --- ---
ISBN: 3110881039 Year: 2001 Publisher: Berlin ; New York : Walter de Gruyter,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Proceedings contain twenty selected, refereed contributions arising from the International Conference on Public-Key Cryptography and Computational Number Theory held in Warsaw, Poland, on September 11-15, 2000. The conference, attended by eightyfive mathematicians from eleven countries, was organized by the Stefan Banach International Mathematical Center. This volume contains articles from leading experts in the world on cryptography and computational number theory, providing an account of the state of research in a wide variety of topics related to the conference theme. It is dedicated to the memory of the Polish mathematicians Marian Rejewski (1905-1980), Jerzy Róøycki (1909-1942) and Henryk Zygalski (1907-1978), who deciphered the military version of the famous Enigma in December 1932 - January 1933. A noteworthy feature of the volume is a foreword written by Andrew Odlyzko on the progress in cryptography from Enigma time until now.


Book
IEEE Std 1363a-2004 (Amendment to IEEE Std 1363-2000)
Author:
Year: 2004 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.


Book
Attribute-Based Encryption (ABE) : Foundations and Applications Within Blockchain and Cloud Environments
Author:
ISBN: 1119989361 1119989388 111998937X Year: 2024 Publisher: Hoboken, New Jersey : John Wiley & Sons, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Identity-based cryptography
Authors: ---
ISBN: 6612070609 1282070606 9786612070600 1441605525 6000012608 1607503891 9781607503897 9781441605528 9781597345903 1597345903 1586039474 9781586039479 Year: 2009 Publisher: Amsterdam ; Boston : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Offers an overview of the state-of-the-art in identity-based cryptography.

Listing 1 - 10 of 73 << page
of 8
>>
Sort by