Narrow your search

Library

KU Leuven (58)

ULiège (49)

ULB (48)

Thomas More Mechelen (39)

Odisee (38)

Thomas More Kempen (38)

VIVES (38)

UCLL (36)

KBC (15)

UGent (10)

More...

Resource type

book (72)

digital (1)


Language

English (71)

French (1)


Year
From To Submit

2024 (5)

2023 (3)

2022 (2)

2021 (5)

2020 (2)

More...
Listing 1 - 10 of 72 << page
of 8
>>
Sort by

Book
Cryptographie Asymétrique : Primitives et Protocoles.
Author:
ISBN: 1789490960 9781789490961 Year: 2024 Publisher: London : ISTE Editions Ltd.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

La cryptographie asymétrique introduite par Diffie et Hellman en 1976 a été rapidement mise en oeuvre avec des constructions de chiffrement et de signature. Cela a conduit à un tout nouveau domaine de recherche, avec des définitions formelles et des modèles de sécurité. Depuis lors, des outils impressionnants ont été développés, avec des propriétés innovatrices, notamment en exploitant les couplages sur les courbes elliptiques.Cryptographie asymétrique présente le chiffrement à clé publique et la signature, puis les primitives de base de la cryptographie asymétrique. Il analyse ensuite la notion de sécurité prouvable, qui définit le fait d'être « sécurisé » pour un schéma cryptographique. En outre, une sélection de protocoles est proposée, avec notamment les preuves à divulgation nulle de connaissance, le calcul multi-parties et l'échange de clé. Après un rappel sur la cryptographie basée sur les couplages, cet ouvrage expose des schémas cryptographiques avancés pour la confidentialité et l'authentification, avec des propriétés supplémentaires, tels que des signatures anonymes et du chiffrement multi-receveurs. Enfin, il traite le sujet plus récent du calcul vérifiable.


Book
Public key cryptography : applications and attacks
Author:
ISBN: 1283960524 111848231X 9781118482261 9781118317129 9781118482315 1118482263 Year: 2013 Publisher: Piscataway, NJ: Hoboken, N.J.: IEEE Press. Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur


Book
IEEE Standard Specifications for Password-Based Public-Key Cryptographic Techniques
Author:
ISBN: 0738160172 0738160164 Year: 2008 Publisher: New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval. Keywords: authentication, key agreement, password, public-key cryptography.


Book
Report on post-quantum cryptography
Authors: --- --- --- --- --- et al.
Year: 2016 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In recent years, there has been a substantial amount of research on quantum computers machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. This Internal Report shares the National Institute of Standards and Technology (NIST) s current understanding about the status of quantum computing and post-quantum cryptography, and outlines NIST s initial plan to move forward in this space. The report also recognizes the challenge of moving to new cryptographic infrastructures and therefore emphasizes the need for agencies to focus on crypto agility.


Book
IEEE Std 1363a-2004 (Amendment to IEEE Std 1363-2000)
Author:
Year: 2004 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.


Book
Attribute-Based Encryption (ABE) : Foundations and Applications Within Blockchain and Cloud Environments
Author:
ISBN: 1119989361 1119989388 111998937X Year: 2024 Publisher: Hoboken, New Jersey : John Wiley & Sons, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
IEEE Std 1363a-2004 (Amendment to IEEE Std 1363-2000)
Author:
Year: 2004 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.


Book
Advances in elliptic curve cryptography
Authors: --- ---
ISBN: 1107127610 1280414928 9786610414925 0511170793 0511111614 051119630X 0511297955 0511546572 0511111282 Year: 2005 Publisher: Cambridge ; New York : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.


Book
Identity-based cryptography
Authors: ---
ISBN: 6612070609 1282070606 9786612070600 1441605525 6000012608 1607503891 9781607503897 9781441605528 9781597345903 1597345903 1586039474 9781586039479 Year: 2009 Publisher: Amsterdam Boston IOS Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Offers an overview of the state-of-the-art in identity-based cryptography.


Book
Public-key cryptography : American Mathematical Society, Short Course, January 13-14, 2003, Baltimore, Maryland
Authors: --- ---
ISBN: 0821892770 Year: 2005 Publisher: Providence, Rhode Island : American Mathematical Society,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 72 << page
of 8
>>
Sort by