State of the Art in Applied Cryptography Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures /

The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial eve...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Preneel, Bart (Editor, http://id.loc.gov/vocabulary/relators/edt), Rijmen, Vincent (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1998.
Edition:1st ed. 1998.
Series:Lecture Notes in Computer Science, 1528
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 05216nam a2200637 4500
001 978-3-540-49248-1
003 DE-He213
005 20191023222949.0
007 cr nn 008mamaa
008 121227s1998 gw | s |||| 0|eng d
020 |a 9783540492481  |9 978-3-540-49248-1 
024 7 |a 10.1007/3-540-49248-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a State of the Art in Applied Cryptography  |h [electronic resource] :  |b Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures /  |c edited by Bart Preneel, Vincent Rijmen. 
250 |a 1st ed. 1998. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 1998. 
300 |a VIII, 400 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1528 
505 0 |a Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers -A Survey -- Cryptographic Primitives for Information Authentication - State of the Art -- Recent Developments in the Design of Conventional Cryptographic Algorithms -- Elliptic Curve Public-Key Cryptosystems - An Introduction -- Key Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet Electronic Mail -- GSM: Security, Services, and the SIM -- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View -- Management of Secret Keys: Dynamic Key Handling -- On Solutions to the Key Escrow Problem -- Smart Cards - Requirements, Properties, and Applications -- Smart Card Security 'How Can We Be So Sure?' -- Security Aspects of the Ecash™ Payment System -- International Standardisation of IT Security -- Security Management - The Process -- to Computer Security. 
520 |a The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Operating systems (Computers). 
650 0 |a Computer communication systems. 
650 0 |a Information technology. 
650 0 |a Business-Data processing. 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a IT in Business.  |0 http://scigraph.springernature.com/things/product-market-codes/522000 
700 1 |a Preneel, Bart.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Rijmen, Vincent.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662210581 
776 0 8 |i Printed edition:  |z 9783540654742 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1528 
856 4 0 |u https://doi.org/10.1007/3-540-49248-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)