The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday /

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and publish...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Ryan, Peter Y. A. (Επιμελητής έκδοσης), Naccache, David (Επιμελητής έκδοσης), Quisquater, Jean-Jacques (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016.
Σειρά:Lecture Notes in Computer Science, 9100
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • History
  • Mary of Guise’s enciphered letters
  • About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945)
  • Myths and legends
  • The One-Time Pad and the Index of Coincidence
  • Technology - Past, Present, Future
  • The Fall of a Tiny Star
  • Post-Quantum Cryptography: State of the Art
  • What is the future of cryptography?
  • Efficient Cryptographic Implementations
  • Bitsliced High-Performance AES-ECB on GPUs
  • Buying AES Design Resistance with Speed and Energy
  • Double-Speed Barrett Moduli
  • Treachery and Perfidy
  • Failure is Also an Option
  • How to (Carefully) Breach a Service Contract?
  • Information Security
  • SpoofKiller: You can teach people how to pay, but not how to pay attention
  • Cyber-Physical Systems Security
  • Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud
  • Cryptanalysis
  • Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack
  • Dual EC: A Standardized Back Door
  • An Improved Differential Attack on Full GOST
  • Cryptographic Hash Functions and Expander Graphs: The End of the Story?
  • Side-Channel Attacks
  • Polynomial Evaluation and Side Channel Analysis
  • Photonic Power Firewalls
  • A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard
  • Improving the Big Mac attack on Elliptic Curve Cryptography
  • Randomness
  • Randomness testing: result interpretation and speed
  • A fully-digital Chaos-based Random Bit Generator
  • Embedded System Security
  • Secure Application Execution in Mobile Devices
  • Hardware-enforced Protection against Buffer Overflow using Masked Program Counter
  • Public-Key Cryptography
  • Hierarchical Identities from Group Signatures and Pseudonymous Signatures
  • Secure ElGamal-type Cryptosystems Without Message Encoding
  • Safe-Errors on SPA Protected implementations with the Atomicity Technique
  • Models and Protocols
  • Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security
  • Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol
  • Crypto Santa. .