The New Codebreakers (Record no. 58276)

000 -LEADER
fixed length control field 04909nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-3-662-49301-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112236.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160330s2016 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783662493014
-- 978-3-662-49301-4
082 04 - CLASSIFICATION NUMBER
Call Number 005.82
245 14 - TITLE STATEMENT
Title The New Codebreakers
Sub Title Essays Dedicated to David Kahn on the Occasion of His 85th Birthday /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIV, 551 p. 135 illus.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 History -- Mary of Guise's enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. .
520 ## - SUMMARY, ETC.
Summary, etc This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The Codebreakers", written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology - past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols. .
700 1# - AUTHOR 2
Author 2 Ryan, Peter Y. A.
700 1# - AUTHOR 2
Author 2 Naccache, David.
700 1# - AUTHOR 2
Author 2 Quisquater, Jean-Jacques.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-662-49301-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Algorithms.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Management information systems.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Management of Computing and Information Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems Applications (incl. Internet).
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-LNC

No items available.