000 05337nam a22006495i 4500
001 978-3-662-49301-4
003 DE-He213
005 20240730201424.0
007 cr nn 008mamaa
008 160330s2016 gw | s |||| 0|eng d
020 _a9783662493014
_9978-3-662-49301-4
024 7 _a10.1007/978-3-662-49301-4
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 4 _aThe New Codebreakers
_h[electronic resource] :
_bEssays Dedicated to David Kahn on the Occasion of His 85th Birthday /
_cedited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater.
250 _a1st ed. 2016.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2016.
300 _aXIV, 551 p. 135 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v9100
505 0 _aHistory -- Mary of Guise's enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized BackDoor -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. .
520 _aThis Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The Codebreakers", written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology - past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols. .
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aElectronic data processing
_xManagement.
_9167095
650 0 _aAlgorithms.
_93390
650 0 _aApplication software.
_9167096
650 1 4 _aCryptology.
_931769
650 2 4 _aData and Information Security.
_931990
650 2 4 _aIT Operations.
_931703
650 2 4 _aAlgorithms.
_93390
650 2 4 _aComputer and Information Systems Applications.
_9167097
700 1 _aRyan, Peter Y. A.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9167098
700 1 _aNaccache, David.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9167099
700 1 _aQuisquater, Jean-Jacques.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9167100
710 2 _aSpringerLink (Online service)
_9167101
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783662493007
776 0 8 _iPrinted edition:
_z9783662493021
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v9100
_9167102
856 4 0 _uhttps://doi.org/10.1007/978-3-662-49301-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96521
_d96521