Narrow your search

Library

KBR (1)

KU Leuven (1)

ULB (1)

ULiège (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

1998 (1)

Listing 1 - 1 of 1
Sort by
State of the art in applied cryptography
Authors: ---
ISBN: 3540654747 3540492488 Year: 1998 Volume: 1528 Publisher: Berlin Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing.

Keywords

Chiffrement --- Codes secrets --- Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Informatique--Sécurité --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Sécurité informatique --- Écriture cryptographique --- Écriture secrète --- Computer security. --- Cryptography. --- Computer Science --- Engineering & Applied Sciences --- Academic collection --- 681.3*E3 --- 681.3*D46 --- 681.3*F21 --- 681.3*C2 --- 681.3*J1 --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- Computer communication networks: data communications; OSI; security and protection --- Administrative data processing (Computer applications) --- Security measures --- 681.3*J1 Administrative data processing (Computer applications) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*F21 Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cyber security --- Cybersecurity --- Sécurité informatique --- Protection of computer systems --- Protection --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Operating Systems. --- Computer Communication Networks. --- IT in Business. --- Data processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- 681.3 *C2 --- Information Systems. --- Cryptology. --- Business—Data processing.

Listing 1 - 1 of 1
Sort by