Narrow your search

Library

UCLL (5)

UGent (4)

KU Leuven (2)

UAntwerpen (2)

UCLouvain (2)

ULB (2)

UNamur (2)

EhB (1)

IMEC (1)

LUCA School of Arts (1)

More...

Resource type

book (5)


Language

English (5)


Year
From To Submit

2018 (1)

2008 (1)

2006 (1)

2002 (1)

1996 (1)

Listing 1 - 5 of 5
Sort by

Book
Cryptography and Network Security : principles and practices
Author:
ISBN: 0132023229 Year: 2006 Publisher: Upper Saddle River, N.J. : Pearson Education,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Applied cryptography : protocols, algorithms, and source code in C.
Author:
ISBN: 0471117099 0471128457 9780471117094 Year: 1996 Publisher: New York (N.Y.) Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Programming --- cryptografie --- Computer security --- Cryptography --- Telecommunication --- Sécurité informatique --- Cryptographie --- Télécommunications --- Security measures --- Sécurité --- Mesures --- 621.391.7 --- 681.3*E --- -Cryptography --- 384.0 --- 653 --- AA / International- internationaal --- 004.056.55 --- coderen --- computernetwerken --- computerveiligheid --- encryptie --- software --- 005.82 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Secret systems of electrical communication --- Data --- Telecommunicatie: algemeenheden. --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes. --- data-encryptie --- Computer security. --- Cryptography. --- Security measures. --- 681.3*E Data --- 621.391.7 Secret systems of electrical communication --- Cyber security --- Cybersecurity --- Sécurité informatique --- Télécommunications --- Sécurité --- Protection of computer systems --- Protection --- Telecommunicatie: algemeenheden --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes --- Telecommunication - Security measures --- Telecommunication. Security measures


Book
Cryptographic engineering.
Author:
ISBN: 9780387718170 9780387718163 Year: 2008 Publisher: New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. The material includes four important features: ASIC and FPGA hardware design for cryptography, Principles and practice of true random number generators, Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and Side-channel attacks on cryptographic systems and countermeasure designs. Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.


Book
The handbook of privacy studies : an interdisciplinary introduction
Authors: ---
ISBN: 9462988099 9789462988095 9048540135 9789048540136 Year: 2018 Publisher: Amsterdam : Amsterdam University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and explains how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes and debates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues.

The design of Rijndael : AES -the Advanced Encryption Standard.
Authors: ---
ISBN: 3540425802 3642076467 3662047225 9783540425809 Year: 2002 Publisher: Berlin ; Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference. (flaptekst)

Keywords

Mathematical control systems --- Programming --- Computer science --- Computer security --- Data encryption (Computer science) --- Passwords --- 681.3*E3 --- 681.3*C2 --- 681.3*D46 --- 681.3*K65 --- AES --- Computerbeveiliging --- Data encryptie --- Rijndael --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Passwords. --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption (Computer science). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 681.3 *C2 --- Computer security. --- Computer communication systems. --- Algorithms. --- Systems and Data Security. --- Cryptology. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Computer security - Passwords

Listing 1 - 5 of 5
Sort by