Narrow your search

Library

ULB (6)

UCLL (4)

UGent (4)

KBR (3)

KU Leuven (3)

UAntwerpen (2)

UCLouvain (2)

UNamur (2)

EhB (1)

IMEC (1)

More...

Resource type

book (8)


Language

English (7)

French (1)


Year
From To Submit

2008 (1)

2006 (1)

2003 (1)

2002 (1)

1997 (2)

More...
Listing 1 - 8 of 8
Sort by

Book
Cryptography and Network Security : principles and practices
Author:
ISBN: 0132023229 Year: 2006 Publisher: Upper Saddle River, N.J. : Pearson Education,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Writing Secure Code : Practical strategies and techniques for secure application coding in a networked world
Authors: ---
ISBN: 9780735617223 0735617228 Year: 2003 Publisher: Redmond Microsoft Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.


Book
Cryptographic engineering.
Author:
ISBN: 9780387718170 9780387718163 Year: 2008 Publisher: New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. The material includes four important features: ASIC and FPGA hardware design for cryptography, Principles and practice of true random number generators, Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and Side-channel attacks on cryptographic systems and countermeasure designs. Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.

Applied cryptography : protocols, algorithms, and source code in C.
Author:
ISBN: 0471117099 0471128457 9780471117094 Year: 1996 Publisher: New York (N.Y.) Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Programming --- cryptografie --- Computer security --- Cryptography --- Telecommunication --- Sécurité informatique --- Cryptographie --- Télécommunications --- Security measures --- Sécurité --- Mesures --- 621.391.7 --- 681.3*E --- -Cryptography --- 384.0 --- 653 --- AA / International- internationaal --- 004.056.55 --- coderen --- computernetwerken --- computerveiligheid --- encryptie --- software --- 005.82 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Secret systems of electrical communication --- Data --- Telecommunicatie: algemeenheden. --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes. --- data-encryptie --- Computer security. --- Cryptography. --- Security measures. --- 681.3*E Data --- 621.391.7 Secret systems of electrical communication --- Cyber security --- Cybersecurity --- Sécurité informatique --- Télécommunications --- Sécurité --- Protection of computer systems --- Protection --- Telecommunicatie: algemeenheden --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes --- Telecommunication - Security measures --- Telecommunication. Security measures

The design of Rijndael : AES -the Advanced Encryption Standard.
Authors: ---
ISBN: 3540425802 3642076467 3662047225 9783540425809 Year: 2002 Publisher: Berlin ; Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference. (flaptekst)

Keywords

Mathematical control systems --- Programming --- Computer science --- Computer security --- Data encryption (Computer science) --- Passwords --- 681.3*E3 --- 681.3*C2 --- 681.3*D46 --- 681.3*K65 --- AES --- Computerbeveiliging --- Data encryptie --- Rijndael --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Passwords. --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption (Computer science). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 681.3 *C2 --- Computer security. --- Computer communication systems. --- Algorithms. --- Systems and Data Security. --- Cryptology. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Computer security - Passwords

Listing 1 - 8 of 8
Sort by