State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures

Front Cover
Bart Preneel, Vincent Rijmen
Springer Science & Business Media, Dec 18, 1998 - Computers - 400 pages
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing.
 

Contents

Trends in the Fight Against ComputerRelated Delinquency
1
Block Ciphers A Survey
18
Cryptographic Primitives for Information Authentication State of the Art
49
Recent Developments in the Design of Conventional Cryptographic Algorithms
105
Elliptic Curve PublicKey Cryptosystems An Introduction
131
Key Management Techniques
142
Security of Computer Networks
163
Internet Security Protocols
186
Dynamic Key Handling
264
On Solutions to the Key Escrow Problem
277
Smart Cards Requirements Properties and Applications
307
Smart Card Security
332
Security Aspects of the EcashTM Payment System
338
International Standardisation of IT Security
353
Security Management The Process
366
Introduction to Computer Security
377

Securing Internet Electronic Mail
209
Security Services and the SIM
224
TTPs Overview Concepts and Review of the State of Art from a Technical Point of View
241

Other editions - View all

Common terms and phrases

Bibliographic information