State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised LecturesBart Preneel, Vincent Rijmen The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing. |
Contents
Trends in the Fight Against ComputerRelated Delinquency | 1 |
Block Ciphers A Survey | 18 |
Cryptographic Primitives for Information Authentication State of the Art | 49 |
Recent Developments in the Design of Conventional Cryptographic Algorithms | 105 |
Elliptic Curve PublicKey Cryptosystems An Introduction | 131 |
Key Management Techniques | 142 |
Security of Computer Networks | 163 |
Internet Security Protocols | 186 |
Dynamic Key Handling | 264 |
On Solutions to the Key Escrow Problem | 277 |
Smart Cards Requirements Properties and Applications | 307 |
Smart Card Security | 332 |
Security Aspects of the EcashTM Payment System | 338 |
International Standardisation of IT Security | 353 |
Security Management The Process | 366 |
Introduction to Computer Security | 377 |
Securing Internet Electronic Mail | 209 |
Security Services and the SIM | 224 |
TTPs Overview Concepts and Review of the State of Art from a Technical Point of View | 241 |
Other editions - View all
State of the Art in Applied Cryptography: Course on Computer Security and ... Bart Preneel,Vincent Rijmen No preview available - 2014 |
State of the Art in Applied Cryptography: Course on Computer Security and ... Bart Preneel,Vincent Rijmen No preview available - 1998 |
Common terms and phrases
Advances in Cryptology algorithm application bits block cipher byte certificate chip chosen plaintexts ciphertext coins collision resistant communication computer system confidentiality criminal Crypto cryptographic algorithms cryptographic hash functions cryptographic techniques cryptosystems decryption differential attack differential cryptanalysis Diffie-Hellman digital signature domain ecash electronic elliptic curve enciphered encipherment example Fast Software Encryption hardware hash functions hash result HMAC implementation input integrity Interception Agency International Internet ISO/IEC iterated key agreement key escrow key establishment key management key pair keying material layer linear LNCS MAC algorithm mechanism memory message authentication one-way operating system organisation output preimage Preneel private key problem processor protection public key random Rijmen round keys S-boxes secret key security services sender session key signature scheme smart card specific Springer Springer-Verlag Standard standardisation stream ciphers subscriber symmetric Telecommunications Verlag weak keys