Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991
Bart Preneel, Rene Govaerts, Joos Vandewalle
Springer Berlin Heidelberg, Oct 28, 1993 - Computers - 284 pages
This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).
What people are saying - Write a review
We haven't found any reviews in the usual places.
Trends in the Fight Against ComputerRelated Delinquency
Technical Approaches to Thwart Computer Fraud
Public Key Cryptography
12 other sections not shown
Other editions - View all
access control Advances in Cryptology algorithm ANSI applications attack authentication codes bits block cipher centre serveur certificate Chaum ciphertext communication Computer Security confidentiality connectionless conteneur CRHF criminal Criteria cryptographic hash functions cryptographic keys cryptographic techniques Cryptology digital signature scheme discrete logarithm electronic enciphered encipherment encryption entity authentication evaluation hash function hashcode identified identity IEEE implementation IMSI Information technology ISO/IEC Kerberos key distribution protocol key management keying material layer LNCS login mechanisms Message Authentication Message Authentication Code mobile modular modulus nodes one-way function Open Systems Open Systems Interconnection operations parties password plaintext prime private key problem Proc Proceedings programs protection public key cryptosystem Quisquater random requirements secret key security services Security techniques sends server smart card specific Springer-Verlag standards subscriber ticket TMSI unauthorized UNIX Vandewalle verifier zero-knowledge