+612 9045 4394
 
CHECKOUT
State of the Art in Applied Cryptography : Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures - Bart Preneel

State of the Art in Applied Cryptography

Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures

By: Bart Preneel (Editor), Vincent Rijmen (Editor)

Paperback

Published: 18th December 1998
Ships: 5 to 9 business days
5 to 9 business days
$147.02
or 4 easy payments of $36.76 with Learn more

The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto, and Asiacrypt) shows that interest in the eld is increasing

Trends in the Fight Against Computer-Related Delinquencyp. 1
Block Ciphers - A Surveyp. 18
Cryptographic Primitives for Information Authentication - State of the Artp. 49
Recent Developments in the Design of Conventional Cryptographic Algorithmsp. 105
Elliptic Curve Public-Key Cryptosystems - An Introductionp. 131
Key Management Techniquesp. 142
Security of Computer Networksp. 163
Internet Security Protocolsp. 186
Securing Internet Electronic Mailp. 209
GSM: Security, Services, and the SIMp. 224
TTPs Overview - Concepts and Review of the State of the Art from a Technical Point of Viewp. 241
Management of Secret Keys: Dynamic Key Handlingp. 264
On Solutions to the Key Escrow Problemp. 277
Smart Cards - Requirements, Properties, and Applicationsp. 307
Smart Card Securityp. 332
Security Aspects of the Ecash Payment Systemp. 338
International Standardisation of IT Securityp. 353
Security Management - The Processp. 366
Introduction to Computer Securityp. 377
Author Indexp. 395
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540654742
ISBN-10: 3540654747
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 400
Published: 18th December 1998
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.75 x 15.6  x 2.26
Weight (kg): 0.57