Progress in Cryptology - INDOCRYPT 2008
Title | Progress in Cryptology - INDOCRYPT 2008 PDF eBook |
Author | Vincent Rijmen |
Publisher | Springer |
Pages | 449 |
Release | 2008-11-25 |
Genre | Computers |
ISBN | 3540897542 |
This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.
Progress in Cryptology - INDOCRYPT 2009
Title | Progress in Cryptology - INDOCRYPT 2009 PDF eBook |
Author | Bimal Roy |
Publisher | Springer Science & Business Media |
Pages | 456 |
Release | 2009-11-24 |
Genre | Computers |
ISBN | 3642106277 |
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.
Progress in Cryptology - INDOCRYPT 2013
Title | Progress in Cryptology - INDOCRYPT 2013 PDF eBook |
Author | Goutam Paul |
Publisher | Springer |
Pages | 334 |
Release | 2013-12-02 |
Genre | Computers |
ISBN | 3319035150 |
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography.
Progress in Cryptology – INDOCRYPT 2019
Title | Progress in Cryptology – INDOCRYPT 2019 PDF eBook |
Author | Feng Hao |
Publisher | Springer Nature |
Pages | 589 |
Release | 2019-12-09 |
Genre | Computers |
ISBN | 3030354237 |
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology in India, INDOCRYPT 2019, held in Hyderabad, India, in December 2019. The 28 revised full papers presented in this book were carefully reviewed and selected from 110 submissions (of which 20 were either rejected without being reviewed or withdrawn before the deadline). The focus of the conference includes works on signatures and filter permutators; symmetric key ciphers and hash functions; blockchain, secure computation and blind coupon mechanism; oblivious transfer, obfuscation and privacy amplification; Boolean functions, elliptic curves and lattices; algorithms, attacks and distribution; and efficiency, side-channel resistance and PUFs.
Cryptography Engineering
Title | Cryptography Engineering PDF eBook |
Author | Niels Ferguson |
Publisher | John Wiley & Sons |
Pages | 396 |
Release | 2011-02-02 |
Genre | Computers |
ISBN | 1118080912 |
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Progress in Cryptology - INDOCRYPT 2011
Title | Progress in Cryptology - INDOCRYPT 2011 PDF eBook |
Author | Daniel J. Bernstein |
Publisher | Springer Science & Business Media |
Pages | 412 |
Release | 2011-11-21 |
Genre | Computers |
ISBN | 3642255779 |
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.
The Block Cipher Companion
Title | The Block Cipher Companion PDF eBook |
Author | Lars R. Knudsen |
Publisher | Springer Science & Business Media |
Pages | 280 |
Release | 2011-10-25 |
Genre | Computers |
ISBN | 364217342X |
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms. In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods. The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.