×

The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. (English) Zbl 1334.94030

Lecture Notes in Computer Science 9100. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). xiv, 551 p. (2016).

Show indexed articles as search result.

The articles of this volume will be reviewed individually.
Indexed articles:
Nachef, Valérie; Patarin, Jacques; Dubois-Nayt, Armel, Mary of Guise’s enciphered letters, 3-24 [Zbl 1395.94004]
Laurent, Sébastien-Yves, About professionalisation in the intelligence community: the French cryptologists (ca 1870–ca 1945), 25-33 [Zbl 1405.94006]
de Lastours, Sophie, Myths and legends of the history of cryptology, 34-39 [Zbl 1405.94007]
Bellovin, Steven M., Vernam, Mauborgne, and Friedman: the one-time pad and the index of coincidence, 40-66 [Zbl 1405.94004]
Garcia, Flavio D.; Jacobs, Bart, The fall of a tiny star, 69-87 [Zbl 1405.94005]
Buchmann, Johannes A.; Butin, Denis; Göpfert, Florian; Petzoldt, Albrecht, Post-quantum cryptography: state of the art, 88-108 [Zbl 1405.94002]
Desmedt, Yvo, What is the future of cryptography?, 109-122 [Zbl 1405.94003]
Lim, Rone Kwei; Petzold, Linda Ruth; Koç, Çetin Kaya, Bitsliced high-performance AES-ECB on GPUs, 125-133 [Zbl 1405.94073]
do Canto, Rodrigo Portella; Korkikian, Roman; Naccache, David, Buying AES design resistance with speed and energy, 134-147 [Zbl 1405.94098]
Géraud, Rémi; Maimuţ, Diana; Naccache, David, Double-speed Barrett moduli, 148-158 [Zbl 1405.94065]
Amarilli, Antoine; Beunardeau, Marc; Géraud, Rémi; Naccache, David, Failure is also an option, 161-165 [Zbl 1405.94040]
Chevalier, Céline; Gaumont, Damien; Naccache, David; Do Canto, Rodrigo Portella, How to (carefully) breach a service contract?, 166-173 [Zbl 1405.94052]
Jakobsson, Markus; Siadati, Hossein, SpoofKiller: You can teach people how to pay, but not how to pay attention, 177-194 [Zbl 1405.94069]
Gollmann, Dieter; Krotofil, Marina, Cyber-physical systems security, 195-204 [Zbl 1405.94066]
De Capitani di Vimercati, Sabrina; Foresti, Sara; Livraga, Giovanni; Samarati, Pierangela, Practical techniques building on encryption for protecting and managing data in the cloud, 205-239 [Zbl 1405.94058]
Young, Adam; Yung, Moti, Cryptography as an attack technology: proving the RSA/factoring kleptographic attack, 243-255 [Zbl 1405.94092]
Bernstein, Daniel J.; Lange, Tanja; Niederhagen, Ruben, Dual EC: a standardized back door, 256-281 [Zbl 1405.94044]
Courtois, Nicolas T., An improved differential attack on full GOST, 282-303 [Zbl 1405.94054]
Petit, Christophe; Quisquater, Jean-Jacques, Cryptographic hash functions and expander graphs: the end of the story?, 304-311 [Zbl 1405.94081]
Carlet, Claude; Prouff, Emmanuel, Polynomial evaluation and side channel analysis, 315-341 [Zbl 1405.94050]
Dutertre, Jean-Max; Mirbaha, Amir-Pasha; Naccache, David; Tria, Assia, Photonic power firewalls, 342-354 [Zbl 1405.94061]
Clavier, Christophe; Rebaine, Djamal, A heuristic approach to assist side channel analysis of the data encryption standard, 355-373 [Zbl 1405.94053]
Danger, Jean-Luc; Guilley, Sylvain; Hoogvorst, Philippe; Murdica, Cédric; Naccache, David, Improving the Big Mac attack on elliptic curve cryptography, 374-386 [Zbl 1405.94056]
Sýs, Marek; Matyáš, Vashek, Randomness testing: result interpretation and speed, 389-395 [Zbl 1405.94087]
Bucci, Marco; Luzzi, Raimondo, A fully-digital chaos-based random bit generator, 396-414 [Zbl 1405.94047]
Msgna, Mehari G.; Ferradi, Houda; Akram, Raja Naeem; Markantonakis, Konstantinos, Secure application execution in mobile devices, 417-438 [Zbl 1405.94078]
Danger, Jean-Luc; Guilley, Sylvain; Porteboeuf, Thibault; Praden, Florian; Timbert, Michaël, Hardware-enforced protection against buffer overflow using masked program counter, 439-454 [Zbl 1405.94057]
Bringer, Julien; Chabanne, Hervé; Lescuyer, Roch; Patey, Alain, Hierarchical identities from group signatures and pseudonymous signatures, 457-469 [Zbl 1405.94046]
Joye, Marc, Secure ElGamal-type cryptosystems without message encoding, 470-478 [Zbl 1405.94071]
Fouque, Pierre-Alain; Guilley, Sylvain; Murdica, Cédric; Naccache, David, Safe-errors on SPA protected implementations with the atomicity technique, 479-493 [Zbl 1405.94062]
Vaudenay, Serge, Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security, 497-517 [Zbl 1405.94089]
Coron, Jean-Sébastien, Security analysis of the modular enhanced symmetric role authentication (mERA) protocol, 518-542 [Zbl 1405.94101]
Ryan, Peter Y. A., Crypto Santa, 543-549 [Zbl 1405.94086]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B30 Festschriften

Biographic References:

Kahn, David
PDFBibTeX XMLCite
Full Text: DOI