Cryptography and Security: From Theory to Applications

Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

Editors:

ISBN: 978-3-642-28367-3 (Print) 978-3-642-28368-0 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Personal Tributes and Re-visits of Jean-Jacques’s Legacy

    1. No Access

      Book Chapter

      Pages 1-2

      The Hidden Side of Jean-Jacques Quisquater

    2. No Access

      Book Chapter

      Pages 3-7

      On Quisquater’s Multiplication Algorithm

    3. No Access

      Book Chapter

      Pages 8-12

      A Brief Survey of Research Jointly with Jean-Jacques Quisquater

    4. No Access

      Book Chapter

      Pages 13-24

      DES Collisions Revisited

    5. No Access

      Book Chapter

      Pages 25-34

      Line Directed Hypergraphs

  3. Symmetric Cryptography

    1. No Access

      Book Chapter

      Pages 35-54

      Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq

    2. No Access

      Book Chapter

      Pages 55-66

      Self-similarity Attacks on Block Ciphers and Application to KeeLoq

    3. No Access

      Book Chapter

      Pages 67-82

      Increasing Block Sizes Using Feistel Networks: The Example of the AES

    4. No Access

      Book Chapter

      Pages 83-107

      Authenticated-Encryption with Padding: A Formal Security Treatment

  4. Asymmetric Cryptography

    1. No Access

      Book Chapter

      Pages 108-131

      Traceable Signature with Stepping Capabilities

    2. No Access

      Book Chapter

      Pages 132-142

      Deniable RSA Signature

    3. No Access

      Book Chapter

      Pages 143-155

      Autotomic Signatures

    4. No Access

      Book Chapter

      Pages 156-184

      Fully Forward-Secure Group Signatures

    5. No Access

      Book Chapter

      Pages 185-206

      Public Key Encryption for the Forgetful

    6. No Access

      Book Chapter

      Pages 207-232

      Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping

  5. Side Channel Attacks

    1. No Access

      Book Chapter

      Pages 233-247

      Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems

    2. No Access

      Book Chapter

      Pages 248-264

      EM Probes Characterisation for Security Analysis

    3. No Access

      Book Chapter

      Pages 265-282

      An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost

    4. No Access

      Book Chapter

      Pages 283-299

      Masking with Randomized Look Up Tables

  6. Hardware and Implementations

    1. No Access

      Book Chapter

      Pages 300-318

      Efficient Implementation of True Random Number Generator Based on SRAM PUFs

previous Page of 2