Computer Security and Industrial Cryptography

State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991

  • Editors
  • Bart Preneel
  • René Govaerts
  • Joos Vandewalle
Conference proceedings

Part of the Lecture Notes in Computer Science book series (LNCS, volume 741)

Table of contents

  1. Front Matter
  2. Joos Vandewalle, René Govaerts, Bart Preneel
    Pages 20-30
  3. Marijke De Soete
    Pages 31-49
  4. Dominique de Waleffe, Jean-Jacques Quisquater
    Pages 50-70
  5. Johan van Tilburg
    Pages 71-86
  6. Bart Preneel, René Govaerts, Joos Vandewalle
    Pages 87-131
  7. Walter Fumy
    Pages 132-147
  8. D. W. Roberts
    Pages 149-161
  9. Bart Preneel
    Pages 162-173
  10. Jan Verschuren, René Govaerts, Joos Vandewalle
    Pages 179-192
  11. Klaus Vedder
    Pages 193-210
  12. Walter Fumy
    Pages 211-226
  13. Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Pages 227-234
  14. Gordon Lennox
    Pages 235-243
  15. Marc Geoffroy, Ronny Bjones, Hedwig Cnudde
    Pages 244-256
  16. Bart De Decker
    Pages 257-274
  17. Back Matter

About these proceedings


This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).


Computer Security Computersicherheit Cryptographic Techniques Datensicherheit Kryptographische Techniken Public Key Crypto Systems Public-Key Kryptosysteme computer cryptography data Security data encryption

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1993
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-57341-8
  • Online ISBN 978-3-540-48074-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site