The New Codebreakers

Essays Dedicated to David Kahn on the Occasion of His 85th Birthday

  • Peter Y. A. Ryan
  • David Naccache
  • Jean-Jacques Quisquater

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9100)

Also part of the Security and Cryptology book sub series (LNSC, volume 9100)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. History

    1. Front Matter
      Pages 1-1
    2. Valérie Nachef, Jacques Patarin, Armel Dubois-Nayt
      Pages 3-24
    3. Sophie de Lastours
      Pages 34-39
  3. Technology - Past, Present, Future

    1. Front Matter
      Pages 67-67
    2. Flavio D. Garcia, Bart Jacobs
      Pages 69-87
    3. Johannes A. Buchmann, Denis Butin, Florian Göpfert, Albrecht Petzoldt
      Pages 88-108
    4. Yvo Desmedt
      Pages 109-122
  4. Efficient Cryptographic Implementations

    1. Front Matter
      Pages 123-123
    2. Rone Kwei Lim, Linda Ruth Petzold, Çetin Kaya Koç
      Pages 125-133
    3. Rodrigo Portella do Canto, Roman Korkikian, David Naccache
      Pages 134-147
    4. Rémi Géraud, Diana Maimuţ, David Naccache
      Pages 148-158
  5. Treachery and Perfidy

    1. Front Matter
      Pages 159-159
    2. Antoine Amarilli, Marc Beunardeau, Rémi Géraud, David Naccache
      Pages 161-165
    3. Céline Chevalier, Damien Gaumont, David Naccache, Rodrigo Portella Do Canto
      Pages 166-173
  6. Information Security

    1. Front Matter
      Pages 175-175
    2. Markus Jakobsson, Hossein Siadati
      Pages 177-194
    3. Dieter Gollmann, Marina Krotofil
      Pages 195-204

About this book

Introduction

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and published in 1967.
This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology – past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols. 

Keywords

history of cryptology post-quantum cryptography public-key cryptography security applications theoretical cryptography cryptanalysis cyber security digital signatures efficient cryptographic implementations elliptic-curve cryptography fermat numbers hash function information security models and protocols quantum computing randomness recreational applications RSA security side-channel attacks

Editors and affiliations

  • Peter Y. A. Ryan
    • 1
  • David Naccache
    • 2
  • Jean-Jacques Quisquater
    • 3
  1. 1.Université du Luxembourg LuxembourgLuxembourg
  2. 2.Ecole normale supérieure ParisFrance
  3. 3.Université Catholique de Louvain Louvain-la-NeuveBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-49301-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-49300-7
  • Online ISBN 978-3-662-49301-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book