Skip to main content
  • Book
  • © 1998

State of the Art in Applied Cryptography

Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1528)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 chapters)

  1. Front Matter

    Pages I-VIII
  2. Block Ciphers —A Survey

    • Lars R. Knudsen
    Pages 18-48
  3. Recent Developments in the Design of Conventional Cryptographic Algorithms

    • Bart Preneel, Vincent Rijmen, Antoon Bosselaers
    Pages 105-130
  4. Key Management Techniques

    • Walter Fumy
    Pages 142-162
  5. Security of Computer Networks

    • Jan Verschuren
    Pages 163-185
  6. Internet Security Protocols

    • Walter Fumy
    Pages 186-208
  7. Securing Internet Electronic Mail

    • Mark Vandenwauver, Frank Jorissen
    Pages 209-223
  8. GSM: Security, Services, and the SIM

    • Klaus Vedder
    Pages 224-240
  9. On Solutions to the Key Escrow Problem

    • Mark P. Hoyle, Chris J. Mitchell
    Pages 277-306
  10. Smart Cards — Requirements, Properties, and Applications

    • Klaus Vedder, Franz Weikmann
    Pages 307-331
  11. Security Aspects of the Ecashâ„¢ Payment System

    • Berry Schoenmakers
    Pages 338-352
  12. Security Management — The Process

    • David W. Roberts
    Pages 366-376
  13. Introduction to Computer Security

    • Bart De Decker
    Pages 377-393

About this book

The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing.

Editors and Affiliations

  • Katholieke Universiteit Leuven Dept. Elektrotechniek (EAST), Leuven, Belgium

    Bart Preneel

  • Graz, Austria

    Vincent Rijmen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access