Advertisement

The New Codebreakers

Essays Dedicated to David Kahn on the Occasion of His 85th Birthday

  • Peter Y. A. Ryan
  • David Naccache
  • Jean-Jacques Quisquater

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9100)

Also part of the Security and Cryptology book sub series (LNSC, volume 9100)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. History

    1. Front Matter
      Pages 1-1
    2. Valérie Nachef, Jacques Patarin, Armel Dubois-Nayt
      Pages 3-24
    3. Sophie de Lastours
      Pages 34-39
  3. Technology - Past, Present, Future

    1. Front Matter
      Pages 67-67
    2. Flavio D. Garcia, Bart Jacobs
      Pages 69-87
    3. Johannes A. Buchmann, Denis Butin, Florian Göpfert, Albrecht Petzoldt
      Pages 88-108
    4. Yvo Desmedt
      Pages 109-122
  4. Efficient Cryptographic Implementations

    1. Front Matter
      Pages 123-123
    2. Rone Kwei Lim, Linda Ruth Petzold, Çetin Kaya Koç
      Pages 125-133
    3. Rodrigo Portella do Canto, Roman Korkikian, David Naccache
      Pages 134-147
    4. Rémi Géraud, Diana Maimuţ, David Naccache
      Pages 148-158
  5. Treachery and Perfidy

    1. Front Matter
      Pages 159-159
    2. Antoine Amarilli, Marc Beunardeau, Rémi Géraud, David Naccache
      Pages 161-165
    3. Céline Chevalier, Damien Gaumont, David Naccache, Rodrigo Portella Do Canto
      Pages 166-173
  6. Information Security

    1. Front Matter
      Pages 175-175
    2. Markus Jakobsson, Hossein Siadati
      Pages 177-194
    3. Dieter Gollmann, Marina Krotofil
      Pages 195-204
    4. Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
      Pages 205-239
  7. Cryptanalysis

    1. Front Matter
      Pages 241-241
    2. Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen
      Pages 256-281
    3. Nicolas T. Courtois
      Pages 282-303
    4. Christophe Petit, Jean-Jacques Quisquater
      Pages 304-311
  8. Side-Channel Attacks

    1. Front Matter
      Pages 313-313
    2. Claude Carlet, Emmanuel Prouff
      Pages 315-341
    3. Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria
      Pages 342-354
    4. Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
      Pages 374-386
  9. Randomness

    1. Front Matter
      Pages 387-387
    2. Marek Sýs, Vashek Matyáš
      Pages 389-395
    3. Marco Bucci, Raimondo Luzzi
      Pages 396-414
  10. Embedded System Security

    1. Front Matter
      Pages 415-415
    2. Mehari G. Msgna, Houda Ferradi, Raja Naeem Akram, Konstantinos Markantonakis
      Pages 417-438
    3. Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert
      Pages 439-454
  11. Public-Key Cryptography

    1. Front Matter
      Pages 455-455
    2. Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey
      Pages 457-469
    3. Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
      Pages 479-493
  12. Models and Protocols

    1. Front Matter
      Pages 495-495
    2. Serge Vaudenay
      Pages 497-517
    3. Peter Y. A. Ryan
      Pages 543-549
  13. Back Matter
    Pages 551-551

About this book

Introduction

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and published in 1967.
This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology – past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols. 

Keywords

history of cryptology post-quantum cryptography public-key cryptography security applications theoretical cryptography cryptanalysis cyber security digital signatures efficient cryptographic implementations elliptic-curve cryptography fermat numbers hash function information security models and protocols quantum computing randomness recreational applications RSA security side-channel attacks

Editors and affiliations

  • Peter Y. A. Ryan
    • 1
  • David Naccache
    • 2
  • Jean-Jacques Quisquater
    • 3
  1. 1.Université du Luxembourg LuxembourgLuxembourg
  2. 2.Ecole normale supérieure ParisFrance
  3. 3.Université Catholique de Louvain Louvain-la-NeuveBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-49301-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-49300-7
  • Online ISBN 978-3-662-49301-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site