State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3--6, 1997. Revised lectures (Q1572625)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3--6, 1997. Revised lectures |
scientific article; zbMATH DE number 1478696
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3--6, 1997. Revised lectures |
scientific article; zbMATH DE number 1478696 |
Statements
State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3--6, 1997. Revised lectures (English)
0 references
19 July 2000
0 references
The articles of this volume will be reviewed individually. Indexed articles: \textit{De Schutter, Bart}, Trends in the fight against computer-related delinquency, 1-17 [Zbl 0981.68708] \textit{Knudsen, Lars R.}, Block ciphers -- A survey, 18-48 [Zbl 0954.94013] \textit{Preneel, Bart}, Cryptographic primitives for information authentication -- State of the art, 49-104 [Zbl 0954.94018] \textit{Preneel, Bart; Rijmen, Vincent; Bosselaers, Antoon}, Recent developments in the design of conventional cryptographic algorithms, 105-130 [Zbl 0955.94016] \textit{De Win, Erik; Preneel, Bart}, Elliptic curve public-key cryptosystems -- An introduction, 131-141 [Zbl 0954.94011] \textit{Fumy, Walter}, Key management techniques, 142-162 [Zbl 0954.94012] \textit{Verschuren, Jan}, Security of computer networks, 163-185 [Zbl 0956.68514] \textit{Fumy, Walter}, Internet security protocols, 186-208 [Zbl 0981.68170] \textit{Vandenwauver, Mark; Jorissen, Frank}, Securing internet electronic mail, 209-223 [Zbl 0981.68718] \textit{Vedder, Klaus}, GSM: Security, services, and the SIM, 224-240 [Zbl 0981.68701] \textit{Landrock, Peter}, TTPs overview -- Concepts and review of the state of art from a technical point of view, 241-263 [Zbl 0981.68702] \textit{Daemen, Joan}, Management of secret keys: Dynamic key handling, 264-276 [Zbl 0981.68703] \textit{Hoyle, Mark P.; Mitchell, Chris J.}, On solutions to the key escrow problem, 277-306 [Zbl 0955.94013] \textit{Vedder, Klaus; Weikmann, Franz}, Smart cards -- Requirements, properties, and applications, 307-331 [Zbl 0963.68622] \textit{Bovelander, Ernst}, Smart card security ``How can we be so sure?'', 332-337 [Zbl 0981.68704] \textit{Schoenmakers, Berry}, Security aspects of the ecash\(^{\text{TM}}\) payment system, 338-352 [Zbl 0981.68705] \textit{Vedder, Klaus}, International standardisation of IT security, 353-365 [Zbl 0981.68706] \textit{Roberts, David W.}, Security management -- The process, 366-376 [Zbl 0981.68707] \textit{De Decker, Bart}, Introduction to computer security, 377-393 [Zbl 0956.68513]
0 references
Leuven (Belgium)
0 references
Lectures
0 references
Course
0 references
Applied cryptography
0 references
State of the art
0 references