Cryptography and Security: From Theory to Applications

Cryptography and Security: From Theory to Applications

4.11 - 1251 ratings - Source

This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jacques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just qas diverse as Jean-Jacques' scientific interestsq.Code. in. a. Java. Card. Smart. Card. Instead of dumping the memory byte after byte we use the ability to invoke an ... To present this attack, we consider the following generic code which is often used to check if a PIN code has been validated.

Title:Cryptography and Security: From Theory to Applications
Author: David Naccache
Publisher:Springer Science & Business Media - 2012-03-01

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA