From the Publisher:
In today's world, security is a top concern for businesses worldwide. Without a secure computer system, you don't make money, you don't expand, and -- bottom line -- you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.
Cited By
- Chida K, Hamada K, Ikarashi D, Kikuchi R and Pinkas B High-Throughput Secure AES Computation Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, (13-24)
- Ramalingam B, Ravichandran D, Annadurai A, Rengarajan A and Rayappan J (2018). Chaos triggered image encryption - a reconfigurable security solution, Multimedia Tools and Applications, 77:10, (11669-11692), Online publication date: 1-May-2018.
- Xiao C, Zhang C and Zheng C (2018). FontCode, ACM Transactions on Graphics, 37:2, (1-16), Online publication date: 30-Apr-2018.
- Dodis Y, Shamir A, Stephens-Davidowitz N and Wichs D (2017). How to Eat Your Entropy and Have it Too, Algorithmica, 79:4, (1196-1232), Online publication date: 1-Dec-2017.
- Krivtsova I, Lebedev I and Salakhutdinova K Identification of Executable Files on the basis of Statistical Criteria Proceedings of the 20th Conference of Open Innovations Association FRUCT, (202-208)
- Chang-Fong N and Essex A The cloudier side of cryptographic end-to-end verifiable voting Proceedings of the 32nd Annual Conference on Computer Security Applications, (324-335)
- Gulcan E, Aysu A and Schaumont P BitCryptor Proceedings of the 16th International Conference on Progress in Cryptology -- INDOCRYPT 2015 - Volume 9462, (329-346)
- Kaloper-Meršinjak D, Mehnert H, Madhavapeddy A and Sewell P Not-quite-so-broken TLS Proceedings of the 24th USENIX Conference on Security Symposium, (223-238)
- Fahrnberger G Repetition Pattern Attack on Multi-word-containing SecureString 2.0 Objects Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956, (265-277)
- Falkner S, Kieseberg P, Simos D, Traxler C and Weippl E E-voting Authentication with QR-codes Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533, (149-159)
- Demirel D, Henning M, van de Graaf J, Ryan P and Buchmann J Prêt à voter providing everlasting privacy Proceedings of the 4th international conference on E-Voting and Identity, (156-175)
- Hennebert C, Hossayni H and Lauradoux C Entropy harvesting from physical sensors Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, (149-154)
- Dodis Y, Ristenpart T, Steinberger J and Tessaro S To Hash or Not to Hash Again? InDifferentiability Results for $$H^2$$ and HMAC Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (348-366)
- Tumin S and Encheva S A closer look at authentication and authorization mechanisms for web-based applications Proceedings of the 5th WSEAS congress on Applied Computing conference, and Proceedings of the 1st international conference on Biologically Inspired Computation, (100-105)
- Goss W and Huang C A practical implementation of veiled certificate for user-centric privacy protection Proceedings of the 50th Annual Southeast Regional Conference, (335-336)
- Klingelhuber P and Mayrhofer R Private notes Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services, (254-261)
- Teat C and Peltsverger S The security of cryptographic hashes Proceedings of the 49th Annual Southeast Regional Conference, (103-108)
- Maurer U and Tackmann B On the soundness of authenticate-then-encrypt Proceedings of the 17th ACM conference on Computer and communications security, (505-515)
- Bertoni G, Daemen J, Peeters M and Van Assche G Sponge-based pseudo-random number generators Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (33-47)
- Fessi A, Evans N, Niedermayer H and Holz R Pr2-P2PSIP Principles, Systems and Applications of IP Telecommunications, (134-145)
- Ziauddin S and Dailey M (2010). Robust iris verification for key management, Pattern Recognition Letters, 31:9, (926-935), Online publication date: 1-Jul-2010.
- Kim J, Sterne D, Hardy R, Thomas R and Tong L Timing-based localization of in-band wormhole tunnels in MANETs Proceedings of the third ACM conference on Wireless network security, (1-12)
- Kanter G, Reilly D and Smith N (2009). Practical physical-layer encryption, IEEE Communications Magazine, 47:11, (74-81), Online publication date: 1-Nov-2009.
- Dorrendorf L, Gutterman Z and Pinkas B (2009). Cryptanalysis of the random number generator of the Windows operating system, ACM Transactions on Information and System Security, 13:1, (1-32), Online publication date: 1-Oct-2009.
- Naranjo J, López-Ramos J and Casado L Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, (128-142)
- Rogers A and Milenković A (2009). Security extensions for integrity and confidentiality in embedded processors, Microprocessors & Microsystems, 33:5-6, (398-414), Online publication date: 1-Aug-2009.
- Reilly D and Kanter G Noise-enhanced encryption for physical layer security in an OFDM radio Proceedings of the 4th international conference on Radio and wireless symposium, (335-338)
- Lee R, Nguyen V and Pagnoni A (2008). Securing uniqueness of rights e-documents, Journal of Theoretical and Applied Electronic Commerce Research, 3:3, (83-102), Online publication date: 1-Dec-2008.
- Wilcox-O'Hearn Z and Warner B Tahoe Proceedings of the 4th ACM international workshop on Storage security and survivability, (21-26)
- Gormish M, Wolff G, Piersol K and Hart P Document logs Proceedings of the eighth ACM symposium on Document engineering, (119-122)
- Klein A (2008). Attacks on the RC4 stream cipher, Designs, Codes and Cryptography, 48:3, (269-286), Online publication date: 1-Sep-2008.
- Mayrhofer R and Gellersen H (2008). Spontaneous mobile device authentication based on sensor data, Information Security Tech. Report, 13:3, (136-150), Online publication date: 1-Aug-2008.
- Gora M, Simpson E and Schaumont P Intellectual Property Protection for Embedded Sensor Nodes Proceedings of the 8th international workshop on Embedded Computer Systems: Architectures, Modeling, and Simulation, (289-298)
- He Y, Lee M and Li J Enhanced mutual authentication and key exchange protocol for wireless communications Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development, (348-358)
- Spindler T, Wartmann C, Hovestadt L, Roth D, Van Gool L and Steffen A (2018). Privacy in video surveilled spaces, Journal of Computer Security, 16:2, (199-222), Online publication date: 1-Apr-2008.
- Moltó G, Hernández V and Alonso J (2008). A service-oriented WSRF-based architecture for metascheduling on computational Grids, Future Generation Computer Systems, 24:4, (317-328), Online publication date: 1-Apr-2008.
- McAndrew A Teaching cryptography with open-source software Proceedings of the 39th SIGCSE technical symposium on Computer science education, (325-329)
- Roy J, Koushanfar F and Markov I EPIC Proceedings of the conference on Design, automation and test in Europe, (1069-1074)
- McAndrew A (2008). Teaching cryptography with open-source software, ACM SIGCSE Bulletin, 40:1, (325-329), Online publication date: 29-Feb-2008.
- Bentahar K and Smart N Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic Proceedings of the 11th IMA international conference on Cryptography and coding, (346-363)
- Bhatnagar N and Miller E Designing a secure reliable file system for sensor networks Proceedings of the 2007 ACM workshop on Storage security and survivability, (19-24)
- Lee H, Malkin T and Nahum E Cryptographic strength of ssl/tls servers Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (83-92)
- Mayrhofer R, Gellersen H and Hazas M Security by spatial reference Proceedings of the 9th international conference on Ubiquitous computing, (199-216)
- Assora M, Kadirire J and Shirvani A Using WPKI for security of web transaction Proceedings of the 8th international conference on E-commerce and web technologies, (11-20)
- Mayrhofer R and Gellersen H Shake well before use Proceedings of the 5th international conference on Pervasive computing, (144-161)
- Drimer S Authentication of FPGA bitstreams Proceedings of the 3rd international conference on Reconfigurable computing: architectures, tools and applications, (73-84)
- Knudsen L, Rechberger C and Thomsen S The Grindahl hash functions Proceedings of the 14th international conference on Fast Software Encryption, (39-57)
- Yu Y, Leiwo J and Premkumar B Private stateful circuits secure against probing attacks Proceedings of the 2nd ACM symposium on Information, computer and communications security, (63-69)
- Spindler T, Wartmann C, Hovestadt L, Roth D, van Gool L and Steffen A Privacy in video surveilled areas Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-10)
- Hyncica O, Kacz P, Fiedler P, Bradac Z, Kucera P and Vrba R On security of PAN wireless systems Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation, (178-185)
- Adler A, Nash J and Noël S (2006). Evaluating and implementing a collaborative office document system, Interacting with Computers, 18:4, (665-682), Online publication date: 1-Jul-2006.
- Naedele M and Koch T Trust and tamper-proof software delivery Proceedings of the 2006 international workshop on Software engineering for secure systems, (51-58)
- Gaw S, Felten E and Fernandez-Kelly P Secrecy, flagging, and paranoia Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (591-600)
- Barak B and Halevi S A model and architecture for pseudo-random generation with applications to /dev/random Proceedings of the 12th ACM conference on Computer and communications security, (203-212)
- Marin G (2005). Network Security Basics, IEEE Security and Privacy, 3:6, (68-72), Online publication date: 1-Nov-2005.
- Encheva S and Tumin S On secure framework for web services in untrusted environment Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems, (79-88)
- Burmester M, Henry P and Kermes L (2019). Tracking cyberstalkers, ACM SIGCAS Computers and Society, 35:3, (2-es), Online publication date: 1-Sep-2005.
- Sion R, Atallah M and Prabhakar S (2005). Rights Protection for Categorical Data, IEEE Transactions on Knowledge and Data Engineering, 17:7, (912-926), Online publication date: 1-Jul-2005.
- Apvrille A and Pourzandi M (2005). Secure Software Development by Example, IEEE Security and Privacy, 3:4, (10-17), Online publication date: 1-Jul-2005.
- Solar-Lezama A, Rabbah R, Bodík R and Ebcioğlu K Programming by sketching for bit-streaming programs Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, (281-294)
- Solar-Lezama A, Rabbah R, Bodík R and Ebcioğlu K (2005). Programming by sketching for bit-streaming programs, ACM SIGPLAN Notices, 40:6, (281-294), Online publication date: 12-Jun-2005.
- Boesgaard M, Christensen T and Zenner E Badger – a fast and provably secure MAC Proceedings of the Third international conference on Applied Cryptography and Network Security, (176-191)
- Phan R and Goi B On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (1065-1074)
- Phan R and Goi B On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (488-497)
- Cvrk L, Zeman V and Komosny D H.323 client-independent security approach Proceedings of the 4th international conference on Networking - Volume Part II, (673-680)
- McNear C and Pettey C A free, readily upgradeable, interactive tool for teaching encryption algorithms Proceedings of the 43rd annual Southeast regional conference - Volume 1, (280-285)
- Cvrk L, Sykora M and Zeman V Videoconference security Proceedings of the 4th WSEAS international conference on Applications of electrical engineering, (284-287)
- Eilebrecht L Ciphire mail email encryption and authentication Proceedings of the 9th international conference on Financial Cryptography and Data Security, (211-224)
- Dinda P Addressing the trust asymmetry problem in grid computing with encrypted computation Proceedings of the 7th workshop on Workshop on languages, compilers, and run-time support for scalable systems, (1-7)
- Payne C Enhanced Security Models for Operating Systems Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01, (230-235)
- Owens L, Duffy A and Dowling T An Identity Based Encryption system Proceedings of the 3rd international symposium on Principles and practice of programming in Java, (154-159)
Recommendations
Identity-Based signcryption from identity-based cryptography
WISA'11: Proceedings of the 12th international conference on Information Security ApplicationsA signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain ...
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified ...