skip to main content
Skip header Section
Practical CryptographyApril 2003
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-22357-3
Published:01 April 2003
Pages:
410
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

In today's world, security is a top concern for businesses worldwide. Without a secure computer system, you don't make money, you don't expand, and -- bottom line -- you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.

Cited By

  1. ACM
    Chida K, Hamada K, Ikarashi D, Kikuchi R and Pinkas B High-Throughput Secure AES Computation Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, (13-24)
  2. Ramalingam B, Ravichandran D, Annadurai A, Rengarajan A and Rayappan J (2018). Chaos triggered image encryption - a reconfigurable security solution, Multimedia Tools and Applications, 77:10, (11669-11692), Online publication date: 1-May-2018.
  3. ACM
    Xiao C, Zhang C and Zheng C (2018). FontCode, ACM Transactions on Graphics, 37:2, (1-16), Online publication date: 30-Apr-2018.
  4. Dodis Y, Shamir A, Stephens-Davidowitz N and Wichs D (2017). How to Eat Your Entropy and Have it Too, Algorithmica, 79:4, (1196-1232), Online publication date: 1-Dec-2017.
  5. Krivtsova I, Lebedev I and Salakhutdinova K Identification of Executable Files on the basis of Statistical Criteria Proceedings of the 20th Conference of Open Innovations Association FRUCT, (202-208)
  6. ACM
    Chang-Fong N and Essex A The cloudier side of cryptographic end-to-end verifiable voting Proceedings of the 32nd Annual Conference on Computer Security Applications, (324-335)
  7. Gulcan E, Aysu A and Schaumont P BitCryptor Proceedings of the 16th International Conference on Progress in Cryptology -- INDOCRYPT 2015 - Volume 9462, (329-346)
  8. Kaloper-Meršinjak D, Mehnert H, Madhavapeddy A and Sewell P Not-quite-so-broken TLS Proceedings of the 24th USENIX Conference on Security Symposium, (223-238)
  9. Fahrnberger G Repetition Pattern Attack on Multi-word-containing SecureString 2.0 Objects Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956, (265-277)
  10. Falkner S, Kieseberg P, Simos D, Traxler C and Weippl E E-voting Authentication with QR-codes Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533, (149-159)
  11. Demirel D, Henning M, van de Graaf J, Ryan P and Buchmann J Prêt à voter providing everlasting privacy Proceedings of the 4th international conference on E-Voting and Identity, (156-175)
  12. ACM
    Hennebert C, Hossayni H and Lauradoux C Entropy harvesting from physical sensors Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, (149-154)
  13. Dodis Y, Ristenpart T, Steinberger J and Tessaro S To Hash or Not to Hash Again? InDifferentiability Results for $$H^2$$ and HMAC Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (348-366)
  14. Tumin S and Encheva S A closer look at authentication and authorization mechanisms for web-based applications Proceedings of the 5th WSEAS congress on Applied Computing conference, and Proceedings of the 1st international conference on Biologically Inspired Computation, (100-105)
  15. ACM
    Goss W and Huang C A practical implementation of veiled certificate for user-centric privacy protection Proceedings of the 50th Annual Southeast Regional Conference, (335-336)
  16. ACM
    Klingelhuber P and Mayrhofer R Private notes Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services, (254-261)
  17. ACM
    Teat C and Peltsverger S The security of cryptographic hashes Proceedings of the 49th Annual Southeast Regional Conference, (103-108)
  18. ACM
    Maurer U and Tackmann B On the soundness of authenticate-then-encrypt Proceedings of the 17th ACM conference on Computer and communications security, (505-515)
  19. Bertoni G, Daemen J, Peeters M and Van Assche G Sponge-based pseudo-random number generators Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (33-47)
  20. ACM
    Fessi A, Evans N, Niedermayer H and Holz R Pr2-P2PSIP Principles, Systems and Applications of IP Telecommunications, (134-145)
  21. Ziauddin S and Dailey M (2010). Robust iris verification for key management, Pattern Recognition Letters, 31:9, (926-935), Online publication date: 1-Jul-2010.
  22. ACM
    Kim J, Sterne D, Hardy R, Thomas R and Tong L Timing-based localization of in-band wormhole tunnels in MANETs Proceedings of the third ACM conference on Wireless network security, (1-12)
  23. Kanter G, Reilly D and Smith N (2009). Practical physical-layer encryption, IEEE Communications Magazine, 47:11, (74-81), Online publication date: 1-Nov-2009.
  24. ACM
    Dorrendorf L, Gutterman Z and Pinkas B (2009). Cryptanalysis of the random number generator of the Windows operating system, ACM Transactions on Information and System Security, 13:1, (1-32), Online publication date: 1-Oct-2009.
  25. Naranjo J, López-Ramos J and Casado L Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, (128-142)
  26. Rogers A and Milenković A (2009). Security extensions for integrity and confidentiality in embedded processors, Microprocessors & Microsystems, 33:5-6, (398-414), Online publication date: 1-Aug-2009.
  27. Reilly D and Kanter G Noise-enhanced encryption for physical layer security in an OFDM radio Proceedings of the 4th international conference on Radio and wireless symposium, (335-338)
  28. Lee R, Nguyen V and Pagnoni A (2008). Securing uniqueness of rights e-documents, Journal of Theoretical and Applied Electronic Commerce Research, 3:3, (83-102), Online publication date: 1-Dec-2008.
  29. ACM
    Wilcox-O'Hearn Z and Warner B Tahoe Proceedings of the 4th ACM international workshop on Storage security and survivability, (21-26)
  30. ACM
    Gormish M, Wolff G, Piersol K and Hart P Document logs Proceedings of the eighth ACM symposium on Document engineering, (119-122)
  31. Klein A (2008). Attacks on the RC4 stream cipher, Designs, Codes and Cryptography, 48:3, (269-286), Online publication date: 1-Sep-2008.
  32. Mayrhofer R and Gellersen H (2008). Spontaneous mobile device authentication based on sensor data, Information Security Tech. Report, 13:3, (136-150), Online publication date: 1-Aug-2008.
  33. Gora M, Simpson E and Schaumont P Intellectual Property Protection for Embedded Sensor Nodes Proceedings of the 8th international workshop on Embedded Computer Systems: Architectures, Modeling, and Simulation, (289-298)
  34. He Y, Lee M and Li J Enhanced mutual authentication and key exchange protocol for wireless communications Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development, (348-358)
  35. Spindler T, Wartmann C, Hovestadt L, Roth D, Van Gool L and Steffen A (2018). Privacy in video surveilled spaces, Journal of Computer Security, 16:2, (199-222), Online publication date: 1-Apr-2008.
  36. Moltó G, Hernández V and Alonso J (2008). A service-oriented WSRF-based architecture for metascheduling on computational Grids, Future Generation Computer Systems, 24:4, (317-328), Online publication date: 1-Apr-2008.
  37. ACM
    McAndrew A Teaching cryptography with open-source software Proceedings of the 39th SIGCSE technical symposium on Computer science education, (325-329)
  38. ACM
    Roy J, Koushanfar F and Markov I EPIC Proceedings of the conference on Design, automation and test in Europe, (1069-1074)
  39. ACM
    McAndrew A (2008). Teaching cryptography with open-source software, ACM SIGCSE Bulletin, 40:1, (325-329), Online publication date: 29-Feb-2008.
  40. Bentahar K and Smart N Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic Proceedings of the 11th IMA international conference on Cryptography and coding, (346-363)
  41. ACM
    Bhatnagar N and Miller E Designing a secure reliable file system for sensor networks Proceedings of the 2007 ACM workshop on Storage security and survivability, (19-24)
  42. ACM
    Lee H, Malkin T and Nahum E Cryptographic strength of ssl/tls servers Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (83-92)
  43. Mayrhofer R, Gellersen H and Hazas M Security by spatial reference Proceedings of the 9th international conference on Ubiquitous computing, (199-216)
  44. Assora M, Kadirire J and Shirvani A Using WPKI for security of web transaction Proceedings of the 8th international conference on E-commerce and web technologies, (11-20)
  45. Mayrhofer R and Gellersen H Shake well before use Proceedings of the 5th international conference on Pervasive computing, (144-161)
  46. Drimer S Authentication of FPGA bitstreams Proceedings of the 3rd international conference on Reconfigurable computing: architectures, tools and applications, (73-84)
  47. Knudsen L, Rechberger C and Thomsen S The Grindahl hash functions Proceedings of the 14th international conference on Fast Software Encryption, (39-57)
  48. ACM
    Yu Y, Leiwo J and Premkumar B Private stateful circuits secure against probing attacks Proceedings of the 2nd ACM symposium on Information, computer and communications security, (63-69)
  49. ACM
    Spindler T, Wartmann C, Hovestadt L, Roth D, van Gool L and Steffen A Privacy in video surveilled areas Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-10)
  50. Hyncica O, Kacz P, Fiedler P, Bradac Z, Kucera P and Vrba R On security of PAN wireless systems Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation, (178-185)
  51. Adler A, Nash J and Noël S (2006). Evaluating and implementing a collaborative office document system, Interacting with Computers, 18:4, (665-682), Online publication date: 1-Jul-2006.
  52. ACM
    Naedele M and Koch T Trust and tamper-proof software delivery Proceedings of the 2006 international workshop on Software engineering for secure systems, (51-58)
  53. ACM
    Gaw S, Felten E and Fernandez-Kelly P Secrecy, flagging, and paranoia Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (591-600)
  54. ACM
    Barak B and Halevi S A model and architecture for pseudo-random generation with applications to /dev/random Proceedings of the 12th ACM conference on Computer and communications security, (203-212)
  55. Marin G (2005). Network Security Basics, IEEE Security and Privacy, 3:6, (68-72), Online publication date: 1-Nov-2005.
  56. Encheva S and Tumin S On secure framework for web services in untrusted environment Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems, (79-88)
  57. ACM
    Burmester M, Henry P and Kermes L (2019). Tracking cyberstalkers, ACM SIGCAS Computers and Society, 35:3, (2-es), Online publication date: 1-Sep-2005.
  58. Sion R, Atallah M and Prabhakar S (2005). Rights Protection for Categorical Data, IEEE Transactions on Knowledge and Data Engineering, 17:7, (912-926), Online publication date: 1-Jul-2005.
  59. Apvrille A and Pourzandi M (2005). Secure Software Development by Example, IEEE Security and Privacy, 3:4, (10-17), Online publication date: 1-Jul-2005.
  60. ACM
    Solar-Lezama A, Rabbah R, Bodík R and Ebcioğlu K Programming by sketching for bit-streaming programs Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, (281-294)
  61. ACM
    Solar-Lezama A, Rabbah R, Bodík R and Ebcioğlu K (2005). Programming by sketching for bit-streaming programs, ACM SIGPLAN Notices, 40:6, (281-294), Online publication date: 12-Jun-2005.
  62. Boesgaard M, Christensen T and Zenner E Badger – a fast and provably secure MAC Proceedings of the Third international conference on Applied Cryptography and Network Security, (176-191)
  63. Phan R and Goi B On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (1065-1074)
  64. Phan R and Goi B On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (488-497)
  65. Cvrk L, Zeman V and Komosny D H.323 client-independent security approach Proceedings of the 4th international conference on Networking - Volume Part II, (673-680)
  66. ACM
    McNear C and Pettey C A free, readily upgradeable, interactive tool for teaching encryption algorithms Proceedings of the 43rd annual Southeast regional conference - Volume 1, (280-285)
  67. Cvrk L, Sykora M and Zeman V Videoconference security Proceedings of the 4th WSEAS international conference on Applications of electrical engineering, (284-287)
  68. Eilebrecht L Ciphire mail email encryption and authentication Proceedings of the 9th international conference on Financial Cryptography and Data Security, (211-224)
  69. ACM
    Dinda P Addressing the trust asymmetry problem in grid computing with encrypted computation Proceedings of the 7th workshop on Workshop on languages, compilers, and run-time support for scalable systems, (1-7)
  70. Payne C Enhanced Security Models for Operating Systems Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01, (230-235)
  71. Owens L, Duffy A and Dowling T An Identity Based Encryption system Proceedings of the 3rd international symposium on Principles and practice of programming in Java, (154-159)
Contributors

Recommendations