Skip to main content
  • Book
  • © 1995

Integrity Primitives for Secure Information Systems

Final RIPE Report of RACE Integrity Primitives Evaluation

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1007)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 chapters)

  1. Front Matter

  2. Introduction and background

    • Antoon Bosselaers, Bart Preneel
    Pages 1-7
  3. Integrity concepts

    • Antoon Bosselaers, Bart Preneel
    Pages 9-22
  4. Introduction to part III

    • Antoon Bosselaers, Bart Preneel
    Pages 23-30
  5. MDC-4

    • Antoon Bosselaers, Bart Preneel
    Pages 31-67
  6. RIPEMD

    • Antoon Bosselaers, Bart Preneel
    Pages 69-111
  7. RIPE-MAC

    • Antoon Bosselaers, Bart Preneel
    Pages 113-143
  8. IBC-hash

    • Antoon Bosselaers, Bart Preneel
    Pages 145-167
  9. SKID

    • Antoon Bosselaers, Bart Preneel
    Pages 169-178
  10. RSA

    • Antoon Bosselaers, Bart Preneel
    Pages 179-197
  11. COMSET

    • Antoon Bosselaers, Bart Preneel
    Pages 199-211
  12. RSA key generation

    • Antoon Bosselaers, Bart Preneel
    Pages 213-231
  13. Implementation guidelines for arithmetic computation

    • Antoon Bosselaers, Bart Preneel
    Pages 233-239
  14. Back Matter

About this book

This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.
This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity, non-repudiation, signatures, and key exchange.

About the authors

  

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access