Explore the latest books of this year!
Bookbot

Cryptographic hardware and embedded systems

Parameters

  • 441 pages
  • 16 hours of reading

More about the book

The content covers a range of topics related to security challenges in computing, focusing on side channel attack methodologies and their implications. It discusses multi-channel attacks and introduces various cryptanalytic techniques, including power-analysis attacks on FPGA and differential fault attack methods applicable to AES and Khazad. The exploration of hardware factorization and solutions for sparse systems of linear equations over GF(2) is also included. The annotation highlights the vulnerabilities in symmetric ciphers, particularly in relation to side channel attacks and countermeasures, and examines the cryptanalysis of DES in cache-implemented environments. It presents advancements in secure hardware logic, including parity-based error detection for block ciphers and the design of true random number generators, emphasizing their security in dynamic environments. Efficient arithmetic operations such as multiplication and modular reduction algorithms are discussed, alongside attacks on asymmetric cryptosystems, including RSA-CRT vulnerabilities and timing attacks related to GPS. The implementation of symmetric ciphers is addressed, showcasing unified hardware architectures and improvements in the efficiency of Rijndael encryption. Moreover, the text delves into hyperelliptic curve cryptography, exploring performance enhancements and countermeasures against differential power analysis. It concludes with a focus

Book purchase

Cryptographic hardware and embedded systems, Colin D. Walter

Language
Released
2003
product-detail.submit-box.info.binding
(Paperback)
We’ll email you as soon as we track it down.

Payment methods

No one has rated yet.Add rating