Cover image for Cryptographic engineering
Title:
Cryptographic engineering
Publication Information:
Berlin : Springer, 2009
Physical Description:
xxii, 517 p. : ill. ; 24 cm
ISBN:
9780387718163
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010194067 TK7895.E42 C79 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors' lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.

This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.

Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book.


Table of Contents

About Cryptographic Engineering
Random Number Generators for Cryptographic Applications
Evaluation Criteria for Physical Random Number Generators
True Random Number Generators for Cryptography
Fast Finite Field Multiplication
Efficient Unified Arithmetic for Hardware Cryptography
Spectral Modular Arithmetic for Cryptography
Elliptic and Hyperelliptic Curve Cryptography
Instruction Set Extensions for Cryptographic Applications
FPGA and ASIC Implementations of AES
Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs
Block Cipher Modes of Operation from a Hardware Implementation Perspective
Basics of Side-Channel Analysis
Improved Techniques for Side-Channel Analysis
Electromagnetic Attacks and Countermeasures
Leakage from Montgomery Multiplication
Randomized Exponentiation Algorithms
Microarchitectural Attacks and Countermeasures