Welcome To E-JUST Library

Local cover image
Local cover image

Cryptographic engineering / Çetin Kaya Koç editor.

Contributor(s): Material type: TextTextLanguage: English Publication details: New York, NY, USA : Springer, c2009.Description: xxii, 517 p. : ill. ; 24 cmISBN:
  • 9780387718163 (cased : alk. paper)
  • 0387718168 (cased : alk. paper)
  • 9780387718170 (ebk.)
  • 0387718176 (ebk.)
Subject(s): Genre/Form: DDC classification:
  • 005.82 22
LOC classification:
  • TK7895.E42 C79 2009
Other classification:
  • 620
  • ST 276
  • ZN 6025
Online resources:
Contents:
About Cryptographic Engineering.- Random Number Generators for Cryptographic Applications.- Evaluation Criteria for Physical Random Number Generators.- True Random Number Generators for Cryptography.- Fast Finite Field Multiplication.- Efficient Unified Arithmetic for Hardware Cryptography.- Spectral Modular Arithmetic for Cryptography.- Elliptic and Hyperelliptic Curve Cryptography.- Instruction Set Extensions for Cryptographic Applications.- FPGA and ASIC Implementations of AES.- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.- Block Cipher Modes of Operation from a Hardware Implementation Perspective.- Basics of Side-Channel Analysis.- Improved Techniques for Side-Channel Analysis.- Electromagnetic Attacks and Countermeasures.- Leakage from Montgomery Multiplication.- Randomized Exponentiation Algorithms.- Microarchitectural Attacks and Countermeasures.
Review: "Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success."--BOOK JACKET.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Barcode
Books Books Fayza Aboulnaga Central Library | مكتبة فايزة أبو النجا المركزية بالحرم الجامعي TK7895.E42 C79 2009 (Browse shelf(Opens below)) C. 1 Available 10005591

Includes bibliographical references and index.

About Cryptographic Engineering.- Random Number Generators for Cryptographic Applications.- Evaluation Criteria for Physical Random Number Generators.- True Random Number Generators for Cryptography.- Fast Finite Field Multiplication.- Efficient Unified Arithmetic for Hardware Cryptography.- Spectral Modular Arithmetic for Cryptography.- Elliptic and Hyperelliptic Curve Cryptography.- Instruction Set Extensions for Cryptographic Applications.- FPGA and ASIC Implementations of AES.- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.- Block Cipher Modes of Operation from a Hardware Implementation Perspective.- Basics of Side-Channel Analysis.- Improved Techniques for Side-Channel Analysis.- Electromagnetic Attacks and Countermeasures.- Leakage from Montgomery Multiplication.- Randomized Exponentiation Algorithms.- Microarchitectural Attacks and Countermeasures.

"Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success."--BOOK JACKET.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image

All Rights Reserved
Egypt-Japan University of Science and Technology (E-JUST) © 2024