000 | 03363cam a22005297a 4500 | ||
---|---|---|---|
001 | 15413838 | ||
003 | EG-NbEJU | ||
005 | 20240516113951.0 | ||
008 | 080815s2009 nyua b 001 0 eng | ||
010 |
_a2008935379 _z 2008930148 |
||
015 |
_aGBA8A9258 _2bnb |
||
015 |
_a08,N29,0827 _2dnb |
||
016 | 7 |
_a014754031 _2Uk |
|
020 | _a9780387718163 (cased : alk. paper) | ||
020 | _a0387718168 (cased : alk. paper) | ||
020 | _a9780387718170 (ebk.) | ||
020 | _a0387718176 (ebk.) | ||
035 | _a(OCoLC)ocn302061495 | ||
040 |
_aUKM _beng _cUKM _dHEBIS _dCDN _dDEBBG _dBTCTA _dBAKER _dYDXCP _dCDX _dBWX _dMUU _dWAU _dVRC _dOCL _dDEBSZ _dOCLCQ _dUKMGB _dDLC |
||
041 | _aeng | ||
042 |
_aukblcatcopy _alccopycat |
||
050 | 0 | 0 |
_aTK7895.E42 _bC79 2009 |
082 | 0 | 4 |
_a005.82 _222 |
084 |
_a620 _2sdnb |
||
084 |
_aST 276 _2rvk |
||
084 |
_aZN 6025 _2rvk |
||
245 | 0 | 0 |
_aCryptographic engineering / _cÇetin Kaya Koç editor. |
260 |
_aNew York, NY, USA : _bSpringer, _cc2009. |
||
300 |
_axxii, 517 p. : _bill. ; _c24 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aAbout Cryptographic Engineering.- Random Number Generators for Cryptographic Applications.- Evaluation Criteria for Physical Random Number Generators.- True Random Number Generators for Cryptography.- Fast Finite Field Multiplication.- Efficient Unified Arithmetic for Hardware Cryptography.- Spectral Modular Arithmetic for Cryptography.- Elliptic and Hyperelliptic Curve Cryptography.- Instruction Set Extensions for Cryptographic Applications.- FPGA and ASIC Implementations of AES.- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.- Block Cipher Modes of Operation from a Hardware Implementation Perspective.- Basics of Side-Channel Analysis.- Improved Techniques for Side-Channel Analysis.- Electromagnetic Attacks and Countermeasures.- Leakage from Montgomery Multiplication.- Randomized Exponentiation Algorithms.- Microarchitectural Attacks and Countermeasures. | |
520 | 1 | _a"Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success."--BOOK JACKET. | |
600 | 1 | 7 |
_aS. _2swd |
650 | 0 | _aData encryption (Computer science) | |
650 | 0 |
_aEmbedded computer systems _xDesign and construction. |
|
650 | 0 | _aCryptography. | |
650 | 0 | 7 |
_aKryptologie. _2swd |
655 | 7 |
_aAufgabensammlung. _2swd |
|
655 | 7 |
_aAufsatzsammlung. _2swd |
|
700 | 1 |
_aKoç, Çetin K., _d1957- |
|
856 | 4 |
_qimage/jpeg _uhttp://swbplus.bsz-bw.de/bsz301471061cov.htm _v20090401014122 _3Cover |
|
856 | 4 | 1 |
_3Table of contents _uhttp://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017142354&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
856 | 4 | 1 |
_3Table of contents _mV:DE-601 _qapplication/pdf _uhttp://www.gbv.de/dms/ilmenau/toc/571621295.PDF |
901 | _aKholoud | ||
902 | _aENG_03_ (567) | ||
942 |
_2lcc _cBK |
||
999 |
_c2954 _d2954 |