000 03363cam a22005297a 4500
001 15413838
003 EG-NbEJU
005 20240516113951.0
008 080815s2009 nyua b 001 0 eng
010 _a2008935379
_z 2008930148
015 _aGBA8A9258
_2bnb
015 _a08,N29,0827
_2dnb
016 7 _a014754031
_2Uk
020 _a9780387718163 (cased : alk. paper)
020 _a0387718168 (cased : alk. paper)
020 _a9780387718170 (ebk.)
020 _a0387718176 (ebk.)
035 _a(OCoLC)ocn302061495
040 _aUKM
_beng
_cUKM
_dHEBIS
_dCDN
_dDEBBG
_dBTCTA
_dBAKER
_dYDXCP
_dCDX
_dBWX
_dMUU
_dWAU
_dVRC
_dOCL
_dDEBSZ
_dOCLCQ
_dUKMGB
_dDLC
041 _aeng
042 _aukblcatcopy
_alccopycat
050 0 0 _aTK7895.E42
_bC79 2009
082 0 4 _a005.82
_222
084 _a620
_2sdnb
084 _aST 276
_2rvk
084 _aZN 6025
_2rvk
245 0 0 _aCryptographic engineering /
_cÇetin Kaya Koç editor.
260 _aNew York, NY, USA :
_bSpringer,
_cc2009.
300 _axxii, 517 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
505 0 _aAbout Cryptographic Engineering.- Random Number Generators for Cryptographic Applications.- Evaluation Criteria for Physical Random Number Generators.- True Random Number Generators for Cryptography.- Fast Finite Field Multiplication.- Efficient Unified Arithmetic for Hardware Cryptography.- Spectral Modular Arithmetic for Cryptography.- Elliptic and Hyperelliptic Curve Cryptography.- Instruction Set Extensions for Cryptographic Applications.- FPGA and ASIC Implementations of AES.- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.- Block Cipher Modes of Operation from a Hardware Implementation Perspective.- Basics of Side-Channel Analysis.- Improved Techniques for Side-Channel Analysis.- Electromagnetic Attacks and Countermeasures.- Leakage from Montgomery Multiplication.- Randomized Exponentiation Algorithms.- Microarchitectural Attacks and Countermeasures.
520 1 _a"Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success."--BOOK JACKET.
600 1 7 _aS.
_2swd
650 0 _aData encryption (Computer science)
650 0 _aEmbedded computer systems
_xDesign and construction.
650 0 _aCryptography.
650 0 7 _aKryptologie.
_2swd
655 7 _aAufgabensammlung.
_2swd
655 7 _aAufsatzsammlung.
_2swd
700 1 _aKoç, Çetin K.,
_d1957-
856 4 _qimage/jpeg
_uhttp://swbplus.bsz-bw.de/bsz301471061cov.htm
_v20090401014122
_3Cover
856 4 1 _3Table of contents
_uhttp://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017142354&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
856 4 1 _3Table of contents
_mV:DE-601
_qapplication/pdf
_uhttp://www.gbv.de/dms/ilmenau/toc/571621295.PDF
901 _aKholoud
902 _aENG_03_ (567)
942 _2lcc
_cBK
999 _c2954
_d2954