Logo - springer
Slogan - springer

Engineering - Circuits & Systems | Cryptographic Engineering

Cryptographic Engineering

Koç, Çetin Kaya (Ed.)

2009

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$119.00

(net) price for USA

ISBN 978-0-387-71817-0

digitally watermarked, no DRM

Included Format: PDF and EPUB

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$149.00

(net) price for USA

ISBN 978-0-387-71816-3

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$149.00

(net) price for USA

ISBN 978-1-4419-4417-7

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • Discusses the design techniques and methods of cryptographic hardware and embedded software
  • Links two domains: the mathematics underlying cryptography and the implementation issues to achieve efficiency without security losses
  • Present real-life experience of strong researchers in each sub-topic

Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success.

The material includes four important features:

  • ASIC and FPGA hardware design for cryptography,
  • Principles and practice of true random number generators,
  • Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and
  • Side-channel attacks on cryptographic systems and countermeasure designs.

Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.

Content Level » Research

Keywords » AES - ASIC - Cryptographic Algorithms - DES - Elliptic Curve Cryptography - FPGA - Fast Finite Field - Information - Random Number Generators - Side-Channel Analysis - algorithms - cryptography - finite field - integrated circuit

Related subjects » Circuits & Systems - Security and Cryptology - Signals & Communication

Table of contents 

About Cryptographic Engineering.- Random Number Generators for Cryptographic Applications.- Evaluation Criteria for Physical Random Number Generators.- True Random Number Generators for Cryptography.- Fast Finite Field Multiplication.- Efficient Unified Arithmetic for Hardware Cryptography.- Spectral Modular Arithmetic for Cryptography.- Elliptic and Hyperelliptic Curve Cryptography.- Instruction Set Extensions for Cryptographic Applications.- FPGA and ASIC Implementations of AES.- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.- Block Cipher Modes of Operation from a Hardware Implementation Perspective.- Basics of Side-Channel Analysis.- Improved Techniques for Side-Channel Analysis.- Electromagnetic Attacks and Countermeasures.- Leakage from Montgomery Multiplication.- Randomized Exponentiation Algorithms.- Microarchitectural Attacks and Countermeasures.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Circuits and Systems.