Cryptographic Engineering -

Cryptographic Engineering

Cetin Kaya Koc (Herausgeber)

Buch | Softcover
522 Seiten
2010 | Softcover reprint of hardcover 1st ed. 2009
Springer-Verlag New York Inc.
978-1-4419-4417-7 (ISBN)
267,49 inkl. MwSt
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge of computer cryptograms how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.
Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors’ lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.


This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.


Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book.

About Cryptographic Engineering.- Random Number Generators for Cryptographic Applications.- Evaluation Criteria for Physical Random Number Generators.- True Random Number Generators for Cryptography.- Fast Finite Field Multiplication.- Efficient Unified Arithmetic for Hardware Cryptography.- Spectral Modular Arithmetic for Cryptography.- Elliptic and Hyperelliptic Curve Cryptography.- Instruction Set Extensions for Cryptographic Applications.- FPGA and ASIC Implementations of AES.- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.- Block Cipher Modes of Operation from a Hardware Implementation Perspective.- Basics of Side-Channel Analysis.- Improved Techniques for Side-Channel Analysis.- Electromagnetic Attacks and Countermeasures.- Leakage from Montgomery Multiplication.- Randomized Exponentiation Algorithms.- Microarchitectural Attacks and Countermeasures.

Erscheint lt. Verlag 4.11.2010
Zusatzinfo 70 Illustrations, black and white; XXII, 522 p. 70 illus.
Verlagsort New York, NY
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
ISBN-10 1-4419-4417-6 / 1441944176
ISBN-13 978-1-4419-4417-7 / 9781441944177
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media

von Jens Gallenbacher

Buch | Softcover (2021)
Springer (Verlag)
29,99