Embedded Cryptographic Hardware -

Embedded Cryptographic Hardware

Design & Security
Buch | Hardcover
255 Seiten
2004
Nova Science Publishers Inc (Verlag)
978-1-59454-145-2 (ISBN)
299,10 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Data security is an important requirement for information-oriented applications such as e-commerce, digital signature, secure Internet, and more. This book focuses on various aspects of cryptographic hardware and embedded systems. This includes design, implementation and security of such systems.
Data security is an important requirement for almost all, if not all, information-oriented applications such as e-commerce, digital signature, secure Internet, etc. All these services use encrypted data. Cryptography is a milliner science that was the key to the secret of ancient Rome and a fundamental piece in the Second World War. Today, it is a star in the computation world. Several operating systems, data base systems or simple filling systems provide the user with cryptographic functions that allow controlled data scrambling. Modern cryptology, which is the basis of information security techniques, started in the late 1970's and developed in the 1980's. As communication networks were spreading deep into society, the need for secure communication greatly promoted cryptographic research. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, hardware implementations of cryptographic algorithms became cost-effective. The focus of this book is on all aspects of cryptographic hardware and embedded systems. This includes design, implementation and security of such systems. The content of this book is divided into four main parts, each of which is organised in three chapters, with the exception of the last one.

Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES; PAX: A Datapath-Scalable Minimalist Cryptographic Processor For Mobile Devices; Architectural Design Features of a Programmable High Throughput AES Coprocessor; Power-Analysis Attack on an ASIC AES Implementation; On the Importance of Protecting c in SFLASH against Side Channel Attacks; Resistance Against Power and Timing Attacks: An Evaluation of Two Clock-less Implementations of the AES; Modular Multiplication: Methods and Hardware; A Design of Basis-Independent Bit-Parallel Multipliers; Reducing the Complexity of Modular Multiplication by Modification of One Operand; Special Hyperelliptic Curve Cryptosystems of Genus Two: Efficient Arithmetic and Fast Implementation; A Generic Coprocessor For Elliptic Curve Scalar Multiplication on Hardware; Hyperelliptic Curve Cryptosystem: What is the Best Parallel Hardware Architecture?; Permutation Operations in Block Ciphers; Streaming Encryption for a Secure Wavelength and Time Domain Hopped Optical Network; Bibliography; Index.

Erscheint lt. Verlag 1.10.2004
Zusatzinfo Illustrations, unspecified
Verlagsort New York
Sprache englisch
Maße 260 x 180 mm
Gewicht 782 g
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 1-59454-145-0 / 1594541450
ISBN-13 978-1-59454-145-2 / 9781594541452
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich