| 000 | 03519nam a22004575i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-71817-0 | ||
| 003 | DE-He213 | ||
| 005 | 20250710084013.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2009 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387718170 _a99780387718170 |
||
| 024 | 7 |
_a10.1007/978-0-387-71817-0 _2doi |
|
| 082 | 0 | 4 |
_a621.3815 _223 |
| 100 | 1 |
_aKoç, Çetin Kaya. _eeditor. |
|
| 245 | 1 | 0 |
_aCryptographic Engineering _h[recurso electrónico] / _cedited by Çetin Kaya Koç. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2009. |
|
| 300 | _bonline resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aAbout Cryptographic Engineering -- Random Number Generators for Cryptographic Applications -- Evaluation Criteria for Physical Random Number Generators -- True Random Number Generators for Cryptography -- Fast Finite Field Multiplication -- Efficient Unified Arithmetic for Hardware Cryptography -- Spectral Modular Arithmetic for Cryptography -- Elliptic and Hyperelliptic Curve Cryptography -- Instruction Set Extensions for Cryptographic Applications -- FPGA and ASIC Implementations of AES -- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs -- Block Cipher Modes of Operation from a Hardware Implementation Perspective -- Basics of Side-Channel Analysis -- Improved Techniques for Side-Channel Analysis -- Electromagnetic Attacks and Countermeasures -- Leakage from Montgomery Multiplication -- Randomized Exponentiation Algorithms -- Microarchitectural Attacks and Countermeasures. | |
| 520 | _aCryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. The material includes four important features: ASIC and FPGA hardware design for cryptography, Principles and practice of true random number generators, Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and Side-channel attacks on cryptographic systems and countermeasure designs. Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques. | ||
| 650 | 0 | _aENGINEERING. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aTELECOMMUNICATION. | |
| 650 | 0 | _aSYSTEMS ENGINEERING. | |
| 650 | 1 | 4 | _aENGINEERING. |
| 650 | 2 | 4 | _aCIRCUITS AND SYSTEMS. |
| 650 | 2 | 4 | _aCOMMUNICATIONS ENGINEERING, NETWORKS. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387718163 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-71817-0 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-ENG | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c58299 _d58299 |
||