Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Computer Architecture and Design Methodologies

Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers

    • 119,99 €
    • 119,99 €

Description de l’éditeur

This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.

GENRE
Professionnel et technique
SORTIE
2021
17 novembre
LANGUE
EN
Anglais
LONGUEUR
210
Pages
ÉDITIONS
Springer Nature Singapore
TAILLE
28,5
Mo

Autres livres de cette série

Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
2024
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
2022
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
2022
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
2022
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
2019
Modeling and Simulation of Invasive Applications and Architectures Modeling and Simulation of Invasive Applications and Architectures
2019