Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
Computer Architecture and Design Methodologies

Classical and Physical Security of Symmetric Key Cryptographic Algorithms

    • ‏129٫99 US$
    • ‏129٫99 US$

وصف الناشر

This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse—it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography. 

النوع
تخصصات مهنية وتقنية
تاريخ النشر
٢٠٢٢
١ يناير
اللغة
EN
الإنجليزية
عدد الصفحات
٣٠٠
الناشر
Springer Nature Singapore
البائع
Springer Nature B.V.
الحجم
٤٥٫٨
‫م.ب.‬
Attacks and Defenses for the Internet-of-Things Attacks and Defenses for the Internet-of-Things
٢٠٢٢
SSA-based Compiler Design SSA-based Compiler Design
٢٠٢٢
Distributed Computing and Intelligent Technology Distributed Computing and Intelligent Technology
٢٠٢٣
Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
٢٠٢٤
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
٢٠٢٢
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
٢٠٢٢
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
٢٠٢١
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
٢٠١٩
Modeling and Simulation of Invasive Applications and Architectures Modeling and Simulation of Invasive Applications and Architectures
٢٠١٩