Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Computer Architecture and Design Methodologies

Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers

    • $129.99
    • $129.99

Publisher Description

This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.

GENRE
Professional & Technical
RELEASED
2021
November 17
LANGUAGE
EN
English
LENGTH
210
Pages
PUBLISHER
Springer Nature Singapore
SELLER
Springer Nature B.V.
SIZE
28.5
MB

More Books Like This

Other Books in This Series

Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
2024
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
2022
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
2022
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
2022
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
2019
Modeling and Simulation of Invasive Applications and Architectures Modeling and Simulation of Invasive Applications and Architectures
2019