Login

Li, Yang

Security of Block Ciphers: From Algorithm Design to Hardware Implementation

Li, Yang - Security of Block Ciphers: From Algorithm Design to Hardware Implementation, ebook

116,30€

Ebook, ePUB with Adobe DRM
ISBN: 9781118660041
DRM Restrictions

Printing96 pages with an additional page accrued every 8 hours, capped at 96 pages
Copy to clipboard5 excerpts

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis

•Written by authors known within the academic cryptography community, this book presents the latest developments in current research
•Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation – covers security from start to completion
•Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis

Keywords:

Information security, cryptanalysis, side-channel analysis, discreet mathematics, Boolean algebra, computational complexity, digital circuit design, statistics, Fault tolerant and dependable computing, symmetric-key algorithms, cryptography, digital circuit design, standard block cipher AES, Advanced Encryption Standard, Correlation Power Analysis, Differential Power Analysis, Electromagnetic Analysis, Correlation Electromagnetic Analysis, Fault Attack, Differential Cryptanalysis, Linear Cryptanalysis, Integral Attack, Meet-in-the-Middle Attack, Impossible Differential Attack, Rebound Attack

,

Information security, cryptanalysis, side-channel analysis, discreet mathematics, Boolean algebra, computational complexity, digital circuit design, statistics, Fault tolerant and dependable computing, symmetric-key algorithms, cryptography, digital circuit design, standard block cipher AES, Advanced Encryption Standard, Correlation Power Analysis, Differential Power Analysis, Electromagnetic Analysis, Correlation Electromagnetic Analysis, Fault Attack, Differential Cryptanalysis, Linear Cryptanalysis, Integral Attack, Meet-in-the-Middle Attack, Impossible Differential Attack, Rebound Attack

, Communication System Security
Author(s)
 
 
Publisher
John Wiley and Sons, Inc.
Publication year
2015
Language
en
Edition
1
Page amount
320 pages
Category
Information Technology, Telecommunications
Format
Ebook
eISBN (ePUB)
9781118660041
Printed ISBN
9781118660010

Similar titles