Sisäänkirjautuminen

Li, Yang

Security of Block Ciphers: From Algorithm Design to Hardware Implementation

Li, Yang - Security of Block Ciphers: From Algorithm Design to Hardware Implementation, e-kirja

103,20€

E-kirja, ePUB, Adobe DRM-suojattu
ISBN: 9781118660041
DRM-rajoitukset

Tulostus96 sivua ja lisä sivu kertyy joka 8. tunti, ylärajana 96 sivua
Kopioi leikepöydälle5 poimintoa

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis

•Written by authors known within the academic cryptography community, this book presents the latest developments in current research
•Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation – covers security from start to completion
•Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis

Avainsanat:

Information security, cryptanalysis, side-channel analysis, discreet mathematics, Boolean algebra, computational complexity, digital circuit design, statistics, Fault tolerant and dependable computing, symmetric-key algorithms, cryptography, digital circuit design, standard block cipher AES, Advanced Encryption Standard, Correlation Power Analysis, Differential Power Analysis, Electromagnetic Analysis, Correlation Electromagnetic Analysis, Fault Attack, Differential Cryptanalysis, Linear Cryptanalysis, Integral Attack, Meet-in-the-Middle Attack, Impossible Differential Attack, Rebound Attack

,

Information security, cryptanalysis, side-channel analysis, discreet mathematics, Boolean algebra, computational complexity, digital circuit design, statistics, Fault tolerant and dependable computing, symmetric-key algorithms, cryptography, digital circuit design, standard block cipher AES, Advanced Encryption Standard, Correlation Power Analysis, Differential Power Analysis, Electromagnetic Analysis, Correlation Electromagnetic Analysis, Fault Attack, Differential Cryptanalysis, Linear Cryptanalysis, Integral Attack, Meet-in-the-Middle Attack, Impossible Differential Attack, Rebound Attack

, Communication System Security
Tekijä(t)
 
 
Julkaisija
John Wiley and Sons, Inc.
Julkaisuvuosi
2015
Kieli
en
Painos
1
Sivumäärä
320 sivua
Kategoria
Tietotekniikka, tietoliikenne
Tiedostomuoto
E-kirja
eISBN (ePUB)
9781118660041
Painetun ISBN
9781118660010

Samankaltaisia e-kirjoja