Security of Block Ciphers:From Algorithm Design to Hardware Implementation(Wiley - IEEE)

分组密码安全:从算法设计到硬件实现

电子技术

售   价:
883.00
发货周期:预计3-5周发货
作      者
出  版 社
出版时间
2015年08月06日
装      帧
精装
ISBN
9781118660010
复制
页      码
312
开      本
168.3x244.5mm
语      种
英文
综合评分
暂无评分
我 要 买
- +
库存 50 本
  • 图书详情
  • 目次
  • 买家须知
  • 书评(0)
  • 权威书评(0)
图书简介
Information security has seen rapid developments in recent years, mainly due to the contribution of a number of analysing techniques, such as cryptanalysis and side-channel analysis. These analysis methods are based on discreet mathematics, Boolean algebra, computational complexity, digital circuit design, statistics, and so on. Fault tolerant and dependable computing is also tightly related to the subject.  This book covers the topic of analysis, design and implementation of symmetric-key algorithms. The authors present the basics of symmetric-key cipher design, the analysis of their weaknesses from an algorithmic perspective, the implementation of symmetric-key ciphers in hardware, and an analysis of their weaknesses from an implementation perspective. The authors present their material in a logical and well-structured style, starting with the two basic topics of cryptography and digital circuit design, continuing with hardware implementations of the standard block cipher AES and cryptanalysis techniques for symmetric key ciphers, and onto side-channel and fault attacks, advanced analysis techniques and countermeasures. It is essential reading for security engineers wishing to learn how to evaluate the security of symmetric-key ciphers. The reader will be able to acquire knowledge of basic cryptanalysis and side-channel analysis topics.  The level of the material moves from introductory through to challenging, and so discreet mathematics, Boolean algebra, etc., are a prerequisite for study. Topics covered include: Side-Channel Analysis/Advanced Encryption Standard/Correlation Power Analysis/Differential Power Analysis/Electromagnetic Analysis/Correlation Electromagnetic Analysis/Fault Attack/Differential Cryptanalysis/Linear Cryptanalysis/Integral Attack/Meet-in-the-Middle Attack/Impossible Differential Attack/Rebound Attack
本书暂无推荐
本书暂无推荐
看了又看
  • 上一个
  • 下一个