𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security of Block Ciphers: From Algorithm Design to Hardware Implementation

✍ Scribed by Kazuo Sakiyama, Yu Sasaki, Yang Li


Publisher
Wiley
Year
2015
Tongue
English
Leaves
312
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis

  • Written by authors known within the academic cryptography community, this book presents the latest developments in current research
  • Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation – covers security from start to completion
  • Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis

✦ Subjects


Internet Groupware Telecommunications Networking Cloud Computing Computers Technology Security Encryption Cryptography Hacking Network Privacy Online Safety Certifications Viruses Sensors Antennas Microwaves Networks Radar Radio Remote Sensing GIS Satellite Signal Processing Telephone Systems Television Video Engineering Transportation Computer Science Algorithms Artificial Intelligence Database Storage Design Graphics Visualization Object Oriented Software Operating Programming Languages New Us


πŸ“œ SIMILAR VOLUMES


From Algorithms to Hardware Architecture
✍ Karim Abbas πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>This book uses digital radios as a challenging design example, generalized to bridge a typical gap between designers who work on algorithms and those who work to implement those algorithms on silicon. The author shows how such a complex system can be moved from high-level characterization to a

Evolvable Components: From Theory to Har
✍ LukΓ‘Ε‘ Sekanina (auth.) πŸ“‚ Library πŸ“… 2004 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>At the beginning of the 1990s research started in how to combine soft computΒ­ ing with reconfigurable hardware in a quite unique way. One of the methods that was developed has been called evolvable hardware. Thanks to evolutionΒ­ ary algorithms researchers have started to evolve electronic circuit

Computer Arithmetic: Algorithms and Hard
✍ Mircea VlΔƒduΕ£iu (auth.) πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>The subject of this book is the analysis and design of digital devices that implement computer arithmetic. The book's presentation of high-level detail, descriptions, formalisms and design principles means that it can support many research activities in this field, with an emphasis on bridging

Computer Arithmetic: Algorithms and Hard
✍ Mircea VlΔƒduΕ£iu (auth.) πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>The subject of this book is the analysis and design of digital devices that implement computer arithmetic. The book's presentation of high-level detail, descriptions, formalisms and design principles means that it can support many research activities in this field, with an emphasis on bridging

Computer Arithmetic: Algorithms and Hard
✍ Mircea Vladutiu πŸ“‚ Library πŸ“… 2012 πŸ› Springer 🌐 English

<p>The subject of this book is the analysis and design of digital devices that implement computer arithmetic. The book's presentation of high-level detail, descriptions, formalisms and design principles means that it can support many research activities in this field, with an emphasis on bridging th

Evolutionary Robotics: From Algorithms t
✍ Lingfeng Wang, Kay Chen Tan, Chee Meng Chew πŸ“‚ Library πŸ“… 2006 πŸ› World Scientific Publishing Company 🌐 English

This invaluable book comprehensively describes evolutionary robotics and computational intelligence, and how different computational intelligence techniques are applied to robotic system design. It embraces the most widely used evolutionary approaches with their merits and drawbacks, presents some r