Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors’ lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.
This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.
Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book.
Jadual kandungan
About Cryptographic Engineering.- Random Number Generators for Cryptographic Applications.- Evaluation Criteria for Physical Random Number Generators.- True Random Number Generators for Cryptography.- Fast Finite Field Multiplication.- Efficient Unified Arithmetic for Hardware Cryptography.- Spectral Modular Arithmetic for Cryptography.- Elliptic and Hyperelliptic Curve Cryptography.- Instruction Set Extensions for Cryptographic Applications.- FPGA and ASIC Implementations of AES.- Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.- Block Cipher Modes of Operation from a Hardware Implementation Perspective.- Basics of Side-Channel Analysis.- Improved Techniques for Side-Channel Analysis.- Electromagnetic Attacks and Countermeasures.- Leakage from Montgomery Multiplication.- Randomized Exponentiation Algorithms.- Microarchitectural Attacks and Countermeasures.