Hardware oriented authenticated encryption based on tweakable block ciphers (Record no. 33049)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240319b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789811663437
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number KHA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Khairallah, Mustafa
245 ## - TITLE STATEMENT
Title Hardware oriented authenticated encryption based on tweakable block ciphers
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2022
Place of publication, distribution, etc Singapore :
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 192 p. ;
Other physical details ill.,
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount 139.99
Price type code
Unit of pricing 93.50
490 ## - SERIES STATEMENT
Series statement Computer architecture and design methodologies
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
520 ## - SUMMARY, ETC.
Summary, etc This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption
Topical term or geographic name as entry element Computer science
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2024-03-15 13089.07 005.82 KHA 034852 2024-03-19 Books

Powered by Koha