000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250601b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783031622045 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
HOU |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Hou, Xiaolu |
245 ## - TITLE STATEMENT |
Title |
Cryptography and embedded systems security |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
2024 |
Place of publication, distribution, etc |
Cham : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxvii, 489 p. ; |
Other physical details |
ill. (some col.), |
Dimensions |
24 cm |
365 ## - TRADE PRICE |
Price amount |
99.99 |
Price type code |
€ |
Unit of pricing |
100.40 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security side-channel attacks, and fault injection attacks, together with the protection methods used against both. Starts from the basics and does not require prior knowledge of cryptography or mathematical background Enables readers to implement symmetric block ciphers and RSA with an emphasis on hardware security Covers the classical as well as state-o\f-the-art fault attacks and side-channel attacks |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Security |
|
Topical term or geographic name as entry element |
Algebraic normal form |
|
Topical term or geographic name as entry element |
Block ciphers |
|
Topical term or geographic name as entry element |
Ciphertext |
|
Topical term or geographic name as entry element |
Embedded Systems |
|
Topical term or geographic name as entry element |
Euclidean algorithm |
|
Topical term or geographic name as entry element |
Fault injection |
|
Topical term or geographic name as entry element |
Hamming weight |
|
Topical term or geographic name as entry element |
Vigenère cipher |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Breier, Jakub |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |