## Cryptographic EngineeringCetin Kaya Koc Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors’ lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry. This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems. Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book. |

### What people are saying - Write a review

### Contents

1 | |

5 | |

Evaluation Criteria for Physical Random Number Generators | 25 |

True Random Number Generators for Cryptography | 55 |

Fast Finite Field Multiplication | 74 |

Efficient Unified Arithmetic for Hardware Cryptography | 105 |

Spectral Modular Arithmetic for Cryptography | 125 |

Elliptic and Hyperelliptic Curve Cryptography | 171 |

Block Cipher Modes of Operation from a Hardware Implementation Perspective | 321 |

Basics of SideChannel Analysis | 365 |

Improved Techniques for SideChannel Analysis | 381 |

Electromagnetic Attacks and Countermeasures | 407 |

Leakage from Montgomery Multiplication | 431 |

Randomized Exponentiation Algorithms | 451 |

Microarchitectural Attacks and Countermeasures | 475 |

Authors Biographies | 505 |