Cryptographic Engineering

Front Cover
Cetin Kaya Koc
Springer Science & Business Media, Dec 11, 2008 - Technology & Engineering - 522 pages
0 Reviews

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors’ lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.

This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.

Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

About Cryptographic Engineering
1
Random Number Generators for Cryptographic Applications
5
Evaluation Criteria for Physical Random Number Generators
25
True Random Number Generators for Cryptography
55
Fast Finite Field Multiplication
74
Efficient Unified Arithmetic for Hardware Cryptography
105
Spectral Modular Arithmetic for Cryptography
125
Elliptic and Hyperelliptic Curve Cryptography
171
Block Cipher Modes of Operation from a Hardware Implementation Perspective
321
Basics of SideChannel Analysis
365
Improved Techniques for SideChannel Analysis
381
Electromagnetic Attacks and Countermeasures
407
Leakage from Montgomery Multiplication
431
Randomized Exponentiation Algorithms
451
Microarchitectural Attacks and Countermeasures
475
Authors Biographies
505

Instruction Set Extensions for Cryptographic Applications
190
FPGA and ASIC Implementations of AES
235
Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs
295

Other editions - View all

Common terms and phrases