Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptography and embedded systems se...
~
Hou, Xiaolu.
Linked to FindBook
Google Book
Amazon
博客來
Cryptography and embedded systems security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cryptography and embedded systems security/ by Xiaolu Hou, Jakub Breier.
Author:
Hou, Xiaolu.
other author:
Breier, Jakub.
Published:
Cham :Springer Nature Switzerland : : 2024.,
Description:
xxxvii, 489 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1. Mathematical and Statistical Background -- Chapter 2. Introduction to Cryptography -- Chapter 3. Modern Cryptographic Algorithms and their Implementations -- Chapter 4. Side-Channel Analysis Attacks and Countermeasures -- Chapter 5. Fault Attacks and Countermeasures -- Chapter 6. Practical Aspects of Physical Attacks.
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-031-62205-2
ISBN:
9783031622052
Cryptography and embedded systems security
Hou, Xiaolu.
Cryptography and embedded systems security
[electronic resource] /by Xiaolu Hou, Jakub Breier. - Cham :Springer Nature Switzerland :2024. - xxxvii, 489 p. :ill., digital ;24 cm.
Chapter 1. Mathematical and Statistical Background -- Chapter 2. Introduction to Cryptography -- Chapter 3. Modern Cryptographic Algorithms and their Implementations -- Chapter 4. Side-Channel Analysis Attacks and Countermeasures -- Chapter 5. Fault Attacks and Countermeasures -- Chapter 6. Practical Aspects of Physical Attacks.
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security - side-channel attacks, and fault injection attacks, together with the protection methods used against both. Starts from the basics and does not require prior knowledge of cryptography or mathematical background Enables readers to implement symmetric block ciphers and RSA with an emphasis on hardware security Covers the classical as well as state-of-the-art fault attacks and side-channel attacks.
ISBN: 9783031622052
Standard No.: 10.1007/978-3-031-62205-2doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / H68 2024
Dewey Class. No.: 005.8
Cryptography and embedded systems security
LDR
:02287nmm a22003375a 4500
001
2388210
003
DE-He213
005
20240808124740.0
006
m d
007
cr nn 008maaau
008
250916s2024 sz s 0 eng d
020
$a
9783031622052
$q
(electronic bk.)
020
$a
9783031622045
$q
(paper)
024
7
$a
10.1007/978-3-031-62205-2
$2
doi
035
$a
978-3-031-62205-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
H68 2024
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
H835 2024
100
1
$a
Hou, Xiaolu.
$3
3386655
245
1 0
$a
Cryptography and embedded systems security
$h
[electronic resource] /
$c
by Xiaolu Hou, Jakub Breier.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xxxvii, 489 p. :
$b
ill., digital ;
$c
24 cm.
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. Mathematical and Statistical Background -- Chapter 2. Introduction to Cryptography -- Chapter 3. Modern Cryptographic Algorithms and their Implementations -- Chapter 4. Side-Channel Analysis Attacks and Countermeasures -- Chapter 5. Fault Attacks and Countermeasures -- Chapter 6. Practical Aspects of Physical Attacks.
520
$a
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security - side-channel attacks, and fault injection attacks, together with the protection methods used against both. Starts from the basics and does not require prior knowledge of cryptography or mathematical background Enables readers to implement symmetric block ciphers and RSA with an emphasis on hardware security Covers the classical as well as state-of-the-art fault attacks and side-channel attacks.
650
0
$a
Computer security.
$3
540555
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Electronic Circuits and Systems.
$3
3538814
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Embedded Systems.
$3
3592715
650
2 4
$a
Cyber-Physical Systems.
$3
3591993
700
1
$a
Breier, Jakub.
$3
3386654
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-62205-2
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9498974
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 H68 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login