This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security – side-channel attacks, and fault injection attacks, together with the protection methods used against both.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Xiaolu Hou is currently an Assistant Professor at the Faculty of Informatics and Information Technologies, Slovak University of Technology, Slovakia. She received her Ph.D. degree in mathematics from Nanyang Technological University (NTU), Singapore, in 2017. Her research focus is on hardware security of both cryptographic and AI implementations. She designs and develops novel attacks and protection techniques on protocol, hardware and software levels.
Jakub Breier is currently a Senior Cyber Security Manager at TTControl, Vienna, Austria.. Before that, he worked at Silicon Austria Labs, Graz on deep learning security, Nanyang Technological University, Singapore on hardware security and at Underwriters Laboratories, Singapore on security evaluation of embedded devices. He received his Ph.D. in Applied Informatics from Slovak University of Technology (STU), Slovakia in 2013.
His research topics include fault and side-channel analysis methods and countermeasures, advanced fault injection techniques, design of cryptographic primitives, and deep learning security.
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security – side-channel attacks, and fault injection attacks, together with the protection methods used against both.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Books From California, Simi Valley, CA, USA
hardcover. Zustand: Good. Bestandsnummer des Verkäufers mon0003781710
Anzahl: 1 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New. Bestandsnummer des Verkäufers 48203787-n
Anzahl: Mehr als 20 verfügbar
Anbieter: Grand Eagle Retail, Bensenville, IL, USA
Hardcover. Zustand: new. Hardcover. This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security side-channel attacks, and fault injection attacks, together with the protection methods used against both. This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security side-channel attacks, and fault injection attacks, together with the protection methods used against both. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9783031622045
Anbieter: California Books, Miami, FL, USA
Zustand: New. Bestandsnummer des Verkäufers I-9783031622045
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 48203787
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9783031622045_new
Anzahl: Mehr als 20 verfügbar
Anbieter: GoldBooks, Denver, CO, USA
Zustand: new. Bestandsnummer des Verkäufers 5W77_57_3031622049
Anzahl: 1 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: New. Bestandsnummer des Verkäufers 48203787-n
Anzahl: 1 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Buch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security - side-channel attacks, and fault injection attacks, together with the protection methods used against both. 489 pp. Englisch. Bestandsnummer des Verkäufers 9783031622045
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Gebunden. Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces. Bestandsnummer des Verkäufers 1602275994
Anzahl: Mehr als 20 verfügbar