Classical and Physical Security of Symmetric Key Cryptographic Algorithms [E-Book] / by Anubhab Baksi.
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular,...
Saved in:
Full text |
|
Personal Name(s): | Baksi, Anubhab, author |
Edition: |
1st edition 2022. |
Imprint: |
Singapore :
Springer,
2022
|
Physical Description: |
XII, 288 pages 89 illustrations, 78 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9789811665226 |
DOI: |
10.1007/978-981-16-6522-6 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Computer Architecture and Design Methodologies
|
Subject (LOC): |
LEADER | 02913nam a22003975i 4500 | ||
---|---|---|---|
001 | 978-981-16-6522-6 | ||
003 | Springer | ||
008 | 211217s2022 si | s |||| 0|eng d | ||
020 | |a 9789811665226 | ||
024 | 7 | |a 10.1007/978-981-16-6522-6 |2 doi | |
035 | |a (Sirsi) a879109 | ||
041 | |a eng | ||
082 | 0 | 4 | |a 621.3815 |2 23 |
100 | 1 | |a Baksi, Anubhab, |e author | |
245 | 1 | 0 | |a Classical and Physical Security of Symmetric Key Cryptographic Algorithms |h [E-Book] / |c by Anubhab Baksi. |
250 | |a 1st edition 2022. | ||
264 | 1 | |a Singapore : |b Springer, |c 2022 |e (Springer LINK) |f SpringerEngineering20240423 | |
300 | |a XII, 288 pages 89 illustrations, 78 illustrations in color (online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | |a Computer Architecture and Design Methodologies | ||
500 | |a englisch | ||
505 | 0 | |a Introduction -- Fundamentals of Symmetric Key Cryptography -- Fault Attack -- Side Channel Attack -- New Insights on Differential and Linear Bounds using Mixed Integer Linear Programming -- Machine Learning Assisted Differential Distinguishers for Lightweight Ci-phers -- Differential Paradox: How an SBox Plays against Differential Fault Analysis -- DeFault: Cipher Level Resistance against Differential Fault Attack -- To Infect or Not to Infect: A Critical Analysis of Infective Countermeasures in Fault Attacks -- A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis -- Concluding Remarks. | |
520 | |a This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse-it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography. . | ||
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Electronic circuits. | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-16-6522-6 |z Volltext |
915 | |a zzwFZJ3 | ||
932 | |a Engineering (R0) (SpringerNature-43712) | ||
932 | |a Engineering (SpringerNature-11647) | ||
596 | |a 1 | ||
949 | |a XX(879109.1) |w AUTO |c 1 |i 879109-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 23/4/2024 |x ZB-T |z UNKNOWN |0 NEL |1 ONLINE |