Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers: Computer Architecture and Design Methodologies
Autor Mustafa Khairallahen Limba Engleză Paperback – 18 noi 2022
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 890.83 lei 6-8 săpt. | |
Springer Nature Singapore – 18 noi 2022 | 890.83 lei 6-8 săpt. | |
Hardback (1) | 896.50 lei 3-5 săpt. | |
Springer Nature Singapore – 17 noi 2021 | 896.50 lei 3-5 săpt. |
Preț: 890.83 lei
Preț vechi: 1086.38 lei
-18% Nou
Puncte Express: 1336
Preț estimativ în valută:
170.52€ • 183.34$ • 142.15£
170.52€ • 183.34$ • 142.15£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789811663468
ISBN-10: 9811663467
Pagini: 192
Ilustrații: XVIII, 192 p. 137 illus., 110 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.3 kg
Ediția:1st ed. 2022
Editura: Springer Nature Singapore
Colecția Springer
Seria Computer Architecture and Design Methodologies
Locul publicării:Singapore, Singapore
ISBN-10: 9811663467
Pagini: 192
Ilustrații: XVIII, 192 p. 137 illus., 110 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.3 kg
Ediția:1st ed. 2022
Editura: Springer Nature Singapore
Colecția Springer
Seria Computer Architecture and Design Methodologies
Locul publicării:Singapore, Singapore
Cuprins
Introduction.- Arguments for Tweakable Block Cipher-Based Cryptorgaphy.- State of the Art of TBC-based Authenticated Encryption.- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals.- Romulus: Lightweight TBC-Based Authenticated Encryption.- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus.- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR.- Multi-key AEAD Security using TBCs.- Conclusions.
Textul de pe ultima copertă
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
Caracteristici
Presents the treatment of tweakable block cipher-based cryptographic algorithms with focus on hardware implementations Provides details of the design processes some of the tweakable block cipher-based authenticated encryption algorithms Exhibits simple language suitable for engineers and implementers without intensive cryptographic background