Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers/ by Mustafa Khairallah.
Author:
Khairallah, Mustafa.
Description:
XVIII, 192 p. 137 illus., 110 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Electronic circuits. -
Online resource:
https://doi.org/10.1007/978-981-16-6344-4
ISBN:
9789811663444
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Khairallah, Mustafa.
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
[electronic resource] /by Mustafa Khairallah. - 1st ed. 2022. - XVIII, 192 p. 137 illus., 110 illus. in color.online resource. - Computer Architecture and Design Methodologies,2367-3486. - Computer Architecture and Design Methodologies,.
Introduction -- Arguments for Tweakable Block Cipher-Based Cryptorgaphy -- State of the Art of TBC-based Authenticated Encryption -- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals -- Romulus: Lightweight TBC-Based Authenticated Encryption -- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus -- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR -- Multi-key AEAD Security using TBCs -- Conclusions.
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
ISBN: 9789811663444
Standard No.: 10.1007/978-981-16-6344-4doiSubjects--Topical Terms:
563332
Electronic circuits.
LC Class. No.: TK7867-7867.5
Dewey Class. No.: 621.3815
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
LDR
:02906nam a22004095i 4500
001
1090759
003
DE-He213
005
20220426073045.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811663444
$9
978-981-16-6344-4
024
7
$a
10.1007/978-981-16-6344-4
$2
doi
035
$a
978-981-16-6344-4
050
4
$a
TK7867-7867.5
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
100
1
$a
Khairallah, Mustafa.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1398255
245
1 0
$a
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
$h
[electronic resource] /
$c
by Mustafa Khairallah.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XVIII, 192 p. 137 illus., 110 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computer Architecture and Design Methodologies,
$x
2367-3486
505
0
$a
Introduction -- Arguments for Tweakable Block Cipher-Based Cryptorgaphy -- State of the Art of TBC-based Authenticated Encryption -- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals -- Romulus: Lightweight TBC-Based Authenticated Encryption -- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus -- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR -- Multi-key AEAD Security using TBCs -- Conclusions.
520
$a
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
650
0
$a
Electronic circuits.
$3
563332
650
0
$a
Data protection.
$3
557764
650
0
$a
Security systems.
$3
716291
650
1 4
$a
Electronic Circuits and Systems.
$3
1366689
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Security Science and Technology.
$3
783419
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811663437
776
0 8
$i
Printed edition:
$z
9789811663451
776
0 8
$i
Printed edition:
$z
9789811663468
830
0
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
$3
1269988
856
4 0
$u
https://doi.org/10.1007/978-981-16-6344-4
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login