語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers/ by Mustafa Khairallah.
作者:
Khairallah, Mustafa.
面頁冊數:
XVIII, 192 p. 137 illus., 110 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Security Science and Technology. -
電子資源:
https://doi.org/10.1007/978-981-16-6344-4
ISBN:
9789811663444
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Khairallah, Mustafa.
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
[electronic resource] /by Mustafa Khairallah. - 1st ed. 2022. - XVIII, 192 p. 137 illus., 110 illus. in color.online resource. - Computer Architecture and Design Methodologies,2367-3486. - Computer Architecture and Design Methodologies,.
Introduction -- Arguments for Tweakable Block Cipher-Based Cryptorgaphy -- State of the Art of TBC-based Authenticated Encryption -- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals -- Romulus: Lightweight TBC-Based Authenticated Encryption -- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus -- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR -- Multi-key AEAD Security using TBCs -- Conclusions.
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
ISBN: 9789811663444
Standard No.: 10.1007/978-981-16-6344-4doiSubjects--Topical Terms:
783419
Security Science and Technology.
LC Class. No.: TK7867-7867.5
Dewey Class. No.: 621.3815
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
LDR
:02906nam a22004095i 4500
001
1090759
003
DE-He213
005
20220426073045.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811663444
$9
978-981-16-6344-4
024
7
$a
10.1007/978-981-16-6344-4
$2
doi
035
$a
978-981-16-6344-4
050
4
$a
TK7867-7867.5
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
100
1
$a
Khairallah, Mustafa.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1398255
245
1 0
$a
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
$h
[electronic resource] /
$c
by Mustafa Khairallah.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XVIII, 192 p. 137 illus., 110 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computer Architecture and Design Methodologies,
$x
2367-3486
505
0
$a
Introduction -- Arguments for Tweakable Block Cipher-Based Cryptorgaphy -- State of the Art of TBC-based Authenticated Encryption -- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals -- Romulus: Lightweight TBC-Based Authenticated Encryption -- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus -- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR -- Multi-key AEAD Security using TBCs -- Conclusions.
520
$a
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Data and Information Security.
$3
1365785
650
1 4
$a
Electronic Circuits and Systems.
$3
1366689
650
0
$a
Security systems.
$3
716291
650
0
$a
Data protection.
$3
557764
650
0
$a
Electronic circuits.
$3
563332
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811663437
776
0 8
$i
Printed edition:
$z
9789811663451
776
0 8
$i
Printed edition:
$z
9789811663468
830
0
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
$3
1269988
856
4 0
$u
https://doi.org/10.1007/978-981-16-6344-4
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入