語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cryptography and embedded systems security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cryptography and embedded systems security/ by Xiaolu Hou, Jakub Breier.
作者:
Hou, Xiaolu.
其他作者:
Breier, Jakub.
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xxxvii, 489 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Cyber-Physical Systems. -
電子資源:
https://doi.org/10.1007/978-3-031-62205-2
ISBN:
9783031622052
Cryptography and embedded systems security
Hou, Xiaolu.
Cryptography and embedded systems security
[electronic resource] /by Xiaolu Hou, Jakub Breier. - Cham :Springer Nature Switzerland :2024. - xxxvii, 489 p. :ill., digital ;24 cm.
Chapter 1. Mathematical and Statistical Background -- Chapter 2. Introduction to Cryptography -- Chapter 3. Modern Cryptographic Algorithms and their Implementations -- Chapter 4. Side-Channel Analysis Attacks and Countermeasures -- Chapter 5. Fault Attacks and Countermeasures -- Chapter 6. Practical Aspects of Physical Attacks.
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security - side-channel attacks, and fault injection attacks, together with the protection methods used against both. Starts from the basics and does not require prior knowledge of cryptography or mathematical background Enables readers to implement symmetric block ciphers and RSA with an emphasis on hardware security Covers the classical as well as state-of-the-art fault attacks and side-channel attacks.
ISBN: 9783031622052
Standard No.: 10.1007/978-3-031-62205-2doiSubjects--Topical Terms:
1387591
Cyber-Physical Systems.
LC Class. No.: QA76.9.A25 / H68 2024
Dewey Class. No.: 005.8
Cryptography and embedded systems security
LDR
:02287nam a22003375a 4500
001
1134968
003
DE-He213
005
20240808124740.0
006
m d
007
cr nn 008maaau
008
241213s2024 sz s 0 eng d
020
$a
9783031622052
$q
(electronic bk.)
020
$a
9783031622045
$q
(paper)
024
7
$a
10.1007/978-3-031-62205-2
$2
doi
035
$a
978-3-031-62205-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
H68 2024
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
H835 2024
100
1
$a
Hou, Xiaolu.
$e
editor.
$3
1307292
245
1 0
$a
Cryptography and embedded systems security
$h
[electronic resource] /
$c
by Xiaolu Hou, Jakub Breier.
260
$a
Cham :
$c
2024.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xxxvii, 489 p. :
$b
ill., digital ;
$c
24 cm.
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. Mathematical and Statistical Background -- Chapter 2. Introduction to Cryptography -- Chapter 3. Modern Cryptographic Algorithms and their Implementations -- Chapter 4. Side-Channel Analysis Attacks and Countermeasures -- Chapter 5. Fault Attacks and Countermeasures -- Chapter 6. Practical Aspects of Physical Attacks.
520
$a
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security - side-channel attacks, and fault injection attacks, together with the protection methods used against both. Starts from the basics and does not require prior knowledge of cryptography or mathematical background Enables readers to implement symmetric block ciphers and RSA with an emphasis on hardware security Covers the classical as well as state-of-the-art fault attacks and side-channel attacks.
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
650
2 4
$a
Embedded Systems.
$3
1026431
650
2 4
$a
Cryptology.
$3
1211076
650
1 4
$a
Electronic Circuits and Systems.
$3
1366689
650
0
$a
Data encryption (Computer science)
$3
658943
650
0
$a
Computer security.
$3
557122
700
1
$a
Breier, Jakub.
$e
editor.
$3
1307291
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-62205-2
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入