語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cryptography and embedded systems se...
~
Hou, Xiaolu.
FindBook
Google Book
Amazon
博客來
Cryptography and embedded systems security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cryptography and embedded systems security/ by Xiaolu Hou, Jakub Breier.
作者:
Hou, Xiaolu.
其他作者:
Breier, Jakub.
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xxxvii, 489 p. :ill., digital ;24 cm.
內容註:
Chapter 1. Mathematical and Statistical Background -- Chapter 2. Introduction to Cryptography -- Chapter 3. Modern Cryptographic Algorithms and their Implementations -- Chapter 4. Side-Channel Analysis Attacks and Countermeasures -- Chapter 5. Fault Attacks and Countermeasures -- Chapter 6. Practical Aspects of Physical Attacks.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-031-62205-2
ISBN:
9783031622052
Cryptography and embedded systems security
Hou, Xiaolu.
Cryptography and embedded systems security
[electronic resource] /by Xiaolu Hou, Jakub Breier. - Cham :Springer Nature Switzerland :2024. - xxxvii, 489 p. :ill., digital ;24 cm.
Chapter 1. Mathematical and Statistical Background -- Chapter 2. Introduction to Cryptography -- Chapter 3. Modern Cryptographic Algorithms and their Implementations -- Chapter 4. Side-Channel Analysis Attacks and Countermeasures -- Chapter 5. Fault Attacks and Countermeasures -- Chapter 6. Practical Aspects of Physical Attacks.
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security - side-channel attacks, and fault injection attacks, together with the protection methods used against both. Starts from the basics and does not require prior knowledge of cryptography or mathematical background Enables readers to implement symmetric block ciphers and RSA with an emphasis on hardware security Covers the classical as well as state-of-the-art fault attacks and side-channel attacks.
ISBN: 9783031622052
Standard No.: 10.1007/978-3-031-62205-2doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / H68 2024
Dewey Class. No.: 005.8
Cryptography and embedded systems security
LDR
:02287nmm a22003375a 4500
001
2388210
003
DE-He213
005
20240808124740.0
006
m d
007
cr nn 008maaau
008
250916s2024 sz s 0 eng d
020
$a
9783031622052
$q
(electronic bk.)
020
$a
9783031622045
$q
(paper)
024
7
$a
10.1007/978-3-031-62205-2
$2
doi
035
$a
978-3-031-62205-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
H68 2024
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
H835 2024
100
1
$a
Hou, Xiaolu.
$3
3386655
245
1 0
$a
Cryptography and embedded systems security
$h
[electronic resource] /
$c
by Xiaolu Hou, Jakub Breier.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xxxvii, 489 p. :
$b
ill., digital ;
$c
24 cm.
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. Mathematical and Statistical Background -- Chapter 2. Introduction to Cryptography -- Chapter 3. Modern Cryptographic Algorithms and their Implementations -- Chapter 4. Side-Channel Analysis Attacks and Countermeasures -- Chapter 5. Fault Attacks and Countermeasures -- Chapter 6. Practical Aspects of Physical Attacks.
520
$a
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices to provide confidentiality, integrity, and authenticity of the messages/data. Finally, it provides theoretical and practical details on the two most common attack methods in hardware security - side-channel attacks, and fault injection attacks, together with the protection methods used against both. Starts from the basics and does not require prior knowledge of cryptography or mathematical background Enables readers to implement symmetric block ciphers and RSA with an emphasis on hardware security Covers the classical as well as state-of-the-art fault attacks and side-channel attacks.
650
0
$a
Computer security.
$3
540555
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Electronic Circuits and Systems.
$3
3538814
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Embedded Systems.
$3
3592715
650
2 4
$a
Cyber-Physical Systems.
$3
3591993
700
1
$a
Breier, Jakub.
$3
3386654
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-62205-2
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9498974
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 H68 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入