Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

New Trends in Cryptographic Systems, Hardback Book

New Trends in Cryptographic Systems Hardback

Edited by Nadia Nedjah, Luiza Macedo Mourelle

Hardback

Description

Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons.

In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats.

In recent decades, it has expanded in two main ways: firstly, it provides mechanisms for more than just keeping secrets through schemes like digital signatures, digital cash, etc; secondly, cryptography is used by almost all computer users as it is embedded into the infrastructure for computing and telecommunications.

Cryptography ensures secure communications through confidentiality, integrity, authenticity and non-repudiation.

Cryptography has evolved over the years from Julius Cesar's cipher, which simply shifts the letters of the words a fixed number of times, to the sophisticated RSA algorithm, which was invented by Ronald L.

Rivest, Adi Shamir and Leonard M. Adleman, and the elegant AES cipher (Advanced Encryption Standard), which was invented by Joan Daemen and Vincent Rijmen.

The need for fast but secure cryptographic systems is growing bigger.

Therefore, dedicated hardware for cryptography is becoming a key issue for designers.

With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective.

Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe.

Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices.

Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations.

The content of this book is divided into three main parts, which are focused on new trends in cryptographic hardware, arithmetic and factoring.

Information

Save 18%

£230.99

£189.35

 
Free Home Delivery

on all orders

 
Pick up orders

from local bookshops

Information