語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
到查詢結果
[ author_sort:"khairallah, mustafa." ]
切換:
標籤
|
MARC模式
|
ISBD
Hardware oriented authenticated encryption based on tweakable block ciphers
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hardware oriented authenticated encryption based on tweakable block ciphersby Mustafa Khairallah.
作者:
Khairallah, Mustafa.
出版者:
Singapore :Springer Singapore :2022.
面頁冊數:
xviii, 192 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Data encryption (Computer science)
電子資源:
https://doi.org/10.1007/978-981-16-6344-4
ISBN:
9789811663444$q(electronic bk.)
Hardware oriented authenticated encryption based on tweakable block ciphers
Khairallah, Mustafa.
Hardware oriented authenticated encryption based on tweakable block ciphers
[electronic resource] /by Mustafa Khairallah. - Singapore :Springer Singapore :2022. - xviii, 192 p. :ill. (some col.), digital ;24 cm. - Computer architecture and design methodologies,2367-3486. - Computer architecture and design methodologies..
Introduction -- Arguments for Tweakable Block Cipher-Based Cryptorgaphy -- State of the Art of TBC-based Authenticated Encryption -- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals -- Romulus: Lightweight TBC-Based Authenticated Encryption -- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus -- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR -- Multi-key AEAD Security using TBCs -- Conclusions.
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
ISBN: 9789811663444$q(electronic bk.)
Standard No.: 10.1007/978-981-16-6344-4doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25 / K43 2022
Dewey Class. No.: 005.824
Hardware oriented authenticated encryption based on tweakable block ciphers
LDR
:02558nmm a2200337 a 4500
001
618007
003
DE-He213
005
20211117002137.0
006
m d
007
cr nn 008maaau
008
221025s2022 si s 0 eng d
020
$a
9789811663444$q(electronic bk.)
020
$a
9789811663437$q(paper)
024
7
$a
10.1007/978-981-16-6344-4
$2
doi
035
$a
978-981-16-6344-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
K43 2022
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
K45 2022
100
1
$a
Khairallah, Mustafa.
$3
917620
245
1 0
$a
Hardware oriented authenticated encryption based on tweakable block ciphers
$h
[electronic resource] /
$c
by Mustafa Khairallah.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
xviii, 192 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Computer architecture and design methodologies,
$x
2367-3486
505
0
$a
Introduction -- Arguments for Tweakable Block Cipher-Based Cryptorgaphy -- State of the Art of TBC-based Authenticated Encryption -- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals -- Romulus: Lightweight TBC-Based Authenticated Encryption -- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus -- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR -- Multi-key AEAD Security using TBCs -- Conclusions.
520
$a
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.
650
0
$a
Data encryption (Computer science)
$3
184520
650
1 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Security Science and Technology.
$3
510148
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Computer architecture and design methodologies.
$3
753537
856
4 0
$u
https://doi.org/10.1007/978-981-16-6344-4
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000209146
電子館藏
1圖書
電子書
EB QA76.9.A25 K45 2022 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-16-6344-4
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入