2009

Cryptographic Engineering

Editors:

ISBN: 978-0-387-71816-3 (Print) 978-0-387-71817-0 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages i-xxii

  2. No Access

    Book Chapter

    Pages 1-4

    About Cryptographic Engineering

  3. No Access

    Book Chapter

    Pages 5-23

    Random Number Generators for Cryptographic Applications

  4. No Access

    Book Chapter

    Pages 25-54

    Evaluation Criteria for Physical Random Number Generators

  5. No Access

    Book Chapter

    Pages 55-73

    True Random Number Generators for Cryptography

  6. No Access

    Book Chapter

    Pages 75-104

    Fast Finite Field Multiplication

  7. No Access

    Book Chapter

    Pages 105-124

    Efficient Unified Arithmetic for Hardware Cryptography

  8. No Access

    Book Chapter

    Pages 125-169

    Spectral Modular Arithmetic for Cryptography

  9. No Access

    Book Chapter

    Pages 171-189

    Elliptic and Hyperelliptic Curve Cryptography

  10. No Access

    Book Chapter

    Pages 191-233

    Instruction Set Extensions for Cryptographic Applications

  11. No Access

    Book Chapter

    Pages 235-294

    FPGA and ASIC Implementations of AES

  12. No Access

    Book Chapter

    Pages 295-320

    Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs

  13. No Access

    Book Chapter

    Pages 321-363

    Block Cipher Modes of Operation from a Hardware Implementation Perspective

  14. No Access

    Book Chapter

    Pages 365-380

    Basics of Side-Channel Analysis

  15. No Access

    Book Chapter

    Pages 381-406

    Improved Techniques for Side-Channel Analysis

  16. No Access

    Book Chapter

    Pages 407-430

    Electromagnetic Attacks and Countermeasures

  17. No Access

    Book Chapter

    Pages 431-449

    Leakage from Montgomery Multiplication

  18. No Access

    Book Chapter

    Pages 451-473

    Randomized Exponentiation Algorithms

  19. No Access

    Book Chapter

    Pages 475-504

    Microarchitectural Attacks and Countermeasures

  20. Back Matter

    Pages 505-517