Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Doxycycline: Medical Uses and Effects
$73.80
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Notifications more
NotificationsNotify me of updates to New Trends in Cryptographic Systems
Tell A Friend
 
Tell someone you know about this product.
New Trends in Cryptographic Systems
Retail Price: $260.00
10% Online Discount
You Pay:

$234.00
Editors: Nadia Nedjah and Luiza de Macedo Mourelle (State Univ. of Rio de Janeiro)
Book Description:
Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, it has expanded in two main ways: firstly, it provides mechanisms for more than just keeping secrets through schemes like digital signatures, digital cash, etc; secondly, cryptography is used by almost all computer users as it is embedded into the infrastructure for computing and telecommunications. Cryptography ensures secure communications through confidentiality, integrity, authenticity and non-repudiation.

Cryptography has evolved over the years from Julius Cesar's cipher, which simply shifts the letters of the words a fixed number of times, to the sophisticated RSA algorithm, which was invented by Ronald L. Rivest, Adi Shamir and Leonard M. Adleman, and the elegant AES cipher (Advanced Encryption Standard), which was invented by Joan Daemen and Vincent Rijmen.

The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe. Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices. Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations.

The content of this book is divided into three main parts, which are focused on new trends in cryptographic hardware, arithmetic and factoring.

Table of Contents:
Part I. Robust Cryptographic Hardware Design 4

Chapter 1. A Dual Mode Public Key Co-Processor; pp. 3-18
(Francis Crowe, Allan Daly, William Marnane)

Chapter 2. Hardware Architectures for Modular Exponentiation Using M-Ary Methods; pp. 19-32
(Nidia Nedjah, Luiza de MacedoMourelle)

Chapter 3. A Power Attack Methodology to AES Based on Induced Cache
Misses: Procedure, Evaluation and Possible Countermeasures; pp. 33-46
(G. Bertoni, L. Breveglieri, M. Monchiero, G. Palermo, V. Zaccaria)


Part II. Efficient Arithmetic for Cryptographic Systems 53

Chapter 4. Quadrinomial Modular Arithmetic using Modified Polynomial Basis; pp. 49-60
(Christophe Negre)

Chapter 5. Applications of The Montgomery Exponent; pp. 61-71
(Shay Gueron, Or Zuk)

Chapter 6. Fast Radix-2 Montgomery Modular Multiplication Algorithm for RSA Implementations; pp. 73-84
(Kooroush Manochehri, Saadat Pourmozafari)

Chapter 7. Improvement of Inversion-Free Group Operations for Genus 3 Hyperelliptic; Curve Cryptosystems; pp. 85-99
(Xinxin Fan, Thomas Wollinger, Yumin Wang)


Part III. Efficient Factoring for Cryptographic Systems 107


Chapter 8. Fault-Tolerance in Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization; pp. 103-115
(Willi Geisselmann, Kopfer, Shamir, Steinwantd, and Tromer)

Chapter 9. Verifiable Threshold Sharing of a Large Secret Safe-Prime; pp. 117-128
(Maged Hamada Ibrahim)

Bibliography

Reviewer List

Index

   Series:
      Intelligent Systems Engineering Book Series - Nadia Nedjah and Luiza de Macedo Mourelle (State Univ. of Rio de Janeiro) - Series Editors
   Binding: Hardcover
   Pub. Date: 2006
   ISBN: 1-59454-977-X
   Status: AV
  
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
  
Special Focus Titles
01.Violent Communication and Bullying in Early Childhood Education
02.Cultural Considerations in Intervention with Women and Children Exposed to Intimate Partner Violence
03.Chronic Disease and Disability: The Pediatric Lung
04.Fruit and Vegetable Consumption and Health: New Research
05.Fire and the Sword: Understanding the Impact and Challenge of Organized Islamism. Volume 2

Nova Science Publishers
© Copyright 2004 - 2021

New Trends in Cryptographic Systems