Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
|
Buy Now
New Trends in Cryptographic Systems (Hardcover)
Loot Price: R4,365
Discovery Miles 43 650
You Save: R1,308
(23%)
|
|
New Trends in Cryptographic Systems (Hardcover)
Expected to ship within 12 - 17 working days
|
Cryptography is the study of methods to transform information from
its original comprehensible form into a scrambled incomprehensible
form, such that its content can only be disclosed to some qualified
persons. In the past, cryptography helped ensure secrecy in
important communications, such as those of spies, military leaders,
and diplomats. In recent decades, it has expanded in two main ways:
firstly, it provides mechanisms for more than just keeping secrets
through schemes like digital signatures, digital cash, etc;
secondly, cryptography is used by almost all computer users as it
is embedded into the infrastructure for computing and
telecommunications. Cryptography ensures secure communications
through confidentiality, integrity, authenticity and
non-repudiation. Cryptography has evolved over the years from
Julius Cesar's cipher, which simply shifts the letters of the words
a fixed number of times, to the sophisticated RSA algorithm, which
was invented by Ronald L. Rivest, Adi Shamir and Leonard M.
Adleman, and the elegant AES cipher (Advanced Encryption Standard),
which was invented by Joan Daemen and Vincent Rijmen. The need for
fast but secure cryptographic systems is growing bigger. Therefore,
dedicated hardware for cryptography is becoming a key issue for
designers. With the spread of reconfigurable hardware such as
FPGAs, embedded cryptographic hardware became cost-effective.
Nevertheless, it is worthy to note that nowadays, even hardwired
cryptographic algorithms are not safe. Attacks based on power
consumption and electromagnetic Analysis, such as SPA, DPA and EMA
have been successfully used to retrieve secret information stored
in cryptographic devices. Besides performance in terms of area and
throughput, designer of embedded cryptographic hardware must worry
about the leakage of their implementations. The content of this
book is divided into three main parts, which are focused on new
trends in cryptographic hardware, arithmetic and factoring.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.