0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Hardware Security - Design, Threats, and Safeguards (Hardcover): Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Hardware Security - Design, Threats, and Safeguards (Hardcover)
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
R4,047 Discovery Miles 40 470 Ships in 12 - 17 working days

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC)."

Gain a Comprehensive Understanding of Hardware Security from Fundamentals to Practical Applications"

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards

  • Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
  • Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
  • Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention
"

Design for Security and Meet Real-Time Requirements"

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards."

Fault Tolerant Architectures for Cryptography and Hardware Security (Paperback, Softcover reprint of the original 1st ed.... Fault Tolerant Architectures for Cryptography and Hardware Security (Paperback, Softcover reprint of the original 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R4,230 Discovery Miles 42 300 Ships in 10 - 15 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R4,250 Discovery Miles 42 500 Ships in 10 - 15 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed.... Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed. 2015)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,434 Discovery Miles 34 340 Ships in 10 - 15 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Timing Channels in Cryptography - A Micro-Architectural Perspective (Hardcover, 2015 ed.): Chester Rebeiro, Debdeep... Timing Channels in Cryptography - A Micro-Architectural Perspective (Hardcover, 2015 ed.)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,678 Discovery Miles 36 780 Ships in 10 - 15 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Progress in Cryptology -- INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December... Progress in Cryptology -- INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings (Paperback, 2014 ed.)
Willi Meier, Debdeep Mukhopadhyay
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.

Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October... Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings (Paperback, 2013 ed.)
Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay
R1,429 Discovery Miles 14 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Bug-A-Salt 3.0 Black Fly
 (1)
R999 Discovery Miles 9 990
Dromex 3-Ply Medical Mask (Box of 50)
 (17)
R1,099 R399 Discovery Miles 3 990
Bostik Glu Dots - Extra Strength (64…
R55 Discovery Miles 550
Magneto Head Light
R99 R84 Discovery Miles 840
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners