|
Showing 1 - 7 of
7 matches in All Departments
This book is devoted to efficient pairing computations and
implementations, useful tools for cryptographers working on topics
like identity-based cryptography and the simplification of existing
protocols like signature schemes. As well as exploring the basic
mathematical background of finite fields and elliptic curves, Guide
to Pairing-Based Cryptography offers an overview of the most recent
developments in optimizations for pairing implementation. Each
chapter includes a presentation of the problem it discusses, the
mathematical formulation, a discussion of implementation issues,
solutions accompanied by code or pseudocode, several numerical
results, and references to further reading and notes. Intended as a
self-contained handbook, this book is an invaluable resource for
computer scientists, applied mathematicians and security
professionals interested in cryptography.
In the 1970s researchers noticed that radioactive particles
produced by elements naturally present in packaging material could
cause bits to flip in sensitive areas of electronic chips. Research
into the effect of cosmic rays on semiconductors, an area of
particular interest in the aerospace industry, led to methods of
hardening electronic devices designed for harsh environments.
Ultimately various mechanisms for fault creation and propagation
were discovered, and in particular it was noted that many
cryptographic algorithms succumb to so-called fault attacks.
Preventing fault attacks without sacrificing performance is
nontrivial and this is the subject of this book. Part I deals with
side-channel analysis and its relevance to fault attacks. The
chapters in Part II cover fault analysis in secret key
cryptography, with chapters on block ciphers, fault analysis of DES
and AES, countermeasures for symmetric-key ciphers, and
countermeasures against attacks on AES. Part III deals with fault
analysis in public key cryptography, with chapters dedicated to
classical RSA and RSA-CRT implementations, elliptic curve
cryptosystems and countermeasures using fault detection, devices
resilient to fault injection attacks, lattice-based fault attacks
on signatures, and fault attacks on pairing-based cryptography.
Part IV examines fault attacks on stream ciphers and how faults
interact with countermeasures used to prevent power analysis
attacks. Finally, Part V contains chapters that explain how fault
attacks are implemented, with chapters on fault injection
technologies for microprocessors, and fault injection and key
retrieval experiments on a widely used evaluation board. This is
the first book on this topic and will be of interest to researchers
and practitioners engaged with cryptographic engineering.
These are the proceedings of CHES 2004, the 6th Workshop on
Cryptographic Hardware and Embedded Systems. For the ?rst time, the
CHES Workshop was sponsored by the International Association for
Cryptologic Research (IACR). This year, the number of submissions
reached a new record. One hundred and twenty-?ve papers were
submitted, of which 32 were selected for presen- tion. Each
submitted paper was reviewed by at least 3 members of the program
committee. We are very grateful to the program committee for their
hard and
e?cientworkinassemblingtheprogram.Wearealsogratefultothe108external
referees who helped in the review process in their area of
expertise. In addition to the submitted contributions, the program
included three - vited talks, by Neil Gershenfeld (Center for Bits
and Atoms, MIT) about "Ph- ical Information Security," by Isaac
Chuang (Medialab, MIT) about "Quantum Cryptography," and by Paul
Kocher (Cryptography Research) about "Phy- cal Attacks." It also
included a rump session, chaired by Christof Paar, which featured
informal talks on recent results. Asinthepreviousyears,
theworkshopfocusedonallaspectsofcryptographic hardware and embedded
system security. We sincerely hope that the CHES Workshop series
will remain a premium forum for intellectual exchange in this area.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2003, CT-RSA 2003, held in San Francisco, CA, USA, in April 2003. The 26 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on key self-protection, message authentication, digital signatures, pairing based cryptography, multivariate and lattice problems, cryptographic architectures, new RSA-based cryptosystems, chosen-ciphertext security, broadcast encryption and PRF sharing, authentication structures, elliptic curves and pairings, threshold cryptography, and implementation issues.
This book is devoted to efficient pairing computations and
implementations, useful tools for cryptographers working on topics
like identity-based cryptography and the simplification of existing
protocols like signature schemes. As well as exploring the basic
mathematical background of finite fields and elliptic curves, Guide
to Pairing-Based Cryptography offers an overview of the most recent
developments in optimizations for pairing implementation. Each
chapter includes a presentation of the problem it discusses, the
mathematical formulation, a discussion of implementation issues,
solutions accompanied by code or pseudocode, several numerical
results, and references to further reading and notes. Intended as a
self-contained handbook, this book is an invaluable resource for
computer scientists, applied mathematicians and security
professionals interested in cryptography.
This book constitutes the refereed proceedings of the 9th
International Conference on the Theory and Application of
Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in
Dakar, Senegal, in May 2017. The 13 papers presented in this book
were carefully reviewed and selected from 40 submissions. The
papers are organized in topical sections on cryptographic schemes,
side-channel analysis, differential cryptanalysis, applications,
and number theory.
This book constitutes the thoroughly refereed post-conference
proceedings of the 13th International Conference on Smart Card
Research and Advanced Applications, CARDIS 2014, held in Paris,
France, in November 2014. The 15 revised full papers presented in
this book were carefully reviewed and selected from 56 submissions.
The papers are organized in topical sections on Java cards;
software countermeasures; side-channel analysis; embedded
implementations; public-key cryptography and leakage and fault
attacks.
|
You may like...
Poor Things
Emma Stone, Mark Ruffalo, …
DVD
R449
R329
Discovery Miles 3 290
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Miles Ahead
Don Cheadle, Ewan McGregor
DVD
(1)
R55
Discovery Miles 550
|