000 | 03308nam a22005175i 4500 | ||
---|---|---|---|
999 |
_c200457696 _d75908 |
||
003 | TR-AnTOB | ||
005 | 20231117171626.0 | ||
007 | cr nn 008mamaa | ||
008 | 211117s2022 si | s |||| 0|eng d | ||
020 | _a9789811663444 | ||
024 | 7 |
_a10.1007/978-981-16-6344-4 _2doi |
|
040 |
_aTR-AnTOB _beng _erda _cTR-AnTOB |
||
041 | _aeng | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
090 | _aQA76.9.A25EBK | ||
100 | 1 |
_aKhairallah, Mustafa. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aHardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers _h[electronic resource] / _cby Mustafa Khairallah. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputer Architecture and Design Methodologies, _x2367-3486 |
|
505 | 0 | _aIntroduction -- Arguments for Tweakable Block Cipher-Based Cryptorgaphy -- State of the Art of TBC-based Authenticated Encryption -- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals -- Romulus: Lightweight TBC-Based Authenticated Encryption -- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus -- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR -- Multi-key AEAD Security using TBCs -- Conclusions. | |
520 | _aThis book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography. | ||
650 | 0 | _aElectronic circuits. | |
650 | 0 | _aData protection. | |
650 | 0 | _aSecurity systems. | |
650 | 1 | 4 | _aElectronic Circuits and Systems. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aSecurity Science and Technology. |
653 | 0 | _aData encryption (Computer science) | |
710 | 2 | _aSpringerLink (Online service) | |
830 | 0 |
_aComputer Architecture and Design Methodologies, _x2367-3486 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-981-16-6344-4 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |