000 03284nam a22005175i 4500
999 _c200457993
_d76205
003 TR-AnTOB
005 20231114161952.0
007 cr nn 008mamaa
008 211217s2022 si | s |||| 0|eng d
020 _a9789811665226
024 7 _a10.1007/978-981-16-6522-6
_2doi
040 _aTR-AnTOB
_beng
_erda
_cTR-AnTOB
041 _aeng
050 4 _aQA76.9.A25
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
090 _aQA76.9.A25EBK
100 1 _aBaksi, Anubhab.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aClassical and Physical Security of Symmetric Key Cryptographic Algorithms
_h[electronic resource] /
_cby Anubhab Baksi.
250 _a1st ed. 2022.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2022.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Architecture and Design Methodologies,
_x2367-3486
505 0 _aIntroduction -- Fundamentals of Symmetric Key Cryptography -- Fault Attack -- Side Channel Attack -- New Insights on Differential and Linear Bounds using Mixed Integer Linear Programming -- Machine Learning Assisted Differential Distinguishers for Lightweight Ci-phers -- Differential Paradox: How an SBox Plays against Differential Fault Analysis -- DeFault: Cipher Level Resistance against Differential Fault Attack -- To Infect or Not to Infect: A Critical Analysis of Infective Countermeasures in Fault Attacks -- A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis -- Concluding Remarks.
520 _aThis book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse—it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography. .
650 0 _aElectronic circuits.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection.
650 1 4 _aElectronic Circuits and Systems.
650 2 4 _aCryptology.
650 2 4 _aData and Information Security.
710 2 _aSpringerLink (Online service)
830 0 _aComputer Architecture and Design Methodologies,
_x2367-3486
856 4 0 _uhttps://doi.org/10.1007/978-981-16-6522-6
_3Springer eBooks
_zOnline access link to the resource
942 _2lcc
_cEBK