000 | 03284nam a22005175i 4500 | ||
---|---|---|---|
999 |
_c200457993 _d76205 |
||
003 | TR-AnTOB | ||
005 | 20231114161952.0 | ||
007 | cr nn 008mamaa | ||
008 | 211217s2022 si | s |||| 0|eng d | ||
020 | _a9789811665226 | ||
024 | 7 |
_a10.1007/978-981-16-6522-6 _2doi |
|
040 |
_aTR-AnTOB _beng _erda _cTR-AnTOB |
||
041 | _aeng | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
090 | _aQA76.9.A25EBK | ||
100 | 1 |
_aBaksi, Anubhab. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aClassical and Physical Security of Symmetric Key Cryptographic Algorithms _h[electronic resource] / _cby Anubhab Baksi. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputer Architecture and Design Methodologies, _x2367-3486 |
|
505 | 0 | _aIntroduction -- Fundamentals of Symmetric Key Cryptography -- Fault Attack -- Side Channel Attack -- New Insights on Differential and Linear Bounds using Mixed Integer Linear Programming -- Machine Learning Assisted Differential Distinguishers for Lightweight Ci-phers -- Differential Paradox: How an SBox Plays against Differential Fault Analysis -- DeFault: Cipher Level Resistance against Differential Fault Attack -- To Infect or Not to Infect: A Critical Analysis of Infective Countermeasures in Fault Attacks -- A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis -- Concluding Remarks. | |
520 | _aThis book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse—it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography. . | ||
650 | 0 | _aElectronic circuits. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aElectronic Circuits and Systems. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aData and Information Security. |
710 | 2 | _aSpringerLink (Online service) | |
830 | 0 |
_aComputer Architecture and Design Methodologies, _x2367-3486 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-981-16-6522-6 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |