
Title:
Embedded cryptography 2
Author:
Prouff, Emmanuel, editor.
ISBN:
9781394351909
9781394351886
9781394351893
Physical Description:
1 online resource (432 pages)
Contents:
Preface xiii Emmanuel PROUFF, Guenael RENAULT, Matthieu RIVAIN and Colin O'FLYNN -- Part 1. Masking -- Chapter 1. Introduction to Masking 3 Ange MARTINELLI and Melissa ROSSI -- 1.1. An overview of masking -- 1.2. The effect of masking on side-channel leakage -- 1.3. Different types of masking -- 1.4. Code-based masking: toward a generic framework -- 1.5. Hybrid masking -- 1.6. Examples of specific maskings -- 1.7. Outline of the part -- 1.8. Notes and further references -- 1.9. References -- Chapter 2. Masking Schemes 15 Jean-Sebastien CORON and Rina ZEITOUN -- 2.1. Introduction to masking operations -- 2.2. Classical linear operations -- 2.3. Classical nonlinear operations -- 2.4. Mask refreshing -- 2.5. Masking S-boxes -- 2.6. Masks conversions -- 2.7. Notes and further references -- 2.8. References -- Chapter 3. Hardware Masking 39 Begul BILGIN and Lauren DE MEYER -- 3.1. Introduction -- 3.2. Category I: td + 1 masking -- 3.3. Category II: d + 1 masking -- 3.4. Trade-offs -- 3.5. Notes and further references -- 3.6. References -- Chapter 4. Masking Security Proofs 59 Sonia BELAID -- 4.1. Introduction -- 4.2. Preliminaries -- 4.3. Probing model -- 4.4. Robust probing model -- 4.5. Random probing model and noisy leakage model -- 4.6. Composition -- 4.7. Conclusion -- 4.8. Notes and further references -- 4.9. References -- Chapter 5. Masking Verification 83 Abdul Rahman TALEB -- 5.1. Introduction -- 5.2. General procedure -- 5.3. Verify: verification mechanisms for a set of variables -- 5.4. Explore: exploration mechanisms for all sets of variables -- 5.5. Conclusion -- 5.6. Notes and further references -- 5.7. Solution to Exercise 5.1 -- 5.8. References -- Part 2. Cryptographic Implementations -- Chapter 6. Hardware Acceleration of Cryptographic Algorithms 115 Lejla BATINA, Pedro Maat COSTA MASSOLINO and Nele MENTENS -- 6.1. Introduction -- 6.2. Hardware optimization of symmetric-key cryptography -- 6.3. Modular arithmetic for hardware implementations -- 6.4. RSA implementations -- 6.5. Post-quantum cryptography -- 6.6. Conclusion -- 6.7. Notes and further references -- 6.8. References -- Chapter 7. Constant-Time Implementations 133 Thomas PORNIN -- 7.1. What does constant-time mean? -- 7.2. Low-level issues -- 7.3. Primitive implementation techniques -- 7.4. Constant-time algorithms -- 7.5. References -- Chapter 8. Protected AES Implementations 177 Franck RONDEPIERRE -- 8.1. Generic countermeasures -- 8.2. Secure evaluation of the SubByte function -- 8.3. Other functions of AES -- 8.4. Notes and further references -- 8.5. References -- Chapter 9. Protected RSA Implementations 201 Mylene ROUSSELLET, Yannick TEGLIA and David VIGILANT -- 9.1. Introduction -- 9.2. Building a protected RSA implementation step by step -- 9.3. Remarks and open discussion -- 9.4. Notes and further references -- 9.5. References -- Chapter 10. Protected ECC Implementations 225 Lukasz CHMIELEWSKI and Louiza PAPACHRISTODOULOU -- 10.1. Introduction -- 10.2. Protecting ECC implementations and countermeasures -- 10.3. Conclusion -- 10.4. Notes and further references -- 10.5. References -- Chapter 11. Post-Quantum Implementations 249 Matthias J. KANNWISCHER, Ruben NIEDERHAGEN, Francisco RODRIGUEZ-HENRIQUEZ and Peter SCHWABE -- 11.1. Introduction -- 11.2. Post-quantum encryption and key encapsulation -- 11.3. Post-quantum signatures -- 11.4. Notes and further references -- 11.5. References -- Part 3. Hardware Security -- Chapter 12. Hardware Reverse Engineering and Invasive Attacks 291 Sergei SKOROBOGATOV -- 12.1. Introduction -- 12.2. Preparation for hardware attacks -- 12.3. Probing attacks -- 12.4. Delayering and reverse engineering -- 12.5. Memory dump and hardware cloning -- 12.6. Conclusion -- 12.7. Notes and further references -- 12.8. References -- Chapter 13. Gate-Level Protection 315 Sylvain GUILLEY and Jean-Luc DANGER -- 13.1. Introduction -- 13.2. DPL principle, built-in DFA resistance, and latent side-channel vulnerabilities -- 13.3. DPL families based on standard cells -- 13.4. Technological specific DPL styles -- 13.5. DPL styles comparison -- 13.6. Conclusion -- 13.7. Notes and further references -- 13.8. References -- Chapter 14. Physically Unclonable Functions 339 Jean-Luc DANGER, Sylvain GUILLEY, Debdeep MUKHOPADHYAY and Ulrich RUHRMAIR -- 14.1. Introduction -- 14.2. PUF architectures -- 14.3. Reliability enhancement -- 14.4. Entropy assessment -- 14.5. Resistance to attacks -- 14.6. Characterizations -- 14.7. Standardization -- 14.8. Notes and further references -- 14.9. References -- List of Authors -- Index -- Summary of Volume 1 -- Summary of Volume 3.
Abstract:
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms. The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 2 is dedicated to masking and cryptographic implementations, as well as hardware security.
Local Note:
John Wiley and Sons
Genre:
Electronic Access:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909Copies:
Available:*
Library | Material Type | Item Barcode | Shelf Number | Status | Item Holds |
|---|---|---|---|---|---|
Searching... | E-Book | 599724-1001 | QA76.9 .A25 | Searching... | Searching... |
