1 option
Embedded cryptography 2 / coordinated by Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn.
- Format:
- Book
- Series:
- SCIENCES: COMPUTER SCIENCE.
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Physical Description:
- 1 online resource (432 pages)
- Place of Publication:
- London, UK : ISTE, Ltd. ; Hoboken, NJ : Wiley, 2025.
- Contents:
- Preface xiii Emmanuel PROUFF, Guenael RENAULT, Matthieu RIVAIN and Colin O'FLYNN
- Part 1. Masking
- Chapter 1. Introduction to Masking 3 Ange MARTINELLI and Melissa ROSSI
- 1.1. An overview of masking
- 1.2. The effect of masking on side-channel leakage
- 1.3. Different types of masking
- 1.4. Code-based masking: toward a generic framework
- 1.5. Hybrid masking
- 1.6. Examples of specific maskings
- 1.7. Outline of the part
- 1.8. Notes and further references
- 1.9. References
- Chapter 2. Masking Schemes 15 Jean-Sebastien CORON and Rina ZEITOUN
- 2.1. Introduction to masking operations
- 2.2. Classical linear operations
- 2.3. Classical nonlinear operations
- 2.4. Mask refreshing
- 2.5. Masking S-boxes
- 2.6. Masks conversions
- 2.7. Notes and further references
- 2.8. References
- Chapter 3. Hardware Masking 39 Begul BILGIN and Lauren DE MEYER
- 3.1. Introduction
- 3.2. Category I: td + 1 masking
- 3.3. Category II: d + 1 masking
- 3.4. Trade-offs
- 3.5. Notes and further references
- 3.6. References
- Chapter 4. Masking Security Proofs 59 Sonia BELAID
- 4.1. Introduction
- 4.2. Preliminaries
- 4.3. Probing model
- 4.4. Robust probing model
- 4.5. Random probing model and noisy leakage model
- 4.6. Composition
- 4.7. Conclusion
- 4.8. Notes and further references
- 4.9. References
- Chapter 5. Masking Verification 83 Abdul Rahman TALEB
- 5.1. Introduction
- 5.2. General procedure
- 5.3. Verify: verification mechanisms for a set of variables
- 5.4. Explore: exploration mechanisms for all sets of variables
- 5.5. Conclusion
- 5.6. Notes and further references
- 5.7. Solution to Exercise 5.1
- 5.8. References
- Part 2. Cryptographic Implementations
- Chapter 6. Hardware Acceleration of Cryptographic Algorithms 115 Lejla BATINA, Pedro Maat COSTA MASSOLINO and Nele MENTENS
- 6.1. Introduction
- 6.2. Hardware optimization of symmetric-key cryptography
- 6.3. Modular arithmetic for hardware implementations
- 6.4. RSA implementations
- 6.5. Post-quantum cryptography
- 6.6. Conclusion
- 6.7. Notes and further references
- 6.8. References
- Chapter 7. Constant-Time Implementations 133 Thomas PORNIN
- 7.1. What does constant-time mean?
- 7.2. Low-level issues
- 7.3. Primitive implementation techniques
- 7.4. Constant-time algorithms
- 7.5. References
- Chapter 8. Protected AES Implementations 177 Franck RONDEPIERRE
- 8.1. Generic countermeasures
- 8.2. Secure evaluation of the SubByte function
- 8.3. Other functions of AES
- 8.4. Notes and further references
- 8.5. References
- Chapter 9. Protected RSA Implementations 201 Mylene ROUSSELLET, Yannick TEGLIA and David VIGILANT
- 9.1. Introduction
- 9.2. Building a protected RSA implementation step by step
- 9.3. Remarks and open discussion
- 9.4. Notes and further references
- 9.5. References
- Chapter 10. Protected ECC Implementations 225 Lukasz CHMIELEWSKI and Louiza PAPACHRISTODOULOU
- 10.1. Introduction
- 10.2. Protecting ECC implementations and countermeasures
- 10.3. Conclusion
- 10.4. Notes and further references
- 10.5. References
- Chapter 11. Post-Quantum Implementations 249 Matthias J. KANNWISCHER, Ruben NIEDERHAGEN, Francisco RODRIGUEZ-HENRIQUEZ and Peter SCHWABE
- 11.1. Introduction
- 11.2. Post-quantum encryption and key encapsulation
- 11.3. Post-quantum signatures
- 11.4. Notes and further references
- 11.5. References
- Part 3. Hardware Security
- Chapter 12. Hardware Reverse Engineering and Invasive Attacks 291 Sergei SKOROBOGATOV
- 12.1. Introduction
- 12.2. Preparation for hardware attacks
- 12.3. Probing attacks
- 12.4. Delayering and reverse engineering
- 12.5. Memory dump and hardware cloning
- 12.6. Conclusion
- 12.7. Notes and further references
- 12.8. References
- Chapter 13. Gate-Level Protection 315 Sylvain GUILLEY and Jean-Luc DANGER
- 13.1. Introduction
- 13.2. DPL principle, built-in DFA resistance, and latent side-channel vulnerabilities
- 13.3. DPL families based on standard cells
- 13.4. Technological specific DPL styles
- 13.5. DPL styles comparison
- 13.6. Conclusion
- 13.7. Notes and further references
- 13.8. References
- Chapter 14. Physically Unclonable Functions 339 Jean-Luc DANGER, Sylvain GUILLEY, Debdeep MUKHOPADHYAY and Ulrich RUHRMAIR
- 14.1. Introduction
- 14.2. PUF architectures
- 14.3. Reliability enhancement
- 14.4. Entropy assessment
- 14.5. Resistance to attacks
- 14.6. Characterizations
- 14.7. Standardization
- 14.8. Notes and further references
- 14.9. References
- List of Authors
- Index
- Summary of Volume 1
- Summary of Volume 3.
- Notes:
- Electronic reproduction. Hoboken, N.J. Available via World Wide Web.
- ISBN:
- 9781394351909
- 1394351909
- Publisher Number:
- 90101806138
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.