My Account Log in

1 option

Embedded cryptography 2 / coordinated by Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn.

Wiley Online Library All ebooks Available online

View online
Format:
Book
Contributor:
Prouff, Emmanuel, editor.
Renault, Guenael, editor.
Rivain, Mattieu, editor.
O'Flynn, Colin, editor.
Wiley InterScience (Online service)
Series:
SCIENCES: COMPUTER SCIENCE.
Language:
English
Subjects (All):
Data encryption (Computer science).
Physical Description:
1 online resource (432 pages)
Place of Publication:
London, UK : ISTE, Ltd. ; Hoboken, NJ : Wiley, 2025.
Contents:
Preface xiii Emmanuel PROUFF, Guenael RENAULT, Matthieu RIVAIN and Colin O'FLYNN
Part 1. Masking
Chapter 1. Introduction to Masking 3 Ange MARTINELLI and Melissa ROSSI
1.1. An overview of masking
1.2. The effect of masking on side-channel leakage
1.3. Different types of masking
1.4. Code-based masking: toward a generic framework
1.5. Hybrid masking
1.6. Examples of specific maskings
1.7. Outline of the part
1.8. Notes and further references
1.9. References
Chapter 2. Masking Schemes 15 Jean-Sebastien CORON and Rina ZEITOUN
2.1. Introduction to masking operations
2.2. Classical linear operations
2.3. Classical nonlinear operations
2.4. Mask refreshing
2.5. Masking S-boxes
2.6. Masks conversions
2.7. Notes and further references
2.8. References
Chapter 3. Hardware Masking 39 Begul BILGIN and Lauren DE MEYER
3.1. Introduction
3.2. Category I: td + 1 masking
3.3. Category II: d + 1 masking
3.4. Trade-offs
3.5. Notes and further references
3.6. References
Chapter 4. Masking Security Proofs 59 Sonia BELAID
4.1. Introduction
4.2. Preliminaries
4.3. Probing model
4.4. Robust probing model
4.5. Random probing model and noisy leakage model
4.6. Composition
4.7. Conclusion
4.8. Notes and further references
4.9. References
Chapter 5. Masking Verification 83 Abdul Rahman TALEB
5.1. Introduction
5.2. General procedure
5.3. Verify: verification mechanisms for a set of variables
5.4. Explore: exploration mechanisms for all sets of variables
5.5. Conclusion
5.6. Notes and further references
5.7. Solution to Exercise 5.1
5.8. References
Part 2. Cryptographic Implementations
Chapter 6. Hardware Acceleration of Cryptographic Algorithms 115 Lejla BATINA, Pedro Maat COSTA MASSOLINO and Nele MENTENS
6.1. Introduction
6.2. Hardware optimization of symmetric-key cryptography
6.3. Modular arithmetic for hardware implementations
6.4. RSA implementations
6.5. Post-quantum cryptography
6.6. Conclusion
6.7. Notes and further references
6.8. References
Chapter 7. Constant-Time Implementations 133 Thomas PORNIN
7.1. What does constant-time mean?
7.2. Low-level issues
7.3. Primitive implementation techniques
7.4. Constant-time algorithms
7.5. References
Chapter 8. Protected AES Implementations 177 Franck RONDEPIERRE
8.1. Generic countermeasures
8.2. Secure evaluation of the SubByte function
8.3. Other functions of AES
8.4. Notes and further references
8.5. References
Chapter 9. Protected RSA Implementations 201 Mylene ROUSSELLET, Yannick TEGLIA and David VIGILANT
9.1. Introduction
9.2. Building a protected RSA implementation step by step
9.3. Remarks and open discussion
9.4. Notes and further references
9.5. References
Chapter 10. Protected ECC Implementations 225 Lukasz CHMIELEWSKI and Louiza PAPACHRISTODOULOU
10.1. Introduction
10.2. Protecting ECC implementations and countermeasures
10.3. Conclusion
10.4. Notes and further references
10.5. References
Chapter 11. Post-Quantum Implementations 249 Matthias J. KANNWISCHER, Ruben NIEDERHAGEN, Francisco RODRIGUEZ-HENRIQUEZ and Peter SCHWABE
11.1. Introduction
11.2. Post-quantum encryption and key encapsulation
11.3. Post-quantum signatures
11.4. Notes and further references
11.5. References
Part 3. Hardware Security
Chapter 12. Hardware Reverse Engineering and Invasive Attacks 291 Sergei SKOROBOGATOV
12.1. Introduction
12.2. Preparation for hardware attacks
12.3. Probing attacks
12.4. Delayering and reverse engineering
12.5. Memory dump and hardware cloning
12.6. Conclusion
12.7. Notes and further references
12.8. References
Chapter 13. Gate-Level Protection 315 Sylvain GUILLEY and Jean-Luc DANGER
13.1. Introduction
13.2. DPL principle, built-in DFA resistance, and latent side-channel vulnerabilities
13.3. DPL families based on standard cells
13.4. Technological specific DPL styles
13.5. DPL styles comparison
13.6. Conclusion
13.7. Notes and further references
13.8. References
Chapter 14. Physically Unclonable Functions 339 Jean-Luc DANGER, Sylvain GUILLEY, Debdeep MUKHOPADHYAY and Ulrich RUHRMAIR
14.1. Introduction
14.2. PUF architectures
14.3. Reliability enhancement
14.4. Entropy assessment
14.5. Resistance to attacks
14.6. Characterizations
14.7. Standardization
14.8. Notes and further references
14.9. References
List of Authors
Index
Summary of Volume 1
Summary of Volume 3.
Notes:
Electronic reproduction. Hoboken, N.J. Available via World Wide Web.
ISBN:
9781394351909
1394351909
Publisher Number:
90101806138
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account