HOME > Detail View

Detail View

Classical and physical security of symmetric key cryptographic algorithms

Classical and physical security of symmetric key cryptographic algorithms

Material type
단행본
Personal Author
Baksi, Anubhab.
Title Statement
Classical and physical security of symmetric key cryptographic algorithms / Anubhab Baksi.
Publication, Distribution, etc
Singapore :   Springer,   2022.  
Physical Medium
xii, 288 p. : col. ill. ; 25 cm.
Series Statement
Computer architecture and design methodologies
ISBN
9789811665219
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Data encryption (Computer science). Cryptography.
000 00000nam u2200205 a 4500
001 000046140123
005 20230130104734
008 230130s2022 si a b 001 0 eng d
020 ▼a 9789811665219
040 ▼a 211009 ▼c 211009 ▼d 211009
050 ▼a QA76.9.A25
082 0 4 ▼a 005.824 ▼2 23
084 ▼a 005.824 ▼2 DDCK
090 ▼a 005.824 ▼b B169c
100 1 ▼a Baksi, Anubhab.
245 1 0 ▼a Classical and physical security of symmetric key cryptographic algorithms / ▼c Anubhab Baksi.
260 ▼a Singapore : ▼b Springer, ▼c 2022.
300 ▼a xii, 288 p. : ▼b col. ill. ; ▼c 25 cm.
490 1 ▼a Computer architecture and design methodologies
504 ▼a Includes bibliographical references and index.
650 0 ▼a Data encryption (Computer science).
650 0 ▼a Cryptography.
830 0 ▼a Computer architecture and design methodologies.
945 ▼a ITMT

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.824 B169c Accession No. 121261951 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Introduction.- Fundamentals of Symmetric Key Cryptography.- Fault Attack.- Side Channel Attack.- New Insights on Differential and Linear Bounds using Mixed Integer Linear Programming.- Machine Learning Assisted Differential Distinguishers for Lightweight Ci-phers.- Differential Paradox: How an SBox Plays against Differential Fault Analysis.- DeFault: Cipher Level Resistance against Differential Fault Attack.- To Infect or Not to Infect: A Critical Analysis of Infective Countermeasures in Fault Attacks.- A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis.- Concluding Remarks.

New Arrivals Books in Related Fields

이관용 (2023)