default search action
Cryptographic Engineering 2009
- Çetin Kaya Koç:
Cryptographic Engineering. Springer 2009, ISBN 978-0-387-71816-3 - Çetin Kaya Koç:
About Cryptographic Engineering. 1-4 - Werner Schindler:
Random Number Generators for Cryptographic Applications. 5-23 - Werner Schindler:
Evaluation Criteria for Physical Random Number Generators. 25-54 - Berk Sunar:
True Random Number Generators for Cryptography. 55-73 - Serdar Süer Erdem, Tugrul Yanik, Çetin Kaya Koç:
Fast Finite Field Multiplication. 75-104 - Erkay Savas, Çetin Kaya Koç:
Efficient Unified Arithmetic for Hardware Cryptography. 105-124 - Gökay Saldamli, Çetin Kaya Koç:
Spectral Modular Arithmetic for Cryptography. 125-169 - Nigel Boston, Matthew Darnall:
Elliptic and Hyperelliptic Curve Cryptography. 171-189 - Sandro Bartolini, Roberto Giorgi, Enrico Martinelli:
Instruction Set Extensions for Cryptographic Applications. 191-233 - Kris Gaj, Pawel Chodowiec:
FPGA and ASIC Implementations of AES. 235-294 - François-Xavier Standaert:
Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs. 295-320 - Debrup Chakraborty, Francisco Rodríguez-Henríquez:
Block Cipher Modes of Operation from a Hardware Implementation Perspective. 321-363 - Marc Joye:
Basics of Side-Channel Analysis. 365-380 - Pankaj Rohatgi:
Improved Techniques for Side-Channel Analysis. 381-406 - Pankaj Rohatgi:
Electromagnetic Attacks and Countermeasures. 407-430 - Colin D. Walter:
Leakage from Montgomery Multiplication. 431-449 - Colin D. Walter:
Randomized Exponentiation Algorithms. 451-473 - Onur Aciiçmez, Çetin Kaya Koç:
Microarchitectural Attacks and Countermeasures. 475-504
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.