![](/uploads/posts/2025-02/thumbs/1738946224_embedded-cryptography-2.jpg)
Автор: Emmanuel Prouff, Guénaël Renault, Matthieu Rivain, Colin O’Flynn
Издательство: Wiley-ISTE
Год: 2025
Страниц: 403
Язык: английский
Формат: pdf (true), epub
Размер: 44.7 MB
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. Embedded Cryptography 2 is dedicated to masking and cryptographic implementations, as well as hardware security. A full part of this volume is dedicated to Masking in Part 1, which is a widely used countermeasure against side-channel attacks and which has become an important research topic since their introduction in 1999. This part covers a variety of masking techniques, their security proofs and their formal verification. Besides general masking techniques, efficient and secure embedded cryptographic implementations are very dependent on the underlying algorithm. Consequently, Part 2, Cryptographic Implementations, is dedicated to the implementation of specific cryptographic algorithm families, namely, AES, RSA, ECC, and post-quantum cryptography. This part also covers hardware acceleration and constant-time implementations. Part 3 of this current volume, Hardware Security, covers invasive attacks, hardware countermeasures and physically unclonable functions (PUF).