About: Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
Description
  • The first part of the book focuses on hardware architectures operating over elements of GF(2^m) in normal basis representation. Such architectures are applicable e.g. in Elliptic Curve Cryptography. Four new architectures of digit-serial normal basis multipliers are presented. Based on these architectures, a novel structure of a normal basis arithmetic unit is proposed. As the unit is both small and scalable, the design constrains can be met optimally. The second part of the thesis focuses on the cryptanalysis of the A5/1 cipher used in GSM communications. Hardware architectures of two attacks against the A5/1 cipher are presented. The attacks have been implemented using an existing low-cost special-purpose hardware device: COPACOBANA. The attacks are designed to utilize both the properties of the cipher and the features of underlying reconfigurable hardware. Presented design approaches can be reused when designing attacks against similar ciphers.
  • The first part of the book focuses on hardware architectures operating over elements of GF(2^m) in normal basis representation. Such architectures are applicable e.g. in Elliptic Curve Cryptography. Four new architectures of digit-serial normal basis multipliers are presented. Based on these architectures, a novel structure of a normal basis arithmetic unit is proposed. As the unit is both small and scalable, the design constrains can be met optimally. The second part of the thesis focuses on the cryptanalysis of the A5/1 cipher used in GSM communications. Hardware architectures of two attacks against the A5/1 cipher are presented. The attacks have been implemented using an existing low-cost special-purpose hardware device: COPACOBANA. The attacks are designed to utilize both the properties of the cipher and the features of underlying reconfigurable hardware. Presented design approaches can be reused when designing attacks against similar ciphers. (en)
Title
  • Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis
  • Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis (en)
skos:prefLabel
  • Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis
  • Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis (en)
skos:notation
  • RIV/68407700:21240/10:00167731!RIV11-MSM-21240___
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • N
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 292920
http://linked.open...ai/riv/idVysledku
  • RIV/68407700:21240/10:00167731
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • Public Key Cryptography; Elliptic Curve Cryptography; Arithmetic Unit; Binary Finite Fields GF(2^m); Normal Basis; Multiplication; Inversion; Cryptanalysis; Brute-Force Attack; TMDTO Attack; A5/1; COPACOBANA; FPGA (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...ontrolniKodProRIV
  • [0CB41F4783AA]
http://linked.open...i/riv/mistoVydani
  • Bochum
http://linked.open...vEdiceCisloSvazku
  • IT Security č. sv. 12
http://linked.open...i/riv/nazevZdroje
  • Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...v/pocetStranKnihy
http://linked.open...cetTvurcuVysledku
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Novotný, Martin
number of pages
http://purl.org/ne...btex#hasPublisher
  • Europäischer Universitätsverlag
https://schema.org/isbn
  • 978-3-89966-351-8
http://localhost/t...ganizacniJednotka
  • 21240
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 77 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software