This HTML5 document contains 47 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n11http://purl.org/net/nknouf/ns/bibtex#
n9http://localhost/temp/predkladatel/
n17http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n14http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F68407700%3A21240%2F10%3A00167731%21RIV11-MSM-21240___/
n10http://linked.opendata.cz/ontology/domain/vavai/
n6https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n8http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n18http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n13http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F68407700%3A21240%2F10%3A00167731%21RIV11-MSM-21240___
rdf:type
skos:Concept n10:Vysledek
dcterms:description
The first part of the book focuses on hardware architectures operating over elements of GF(2^m) in normal basis representation. Such architectures are applicable e.g. in Elliptic Curve Cryptography. Four new architectures of digit-serial normal basis multipliers are presented. Based on these architectures, a novel structure of a normal basis arithmetic unit is proposed. As the unit is both small and scalable, the design constrains can be met optimally. The second part of the thesis focuses on the cryptanalysis of the A5/1 cipher used in GSM communications. Hardware architectures of two attacks against the A5/1 cipher are presented. The attacks have been implemented using an existing low-cost special-purpose hardware device: COPACOBANA. The attacks are designed to utilize both the properties of the cipher and the features of underlying reconfigurable hardware. Presented design approaches can be reused when designing attacks against similar ciphers. The first part of the book focuses on hardware architectures operating over elements of GF(2^m) in normal basis representation. Such architectures are applicable e.g. in Elliptic Curve Cryptography. Four new architectures of digit-serial normal basis multipliers are presented. Based on these architectures, a novel structure of a normal basis arithmetic unit is proposed. As the unit is both small and scalable, the design constrains can be met optimally. The second part of the thesis focuses on the cryptanalysis of the A5/1 cipher used in GSM communications. Hardware architectures of two attacks against the A5/1 cipher are presented. The attacks have been implemented using an existing low-cost special-purpose hardware device: COPACOBANA. The attacks are designed to utilize both the properties of the cipher and the features of underlying reconfigurable hardware. Presented design approaches can be reused when designing attacks against similar ciphers.
dcterms:title
Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis
skos:prefLabel
Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis
skos:notation
RIV/68407700:21240/10:00167731!RIV11-MSM-21240___
n4:aktivita
n18:N
n4:aktivity
N
n4:dodaniDat
n13:2011
n4:domaciTvurceVysledku
n17:6979491
n4:druhVysledku
n16:B
n4:duvernostUdaju
n5:S
n4:entitaPredkladatele
n14:predkladatel
n4:idSjednocenehoVysledku
292920
n4:idVysledku
RIV/68407700:21240/10:00167731
n4:jazykVysledku
n15:eng
n4:klicovaSlova
Public Key Cryptography; Elliptic Curve Cryptography; Arithmetic Unit; Binary Finite Fields GF(2^m); Normal Basis; Multiplication; Inversion; Cryptanalysis; Brute-Force Attack; TMDTO Attack; A5/1; COPACOBANA; FPGA
n4:klicoveSlovo
n8:Multiplication n8:Binary%20Finite%20Fields%20GF%282%5Em%29 n8:A5%2F1 n8:Cryptanalysis n8:FPGA n8:Inversion n8:Brute-Force%20Attack n8:Arithmetic%20Unit n8:Normal%20Basis n8:TMDTO%20Attack n8:Public%20Key%20Cryptography n8:Elliptic%20Curve%20Cryptography n8:COPACOBANA
n4:kontrolniKodProRIV
[0CB41F4783AA]
n4:mistoVydani
Bochum
n4:nazevEdiceCisloSvazku
IT Security č. sv. 12
n4:nazevZdroje
Time-Area Efficient HW Architectures for Cryptography and Cryptanalysis
n4:obor
n19:JC
n4:pocetDomacichTvurcuVysledku
1
n4:pocetStranKnihy
194
n4:pocetTvurcuVysledku
1
n4:rokUplatneniVysledku
n13:2010
n4:tvurceVysledku
Novotný, Martin
s:numberOfPages
194
n11:hasPublisher
Europäischer Universitätsverlag
n6:isbn
978-3-89966-351-8
n9:organizacniJednotka
21240