|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Erkay Savas , Amir Moradi , Gregor LeanderPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032155405ISBN 10: 3032155401 Pages: 322 Publication Date: 04 February 2026 Audience: College/higher education , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Post-Quantum Cryptography. .- HAPPIER: Hash-based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with Risc0. .- Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures DEFIv2. .- Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures. .- Efficient Implementation of Post-Quantum Cryptography. .- LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry Pipelined Design. .- A Comparison of Unified Multiplier Designs for the FALCON Post-Quantum Digital Signature. .- An Optimized FrodoKEM Implementation on Reconfigurable Hardware. .- Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge. .- Optimized FPGA Architecture for Modular Reduction in NTT. .- Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions. .- Hardware and Architecture Security. .- ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors. .- MIDSCAN: Investigating the portability problem for cross-device DL-SCA. .- Protecting AES-128 Against First-Order Side-Channel Analysis in Micro-Architectures by Enforcing Threshold Implementation Principles. .- On advancing pre-silicon Hardware Trojan detection against Lightweight Block Ciphers. .- Hardware Circuits for the Legendre PRF. .- Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGA. .- Security, Cryptanalysis and Attacks. .- Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences. .- Differential and Linear Analyses of DIZY through MILP modeling. .- Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity. .- JWT Back to the future On the (ab)use of JWTs in IoT transactions.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||