Embedded Cryptography 2


SCIENCES - Cryptography, Data Security

Embedded Cryptography 2

Edited by

Emmanuel Prouff.
Guénaël Renault, ANSSI, France.
Mattieu Rivain, CryptoExperts, France.
Colin O’Flynn, Dalhousie University, Canada.


ISBN : 9781789452143

Publication Date : February 2025

Hardcover 418 pp

165.00 USD

Co-publisher

Description


Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms.

The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 2 is dedicated to masking and cryptographic implementations, as well as hardware security.

Contents


Part 1. Masking.
1. Introduction to Masking, Ange Martinelli and Mélissa Rossi.
2. Masking Schemes, Jean-Sébastien Coron and Rina Zeitoun.
3. Hardware Masking, Begül Bilgin and Lauren de Meyer.
4. Masking Security Proofs, Sonia Belaïd.
5. Masking Verification, Abdul Rahman Taleb.

Part 2. Cryptographic Implementations.
6. Hardware Acceleration of Cryptographic Algorithms, Lejla Batina, Pedro Maat Costa Massolino and Nele Mentens.
7. Constant-Time Implementations, Thomas Pornin.
8. Protected AES Implementations, Franck Rondepierre.
9. Protected RSA Implementations, Mylène Roussellet, Yannick Teglia and David Vigilant.
10. Protected ECC Implementations, ?ukasz Chmielewski and Louiza Papachristodoulou.
11. Post-Quantum Implementations, Matthias J. Kannwischer, Ruben Niederhagen, Francisco Rodríguez-Henríquez and Peter Schwabe.

Part 3. Hardware Security.
12. Hardware Reverse Engineering and Invasive Attacks, Sergei Skorobogatov.
13. Gate-Level Protection, Sylvain Guilley and Jean-Luc Danger.
14. Physically Unclonable Functions, Jean-Luc Danger, Sylvain Guilley, Debdeep Mukhopadhyay and Ulrich Ruhrmair.

About the authors/editors


Emmanuel Prouff is a researcher in Applied Cryptography and Embedded Security. He has worked as an expert for ANSSI, France, as well as for major security companies such as IDEMIA and SAFRAN, both to develop secure implementations against physical attacks.

Guénaël Renault is Deputy Head of the Hardware Security Lab at ANSSI, France. His research interests include cryptography, algebraic (symbolic) computation and computational number theory.

Mattieu Rivain is a researcher and entrepreneur in Cryptography, currently working as CEO at CryptoExperts, France. His research interests include provable security against side-channel attacks, white-box cryptography, zero-knowledge proofs and post-quantum signatures.

Colin O’Flynn is Assistant Professor in Embedded Hardware Security at Dalhousie University, Canada. His interests include embedded hardware security, PCB design and prototype construction.