Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms.
The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 3 is dedicated to white-box cryptography, randomness and key generation, as well as real world applications and attacks in the wild.
Part 1. White-Box Cryptography.
1. Introduction to White-Box Cryptography, Pierre Galissant and Louis Goubin.
2. Gray-Box Attacks against White-Box Implementations, Aleksei Udovenko.
3. Tools for White-Box Cryptanalysis, Philippe Teuwen.
4. Code Obfuscation, Sebastian Schrittwieser and Stefan Katzenbeisser.
Part 2. Randomness and Key Generation.
5. True Random Number Generation, Viktor Fischer, Florent Bernard and Patrick Haddad.
6. Pseudorandom Number Generation, Jean-René Reinhard and Sylvain Ruhault.
7. Prime Number Generation and RSA Keys, Marc Joye and Pascal Paillier.
8. Nonce Generation for Discrete Logarithm-Based Signatures, Akira Takahashi and Mehdi Tibouchi.
9. Random Error Distributions in Post-Quantum Schemes, Thomas Prest.
Part 3. Real-World Applications.
10. ROCA and Minerva Vulnerabilities, Jan Jancar, Petr Svenda and Marek Sys.
11. Security of Automotive Systems, Lennert Wouters, Benedikt Gierlichs and Bart Preneel.
12. Practical Full Key Recovery on a Google Titan Security Key, Laurent Imbert, Victor Lomne, Camille Mutchler and Thomas Roche.
13. An Introduction to Intentional Electromagnetic Interference Exploitation, José Lopes Esteves.
14. Attacking IoT Light Bulbs, Colin O'Flynn and Eyal Ronen.
Emmanuel Prouff is a researcher in Applied Cryptography and Embedded Security. He has worked as an expert for ANSSI, France, as well as for major security companies such as IDEMIA and SAFRAN, both to develop secure implementations against physical attacks.
Guénaël Renault is Deputy Head of the Hardware Security Lab at ANSSI, France. His research interests include cryptography, algebraic (symbolic) computation and computational number theory.
Mattieu Rivain is a researcher and entrepreneur in Cryptography, currently working as CEO at CryptoExperts, France. His research interests include provable security against side-channel attacks, white-box cryptography, zero-knowledge proofs and post-quantum signatures.
Colin O’Flynn is Assistant Professor in Embedded Hardware Security at Dalhousie University, Canada. His interests include embedded hardware security, PCB design and prototype construction.