Preparation for the Course

The instructors of the 4 day course have sent us some reading suggestions. If the attendees at least have a look at the contents of these reading material, and better yet -- study most of it -- they will be able to extract the best value out of the 4 day course. Here is the list. Please note that if your library has access to Springer Link -- then you can obtain electronic versions of the books in the list.


**Introductory Material

Christof Paar, Jan Pelzl, "Introduction to Cryptography"
Springer 2010, ISBN: 978-3-642-44649-8 (Print) 978-3-642-04101-3 (Online)
http://link.springer.com/book/10.1007%2F978-3-642-04101-3

Paul Koche, Joshua Jaffe, Benjamin Jun, Pankaj Rohatghi,
Springer 2011, "Introduction to Differential Power Analysis"
http://link.springer.com/article/10.1007%2Fs13389-011-0006-y (open access)


**Cryptographic Hardware

Ingrid Verbauwhede (Eds), "Secure Integrated Circuits and Systems"
Springer 2010, ISBN: 978-0-387-71827-9 (Print) 978-0-387-71829-3 (Online)
http://link.springer.com/book/10.1007%2F978-0-387-71829-3

Francisco Rodríez-Henríez, Arturo Dí Péz, Nazar Abbas Saqib, Çtin Kaya Koç"Cryptographic Algorithms on Reconfigurable Hardware,"
Springer 2007, ISBN: 978-0-387-33883-5 (Print) 978-0-387-36682-1 (Online)
http://link.springer.com/book/10.1007%2F978-0-387-36682-1


** Implementation Attacks

Stefan Mangard, Elisabeth Oswald, Thomas Popp, "Power Analysis Attacks,"
Springer 2007, ISBN: 978-0-387-30857-9 (Print) 978-0-387-38162-6 (Online)
http://link.springer.com/book/10.1007%2F978-0-387-38162-6

Marc Joye, Michael Tunstall, "Fault Analysis in Cryptography,"
Springer 2012, ISBN: 978-3-642-29655-0 (Print) 978-3-642-29656-7 (Online)
http://link.springer.com/book/10.1007%2F978-3-642-29656-7


** Additional References

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, "Hardware Security: Design, Threats, and Safeguards,"
CRC Press 2014, ISBN 9781439895832
https://www.crcpress.com/Hardware-Security-Design-Threats-and-Safeguards/Mukhopadhyay-Chakraborty/9781439895832

Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno, "Cryptography Engineering,"
Wiley 2010, ISBN: 978-0470474242
https://www.schneier.com/books/cryptography_engineering/

Kazuo Sakiyama, Yu Sasaki, Yang Li, "Security of Block Ciphers: From Algorithm Design to Hardware Implementation,"
Wiley 2015, ISBN: 978-1-118-66004-1
http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118660048.html

Venue

Outreach Auditorium,
Indian Institute of Technology, Kanpur

Contact us: +91 (512) 259-7638

Developed at CSE, IIT Kanpur