|
|
|
|
LEADER |
03365nam a22005775i 4500 |
001 |
978-0-387-36682-1 |
003 |
DE-He213 |
005 |
20151204153422.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387366821
|9 978-0-387-36682-1
|
024 |
7 |
|
|a 10.1007/978-0-387-36682-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a THR
|2 bicssc
|
072 |
|
7 |
|a TEC007000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.3
|2 23
|
100 |
1 |
|
|a Rodríguez-Henríquez, Francisco.
|e author.
|
245 |
1 |
0 |
|a Cryptographic Algorithms on Reconfigurable Hardware
|h [electronic resource] /
|c by Francisco Rodríguez-Henríquez, Arturo Díaz Pérez, Nazar Abbas Saqib, Çetin Kaya Koç.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2007.
|
300 |
|
|
|a XXVI, 362 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Signals and Communication Technology,
|x 1860-4862
|
505 |
0 |
|
|a A Brief Introduction to Modern Cryptography -- Reconfigurable Hardware Technology -- Mathematical Background -- Prime Finite Field Arithmetic -- Binary Finite Field Arithmetic -- Reconfigurable Hardware Implementation of Hash Functions -- General Guidelines for Implementing Block Ciphers in FPGAs -- Architectural Designs For the Advanced Encryption Standard -- Elliptic Curve Cryptography.
|
520 |
|
|
|a This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The concepts and techniques reviewed in this book will make special emphasis on the practical aspects of reconfigurable hardware design, explaining the basic mathematics related and giving a comprehensive description of state-of-the-art implementation techniques. The authors show how high-speed cryptographic algorithms implementations can be achieved on reconfigurable hardware devices without posing prohibited high requirements for hardware resources. The material in this book will be of interest to engineering professionals, programmers, hardware designers, and graduate students interested in the development of security and cryptographic mechanisms at a beginning/intermediate level.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Electronic circuits.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Electrical Engineering.
|
650 |
2 |
4 |
|a Computer Engineering.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Circuits and Systems.
|
700 |
1 |
|
|a Pérez, Arturo Díaz.
|e author.
|
700 |
1 |
|
|a Saqib, Nazar Abbas.
|e author.
|
700 |
1 |
|
|a Koç, Çetin Kaya.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387338835
|
830 |
|
0 |
|a Signals and Communication Technology,
|x 1860-4862
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-36682-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|