|
|
|
|
LEADER |
03548nam a2200517 4500 |
001 |
978-981-10-1070-5 |
003 |
DE-He213 |
005 |
20191024022016.0 |
007 |
cr nn 008mamaa |
008 |
190328s2019 si | s |||| 0|eng d |
020 |
|
|
|a 9789811010705
|9 978-981-10-1070-5
|
024 |
7 |
|
|a 10.1007/978-981-10-1070-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK7888.4
|
072 |
|
7 |
|a TJFC
|2 bicssc
|
072 |
|
7 |
|a TEC008010
|2 bisacsh
|
072 |
|
7 |
|a TJFC
|2 thema
|
082 |
0 |
4 |
|a 621.3815
|2 23
|
100 |
1 |
|
|a Khalid, Ayesha.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Domain Specific High-Level Synthesis for Cryptographic Workloads
|h [electronic resource] /
|c by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XXII, 237 p. 190 illus., 73 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Computer Architecture and Design Methodologies,
|x 2367-3478
|
505 |
0 |
|
|a Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
|
520 |
|
|
|a This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
|
650 |
|
0 |
|a Electronic circuits.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a System safety.
|
650 |
1 |
4 |
|a Circuits and Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/T24068
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Security Science and Technology.
|0 http://scigraph.springernature.com/things/product-market-codes/P31080
|
700 |
1 |
|
|a Paul, Goutam.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Chattopadhyay, Anupam.
|e author.
|0 (orcid)0000-0002-8818-6983
|1 https://orcid.org/0000-0002-8818-6983
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811010699
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811010712
|
830 |
|
0 |
|a Computer Architecture and Design Methodologies,
|x 2367-3478
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-10-1070-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|