|
|
|
|
LEADER |
03738nam a2200637 4500 |
001 |
978-981-10-8899-5 |
003 |
DE-He213 |
005 |
20191025231135.0 |
007 |
cr nn 008mamaa |
008 |
180516s2018 si | s |||| 0|eng d |
020 |
|
|
|a 9789811088995
|9 978-981-10-8899-5
|
024 |
7 |
|
|a 10.1007/978-981-10-8899-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5102.9
|
050 |
|
4 |
|a TA1637-1638
|
072 |
|
7 |
|a TTBM
|2 bicssc
|
072 |
|
7 |
|a TEC008000
|2 bisacsh
|
072 |
|
7 |
|a TTBM
|2 thema
|
072 |
|
7 |
|a UYS
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Liu, Leibo.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Reconfigurable Cryptographic Processor
|h [electronic resource] /
|c by Leibo Liu, Bo Wang, Shaojun Wei.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XV, 386 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture -- Compilation Techniques -- Case Studies in Design -- Countermeasures against Physical Attacks -- Perspective: Application Trends.
|
520 |
|
|
|a This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also presents a case study of implementing the reconfigurable cryptographic processor "Anole" designed by the authors' team. Moreover, it features discussions on countermeasures against physical attacks utilizing partially and dynamically reconfigurable array architecture to enhance security, as well as the latest trends for reconfigurable cryptographic processors. This book is intended for research scientists, graduate students, and engineers in electronic science and technology, cryptography, network and information security, as well as computer science and technology.
|
650 |
|
0 |
|a Signal processing.
|
650 |
|
0 |
|a Image processing.
|
650 |
|
0 |
|a Speech processing systems.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Microprocessors.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Signal, Image and Speech Processing.
|0 http://scigraph.springernature.com/things/product-market-codes/T24051
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Processor Architectures.
|0 http://scigraph.springernature.com/things/product-market-codes/I13014
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/T24035
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|0 http://scigraph.springernature.com/things/product-market-codes/I16021
|
650 |
2 |
4 |
|a Coding and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15041
|
700 |
1 |
|
|a Wang, Bo.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Wei, Shaojun.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811088988
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811089008
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811342684
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-10-8899-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|