Domain Specific High-Level Synthesis for Cryptographic Workloads (Record no. 75713)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03568nam a22005655i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-10-1070-5 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801213902.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190328s2019 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789811010705 |
-- | 978-981-10-1070-5 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.3815 |
100 1# - AUTHOR NAME | |
Author | Khalid, Ayesha. |
245 10 - TITLE STATEMENT | |
Title | Domain Specific High-Level Synthesis for Cryptographic Workloads |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XXII, 237 p. 190 illus., 73 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Computer Architecture and Design Methodologies, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations. |
700 1# - AUTHOR 2 | |
Author 2 | Paul, Goutam. |
700 1# - AUTHOR 2 | |
Author 2 | Chattopadhyay, Anupam. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-10-1070-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2019. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic circuits. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security systems. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic Circuits and Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Science and Technology. |
700 1# - AUTHOR 2 | |
-- | (orcid)0000-0002-8818-6983 |
-- | https://orcid.org/0000-0002-8818-6983 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2367-3486 |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.