000 | 03568nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-981-10-1070-5 | ||
003 | DE-He213 | ||
005 | 20220801213902.0 | ||
007 | cr nn 008mamaa | ||
008 | 190328s2019 si | s |||| 0|eng d | ||
020 |
_a9789811010705 _9978-981-10-1070-5 |
||
024 | 7 |
_a10.1007/978-981-10-1070-5 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aKhalid, Ayesha. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _934988 |
|
245 | 1 | 0 |
_aDomain Specific High-Level Synthesis for Cryptographic Workloads _h[electronic resource] / _cby Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2019. |
|
300 |
_aXXII, 237 p. 190 illus., 73 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputer Architecture and Design Methodologies, _x2367-3486 |
|
505 | 0 | _aIntroduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work. | |
520 | _aThis book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _934989 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
700 | 1 |
_aPaul, Goutam. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _934990 |
|
700 | 1 |
_aChattopadhyay, Anupam. _eauthor. _0(orcid)0000-0002-8818-6983 _1https://orcid.org/0000-0002-8818-6983 _4aut _4http://id.loc.gov/vocabulary/relators/aut _934991 |
|
710 | 2 |
_aSpringerLink (Online service) _934992 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811010699 |
776 | 0 | 8 |
_iPrinted edition: _z9789811010712 |
830 | 0 |
_aComputer Architecture and Design Methodologies, _x2367-3486 _934993 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-10-1070-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c75713 _d75713 |