000 | 03501nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-981-10-8899-5 | ||
003 | DE-He213 | ||
005 | 20220801215921.0 | ||
007 | cr nn 008mamaa | ||
008 | 180516s2018 si | s |||| 0|eng d | ||
020 |
_a9789811088995 _9978-981-10-8899-5 |
||
024 | 7 |
_a10.1007/978-981-10-8899-5 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aLiu, Leibo. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _947237 |
|
245 | 1 | 0 |
_aReconfigurable Cryptographic Processor _h[electronic resource] / _cby Leibo Liu, Bo Wang, Shaojun Wei. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2018. |
|
300 |
_aXV, 386 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture -- Compilation Techniques -- Case Studies in Design -- Countermeasures against Physical Attacks -- Perspective: Application Trends. | |
520 | _aThis book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also presents a case study of implementing the reconfigurable cryptographic processor “Anole” designed by the authors’ team. Moreover, it features discussions on countermeasures against physical attacks utilizing partially and dynamically reconfigurable array architecture to enhance security, as well as the latest trends for reconfigurable cryptographic processors. This book is intended for research scientists, graduate students, and engineers in electronic science and technology, cryptography, network and information security, as well as computer science and technology. | ||
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aMicroprocessors. _947238 |
|
650 | 0 |
_aComputer architecture. _93513 |
|
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 1 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aProcessor Architectures. _947239 |
650 | 2 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aCoding and Information Theory. _947240 |
700 | 1 |
_aWang, Bo. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _947241 |
|
700 | 1 |
_aWei, Shaojun. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _947242 |
|
710 | 2 |
_aSpringerLink (Online service) _947243 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811088988 |
776 | 0 | 8 |
_iPrinted edition: _z9789811089008 |
776 | 0 | 8 |
_iPrinted edition: _z9789811342684 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-10-8899-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78001 _d78001 |