語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Domain Specific High-Level Synthesis...
~
Khalid, Ayesha.
Domain Specific High-Level Synthesis for Cryptographic Workloads
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Domain Specific High-Level Synthesis for Cryptographic Workloads/ by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
作者:
Khalid, Ayesha.
其他作者:
Paul, Goutam.
面頁冊數:
XXII, 237 p. 190 illus., 73 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Electronic circuits. -
電子資源:
https://doi.org/10.1007/978-981-10-1070-5
ISBN:
9789811010705
Domain Specific High-Level Synthesis for Cryptographic Workloads
Khalid, Ayesha.
Domain Specific High-Level Synthesis for Cryptographic Workloads
[electronic resource] /by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay. - 1st ed. 2019. - XXII, 237 p. 190 illus., 73 illus. in color.online resource. - Computer Architecture and Design Methodologies,2367-3478. - Computer Architecture and Design Methodologies,.
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
ISBN: 9789811010705
Standard No.: 10.1007/978-981-10-1070-5doiSubjects--Topical Terms:
563332
Electronic circuits.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Domain Specific High-Level Synthesis for Cryptographic Workloads
LDR
:02690nam a22003975i 4500
001
1006853
003
DE-He213
005
20200701004549.0
007
cr nn 008mamaa
008
210106s2019 si | s |||| 0|eng d
020
$a
9789811010705
$9
978-981-10-1070-5
024
7
$a
10.1007/978-981-10-1070-5
$2
doi
035
$a
978-981-10-1070-5
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
100
1
$a
Khalid, Ayesha.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1300502
245
1 0
$a
Domain Specific High-Level Synthesis for Cryptographic Workloads
$h
[electronic resource] /
$c
by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
250
$a
1st ed. 2019.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
XXII, 237 p. 190 illus., 73 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
505
0
$a
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
520
$a
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
650
0
$a
Electronic circuits.
$3
563332
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
System safety.
$3
639363
650
1 4
$a
Circuits and Systems.
$3
670901
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Security Science and Technology.
$3
783419
700
1
$a
Paul, Goutam.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1079410
700
1
$a
Chattopadhyay, Anupam.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
896534
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811010699
776
0 8
$i
Printed edition:
$z
9789811010712
830
0
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
$3
1269988
856
4 0
$u
https://doi.org/10.1007/978-981-10-1070-5
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入