Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Domain Specific High-Level Synthesis...
~
Khalid, Ayesha.
Domain Specific High-Level Synthesis for Cryptographic Workloads
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Domain Specific High-Level Synthesis for Cryptographic Workloads/ by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
Author:
Khalid, Ayesha.
other author:
Paul, Goutam.
Description:
XXII, 237 p. 190 illus., 73 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Electronic circuits. -
Online resource:
https://doi.org/10.1007/978-981-10-1070-5
ISBN:
9789811010705
Domain Specific High-Level Synthesis for Cryptographic Workloads
Khalid, Ayesha.
Domain Specific High-Level Synthesis for Cryptographic Workloads
[electronic resource] /by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay. - 1st ed. 2019. - XXII, 237 p. 190 illus., 73 illus. in color.online resource. - Computer Architecture and Design Methodologies,2367-3478. - Computer Architecture and Design Methodologies,.
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
ISBN: 9789811010705
Standard No.: 10.1007/978-981-10-1070-5doiSubjects--Topical Terms:
563332
Electronic circuits.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Domain Specific High-Level Synthesis for Cryptographic Workloads
LDR
:02690nam a22003975i 4500
001
1006853
003
DE-He213
005
20200701004549.0
007
cr nn 008mamaa
008
210106s2019 si | s |||| 0|eng d
020
$a
9789811010705
$9
978-981-10-1070-5
024
7
$a
10.1007/978-981-10-1070-5
$2
doi
035
$a
978-981-10-1070-5
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
100
1
$a
Khalid, Ayesha.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1300502
245
1 0
$a
Domain Specific High-Level Synthesis for Cryptographic Workloads
$h
[electronic resource] /
$c
by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
250
$a
1st ed. 2019.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
XXII, 237 p. 190 illus., 73 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
505
0
$a
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
520
$a
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
650
0
$a
Electronic circuits.
$3
563332
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
System safety.
$3
639363
650
1 4
$a
Circuits and Systems.
$3
670901
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Security Science and Technology.
$3
783419
700
1
$a
Paul, Goutam.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1079410
700
1
$a
Chattopadhyay, Anupam.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
896534
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811010699
776
0 8
$i
Printed edition:
$z
9789811010712
830
0
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
$3
1269988
856
4 0
$u
https://doi.org/10.1007/978-981-10-1070-5
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login