Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Domain specific high-level synthesis...
~
Chattopadhyay, Anupam.
Domain specific high-level synthesis for cryptographic workloads
Record Type:
Electronic resources : Monograph/item
Title/Author:
Domain specific high-level synthesis for cryptographic workloadsby Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
Author:
Khalid, Ayesha.
other author:
Paul, Goutam.
Published:
Singapore :Springer Singapore :2019.
Description:
xxii, 237 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science)
Online resource:
https://doi.org/10.1007/978-981-10-1070-5
ISBN:
9789811010705$q(electronic bk.)
Domain specific high-level synthesis for cryptographic workloads
Khalid, Ayesha.
Domain specific high-level synthesis for cryptographic workloads
[electronic resource] /by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay. - Singapore :Springer Singapore :2019. - xxii, 237 p. :ill. (some col.), digital ;24 cm. - Computer architecture and design methodologies,2367-3478. - Computer architecture and design methodologies..
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs) These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
ISBN: 9789811010705$q(electronic bk.)
Standard No.: 10.1007/978-981-10-1070-5doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.824
Domain specific high-level synthesis for cryptographic workloads
LDR
:02380nmm a2200337 a 4500
001
554617
003
DE-He213
005
20190328135539.0
006
m d
007
cr nn 008maaau
008
191118s2019 si s 0 eng d
020
$a
9789811010705$q(electronic bk.)
020
$a
9789811010699$q(paper)
024
7
$a
10.1007/978-981-10-1070-5
$2
doi
035
$a
978-981-10-1070-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
K45 2019
100
1
$a
Khalid, Ayesha.
$3
836381
245
1 0
$a
Domain specific high-level synthesis for cryptographic workloads
$h
[electronic resource] /
$c
by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
xxii, 237 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Computer architecture and design methodologies,
$x
2367-3478
505
0
$a
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
520
$a
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs) These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Cryptography.
$3
189522
650
1 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Security Science and Technology.
$3
510148
700
1
$a
Paul, Goutam.
$3
836382
700
1
$a
Chattopadhyay, Anupam.
$3
338679
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Computer architecture and design methodologies.
$3
753537
856
4 0
$u
https://doi.org/10.1007/978-981-10-1070-5
950
$a
Engineering (Springer-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000167479
電子館藏
1圖書
電子書
EB QA76.9.A25 K45 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-981-10-1070-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login