語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Domain specific high-level synthesis...
~
Chattopadhyay, Anupam.
Domain specific high-level synthesis for cryptographic workloads
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Domain specific high-level synthesis for cryptographic workloadsby Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
作者:
Khalid, Ayesha.
其他作者:
Paul, Goutam.
出版者:
Singapore :Springer Singapore :2019.
面頁冊數:
xxii, 237 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
標題:
Data encryption (Computer science)
電子資源:
https://doi.org/10.1007/978-981-10-1070-5
ISBN:
9789811010705$q(electronic bk.)
Domain specific high-level synthesis for cryptographic workloads
Khalid, Ayesha.
Domain specific high-level synthesis for cryptographic workloads
[electronic resource] /by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay. - Singapore :Springer Singapore :2019. - xxii, 237 p. :ill. (some col.), digital ;24 cm. - Computer architecture and design methodologies,2367-3478. - Computer architecture and design methodologies..
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs) These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
ISBN: 9789811010705$q(electronic bk.)
Standard No.: 10.1007/978-981-10-1070-5doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.824
Domain specific high-level synthesis for cryptographic workloads
LDR
:02380nmm a2200337 a 4500
001
554617
003
DE-He213
005
20190328135539.0
006
m d
007
cr nn 008maaau
008
191118s2019 si s 0 eng d
020
$a
9789811010705$q(electronic bk.)
020
$a
9789811010699$q(paper)
024
7
$a
10.1007/978-981-10-1070-5
$2
doi
035
$a
978-981-10-1070-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
K45 2019
100
1
$a
Khalid, Ayesha.
$3
836381
245
1 0
$a
Domain specific high-level synthesis for cryptographic workloads
$h
[electronic resource] /
$c
by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
xxii, 237 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Computer architecture and design methodologies,
$x
2367-3478
505
0
$a
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
520
$a
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs) These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Cryptography.
$3
189522
650
1 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Security Science and Technology.
$3
510148
700
1
$a
Paul, Goutam.
$3
836382
700
1
$a
Chattopadhyay, Anupam.
$3
338679
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Computer architecture and design methodologies.
$3
753537
856
4 0
$u
https://doi.org/10.1007/978-981-10-1070-5
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000167479
電子館藏
1圖書
電子書
EB QA76.9.A25 K45 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-10-1070-5
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入