語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Domain specific high-level synthesis...
~
Khalid, Ayesha.
FindBook
Google Book
Amazon
博客來
Domain specific high-level synthesis for cryptographic workloads
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Domain specific high-level synthesis for cryptographic workloads/ by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
作者:
Khalid, Ayesha.
其他作者:
Paul, Goutam.
出版者:
Singapore :Springer Singapore : : 2019.,
面頁冊數:
xxii, 237 p. :ill. (some col.), digital ;24 cm.
內容註:
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
Contained By:
Springer eBooks
標題:
Data encryption (Computer science) -
電子資源:
https://doi.org/10.1007/978-981-10-1070-5
ISBN:
9789811010705
Domain specific high-level synthesis for cryptographic workloads
Khalid, Ayesha.
Domain specific high-level synthesis for cryptographic workloads
[electronic resource] /by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay. - Singapore :Springer Singapore :2019. - xxii, 237 p. :ill. (some col.), digital ;24 cm. - Computer architecture and design methodologies,2367-3478. - Computer architecture and design methodologies..
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs) These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
ISBN: 9789811010705
Standard No.: 10.1007/978-981-10-1070-5doiSubjects--Topical Terms:
579162
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.824
Domain specific high-level synthesis for cryptographic workloads
LDR
:02380nmm a2200337 a 4500
001
2180551
003
DE-He213
005
20190328135539.0
006
m d
007
cr nn 008maaau
008
191122s2019 si s 0 eng d
020
$a
9789811010705
$q
(electronic bk.)
020
$a
9789811010699
$q
(paper)
024
7
$a
10.1007/978-981-10-1070-5
$2
doi
035
$a
978-981-10-1070-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
K45 2019
100
1
$a
Khalid, Ayesha.
$3
3386728
245
1 0
$a
Domain specific high-level synthesis for cryptographic workloads
$h
[electronic resource] /
$c
by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
xxii, 237 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Computer architecture and design methodologies,
$x
2367-3478
505
0
$a
Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
520
$a
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs) These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Cryptography.
$3
532586
650
1 4
$a
Circuits and Systems.
$3
896527
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Security Science and Technology.
$3
1531662
700
1
$a
Paul, Goutam.
$3
3386729
700
1
$a
Chattopadhyay, Anupam.
$3
1001810
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Computer architecture and design methodologies.
$3
2203505
856
4 0
$u
https://doi.org/10.1007/978-981-10-1070-5
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9370398
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入