Cryptographic Algorithms on Reconfigurable Hardware
✍ Scribed by Francisco Rodriguez-Henriquez, N.A. Saqib, Arturo Díaz Pérez, Cetin Kaya Koc
- Publisher
- Springer
- Year
- 2006
- Tongue
- English
- Leaves
- 384
- Series
- Signals and Communication Technology
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.
✦ Table of Contents
Front-Matter......Page 1
1 Introduction......Page 25
2 A Brief Introduction to Modern Cryptography......Page 30
3 Reconfigurable Hardware Technology......Page 57
4 Mathematical Background......Page 85
5 Prime Finite Field Arithmetic......Page 111
6 Binary Finite Field Arithmetic......Page 161
7 Reconfigurable Hardware Implementation of
Hash Functions......Page 211
8 General Guidelines for Implementing Block
Ciphers in FPGAs......Page 243
9 Architectural Designs For the Advanced
Encryption Standard......Page 267
10 Elliptic Curve Cryptography......Page 312
Back-Matter......Page 350
✦ Subjects
Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;
📜 SIMILAR VOLUMES
<p><P>This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The concepts and techniques reviewed in this book will make special emphasis
<div><div>Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation&nbsp;involve much&
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic
<p>This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also
<p><span>This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and