<p><span>This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and
Reconfigurable Cryptographic Processor
β Scribed by Leibo Liu, Bo Wang, Shaojun Wei
- Publisher
- Springer
- Year
- 2018
- Tongue
- English
- Leaves
- 393
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also presents a case study of implementing the reconfigurable cryptographic processor βAnoleβ designed by the authorsβ team. Moreover, it features discussions on countermeasures against physical attacks utilizing partially and dynamically reconfigurable array architecture to enhance security, as well as the latest trends for reconfigurable cryptographic processors. This book is intended for research scientists, graduate students, and engineers in electronic science and technology, cryptography, network and information security, as well as computer science and technology.
β¦ Subjects
Information Theory;Computer Science;Computers & Technology;Microprocessor Design;Microprocessors & System Design;Hardware & DIY;Computers & Technology;Design & Architecture;Hardware & DIY;Computers & Technology;Internet, Groupware, & Telecommunications;Networking & Cloud Computing;Computers & Technology;Algorithms;Data Structures;Genetic;Memory Management;Programming;Computers & Technology;Security & Encryption;Cryptography;Encryption;Hacking;Network Security;Privacy & Online Safety;Security Cer
π SIMILAR VOLUMES
<P>Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algori
<p><P>This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The concepts and techniques reviewed in this book will make special emphasis
<p>This book focuses on domain-specific heterogeneous reconfigurable architectures, demonstrating for readers a computing platform which is flexible enough to support multiple standards, multiple modes, and multiple algorithms. The content is multi-disciplinary, covering areas of wireless communicat
<p>Run-time Adaptation for Reconfigurable Embedded Processors by: Lars Bauer JΓΆrg Henkel Embedded processors are the heart of embedded systems. Reconfigurable embedded processors comprise an extended instruction set that is implemented using a reconfigurable fabric (similar to a field-programmable g