Domain Specific High-Level Synthesis for Cryptographic Workloads (Record no. 75713)

000 -LEADER
fixed length control field 03568nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-981-10-1070-5
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801213902.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190328s2019 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789811010705
-- 978-981-10-1070-5
082 04 - CLASSIFICATION NUMBER
Call Number 621.3815
100 1# - AUTHOR NAME
Author Khalid, Ayesha.
245 10 - TITLE STATEMENT
Title Domain Specific High-Level Synthesis for Cryptographic Workloads
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2019.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XXII, 237 p. 190 illus., 73 illus. in color.
490 1# - SERIES STATEMENT
Series statement Computer Architecture and Design Methodologies,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
520 ## - SUMMARY, ETC.
Summary, etc This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
700 1# - AUTHOR 2
Author 2 Paul, Goutam.
700 1# - AUTHOR 2
Author 2 Chattopadhyay, Anupam.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-981-10-1070-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2019.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptography.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security systems.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptology.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security Science and Technology.
700 1# - AUTHOR 2
-- (orcid)0000-0002-8818-6983
-- https://orcid.org/0000-0002-8818-6983
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2367-3486
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.