000 03568nam a22005655i 4500
001 978-981-10-1070-5
003 DE-He213
005 20220801213902.0
007 cr nn 008mamaa
008 190328s2019 si | s |||| 0|eng d
020 _a9789811010705
_9978-981-10-1070-5
024 7 _a10.1007/978-981-10-1070-5
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aKhalid, Ayesha.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_934988
245 1 0 _aDomain Specific High-Level Synthesis for Cryptographic Workloads
_h[electronic resource] /
_cby Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.
250 _a1st ed. 2019.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2019.
300 _aXXII, 237 p. 190 illus., 73 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Architecture and Design Methodologies,
_x2367-3486
505 0 _aIntroduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.
520 _aThis book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.
650 0 _aElectronic circuits.
_919581
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aSecurity systems.
_931879
650 1 4 _aElectronic Circuits and Systems.
_934989
650 2 4 _aCryptology.
_931769
650 2 4 _aSecurity Science and Technology.
_931884
700 1 _aPaul, Goutam.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_934990
700 1 _aChattopadhyay, Anupam.
_eauthor.
_0(orcid)0000-0002-8818-6983
_1https://orcid.org/0000-0002-8818-6983
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_934991
710 2 _aSpringerLink (Online service)
_934992
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811010699
776 0 8 _iPrinted edition:
_z9789811010712
830 0 _aComputer Architecture and Design Methodologies,
_x2367-3486
_934993
856 4 0 _uhttps://doi.org/10.1007/978-981-10-1070-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75713
_d75713