Cryptographic Algorithms on Reconfigurable Hardware [recurso electrónico] / by Francisco Rodríguez-Henríquez, Arturo Díaz Pérez, Nazar Abbas Saqib, Çetin Kaya Koç.
Tipo de material:
TextoSeries Signals and Communication TechnologyEditor: Boston, MA : Springer US, 2007Descripción: XXVI, 362 p. online resourceTipo de contenido: - text
- computer
- recurso en línea
- 9780387366821
- 99780387366821
- ENGINEERING
- COMPUTER HARDWARE
- COMPUTER COMMUNICATION NETWORKS
- DATA STRUCTURES (COMPUTER SCIENCE)
- TELECOMMUNICATION
- SYSTEMS ENGINEERING
- ENGINEERING
- COMMUNICATIONS ENGINEERING, NETWORKS
- DATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY
- CIRCUITS AND SYSTEMS
- COMPUTER HARDWARE
- COMPUTER COMMUNICATION NETWORKS
- SIGNAL, IMAGE AND SPEECH PROCESSING
- 621.382 23
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Libros electrónicos
|
CICY Libro electrónico | Libro electrónico | 621.382 (Browse shelf(Opens below)) | Available |
A Brief Introduction to Modern Cryptography -- Reconfigurable Hardware Technology -- Mathematical Background -- Prime Finite Field Arithmetic -- Binary Finite Field Arithmetic -- Reconfigurable Hardware Implementation of Hash Functions -- General Guidelines for Implementing Block Ciphers in FPGAs -- Architectural Designs For the Advanced Encryption Standard -- Elliptic Curve Cryptography.
This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The concepts and techniques reviewed in this book will make special emphasis on the practical aspects of reconfigurable hardware design, explaining the basic mathematics related and giving a comprehensive description of state-of-the-art implementation techniques. The authors show how high-speed cryptographic algorithms implementations can be achieved on reconfigurable hardware devices without posing prohibited high requirements for hardware resources. The material in this book will be of interest to engineering professionals, programmers, hardware designers, and graduate students interested in the development of security and cryptographic mechanisms at a beginning/intermediate level.
There are no comments on this title.
