Reconfigurable cryptographic processor
This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also pre...
Main Author: | Liu, Leibo, |
---|---|
Other Authors: | Wang, Bo,, Wei, Shaojun, 1958-, SpringerLink (Online service) |
Format: | eBook |
Language: | English Chinese |
Published: |
Singapore :
Springer,
2018.
|
Physical Description: |
1 online resource (xv, 386 pages) : illustrations. |
Subjects: |
LEADER | 05248cam a2200985 i 4500 | ||
---|---|---|---|
001 | 1036986120 | ||
003 | OCoLC | ||
005 | 20240223121953.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 180521s2018 si a ob 000 0 eng d | ||
015 | |a GBB968119 |2 bnb | ||
016 | 7 | |a 019340405 |2 Uk | |
019 | |a 1037282225 |a 1037815029 |a 1047642818 |a 1055392341 |a 1058863284 |a 1081224343 |a 1097097254 |a 1113437982 |a 1116045949 |a 1160055361 |a 1162686273 | ||
020 | |a 9789811088995 |q (electronic bk.) | ||
020 | |a 9811088993 |q (electronic bk.) | ||
020 | |a 9811088985 | ||
020 | |a 9789811088988 | ||
020 | |z 9789811088988 |q (print) | ||
024 | 7 | |a 10.1007/978-981-10-8899-5 |2 doi | |
035 | |a (OCoLC)1036986120 |z (OCoLC)1037282225 |z (OCoLC)1037815029 |z (OCoLC)1047642818 |z (OCoLC)1055392341 |z (OCoLC)1058863284 |z (OCoLC)1081224343 |z (OCoLC)1097097254 |z (OCoLC)1113437982 |z (OCoLC)1116045949 |z (OCoLC)1160055361 |z (OCoLC)1162686273 | ||
037 | |a com.springer.onix.9789811088995 |b Springer Nature | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d GW5XE |d N$T |d AZU |d UAB |d OCLCF |d OCLCQ |d UPM |d MERER |d WAU |d VT2 |d OCLCQ |d U3W |d CNCEN |d AU@ |d WYU |d OCLCQ |d LVT |d CAUOI |d LEAUB |d UKAHL |d UKMGB |d EBLCP |d YDX |d OCLCQ |d ADU |d OCLCQ |d BNG |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
041 | 1 | |a eng |h chi | |
049 | |a COM6 | ||
050 | 4 | |a QA76.9 |b .A3 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
072 | 7 | |a TTBM |2 bicssc | |
072 | 7 | |a UYS |2 bicssc | |
082 | 0 | 4 | |a 004 |2 23 |
100 | 1 | |a Liu, Leibo, |e author. | |
245 | 1 | 0 | |a Reconfigurable cryptographic processor / |c Leibo Liu, Bo Wang, Shaojun Wei. |
264 | 1 | |a Singapore : |b Springer, |c 2018. | |
300 | |a 1 online resource (xv, 386 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file. | ||
347 | |b PDF. | ||
504 | |a Includes bibliographical references. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed May 21, 2018). | |
505 | 0 | |a Introduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture -- Compilation Techniques -- Case Studies in Design -- Countermeasures against Physical Attacks -- Perspective: Application Trends. | |
520 | |a This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also presents a case study of implementing the reconfigurable cryptographic processor "Anole" designed by the authors' team. Moreover, it features discussions on countermeasures against physical attacks utilizing partially and dynamically reconfigurable array architecture to enhance security, as well as the latest trends for reconfigurable cryptographic processors. This book is intended for research scientists, graduate students, and engineers in electronic science and technology, cryptography, network and information security, as well as computer science and technology. | ||
650 | 0 | |a Adaptive computing systems. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 6 | |a Systèmes adaptatifs (Informatique) | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh. | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh. | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh. | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh. | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh. | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh. | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh. | |
650 | 7 | |a Adaptive computing systems. |2 fast. | |
650 | 7 | |a Data encryption (Computer science) |2 fast. | |
700 | 1 | |a Wang, Bo, |e author. | |
700 | 1 | |a Wei, Shaojun, |d 1958- |e author. | |
710 | 2 | |a SpringerLink (Online service) | |
776 | 0 | 8 | |i Printed edition: |z 9789811088988. |
907 | |a .b57833758 |b multi |c - |d 180702 |e 240321 | ||
998 | |a (3)cue |a cu |b 240227 |c m |d z |e - |f eng |g si |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Overnight, in 2023.01 | ||
948 | |a MARCIVE Over, 07/2021 | ||
948 | |a MARCIVE Comp, 2019.12 | ||
948 | |a MARCIVE Q3&4 2018 | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2023.01 | ||
995 | |a Loaded with m2btab.ltiac in 2021.07 | ||
995 | |a Loaded with m2btab.elec in 2021.06 | ||
995 | |a Loaded with m2btab.ltiac in 2019.12 | ||
995 | |a Loaded with m2btab.ltiac in 2019.01 | ||
995 | 0 | 0 | |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.08 |
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150574447 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-981-10-8899-5 |3 SpringerLink |z Click here for access |