Domain Specific High-Level Synthesis for Cryptographic Workloads Domain Specific High-Level Synthesis for Cryptographic Workloads
Computer Architecture and Design Methodologies

Domain Specific High-Level Synthesis for Cryptographic Workloads

Ayesha Khalid et autres
    • 87,99 €
    • 87,99 €

Description de l’éditeur

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.

GENRE
Professionnel et technique
SORTIE
2019
28 mars
LANGUE
EN
Anglais
LONGUEUR
259
Pages
ÉDITIONS
Springer Nature Singapore
DÉTAILS DU FOURNISSEUR
Springer Science & Business Media LLC
TAILLE
22,1
Mo
Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
2024
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
2022
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
2022
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
2022
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
2021
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
2019