Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Other Books in This Series

Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
2024
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
2022
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
2022
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
2022
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
2019
Modeling and Simulation of Invasive Applications and Architectures Modeling and Simulation of Invasive Applications and Architectures
2019
Fully Homomorphic Encryption in Real World Applications Fully Homomorphic Encryption in Real World Applications
2019
Domain Specific High-Level Synthesis for Cryptographic Workloads Domain Specific High-Level Synthesis for Cryptographic Workloads
2019
Compact and Fast Machine Learning Accelerator for IoT Devices Compact and Fast Machine Learning Accelerator for IoT Devices
2018
Fault Tolerant Architectures for Cryptography and Hardware Security Fault Tolerant Architectures for Cryptography and Hardware Security
2018
Energy Efficient High Performance Processors Energy Efficient High Performance Processors
2018
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
2017
High-level Estimation and Exploration of Reliability for Multi-Processor System-on-Chip High-level Estimation and Exploration of Reliability for Multi-Processor System-on-Chip
2017
Invasive Tightly Coupled Processor Arrays Invasive Tightly Coupled Processor Arrays
2016