logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Domain Specific Highlevel Synthesis For Cryptographic Workloads 1st Ed Ayesha Khalid

  • SKU: BELL-10493402
Domain Specific Highlevel Synthesis For Cryptographic Workloads 1st Ed Ayesha Khalid
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Domain Specific Highlevel Synthesis For Cryptographic Workloads 1st Ed Ayesha Khalid instant download after payment.

Publisher: Springer Singapore
File Extension: PDF
File size: 10.35 MB
Author: Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
ISBN: 9789811010699, 9789811010705, 9811010692, 9811010706
Language: English
Year: 2019
Edition: 1st ed.

Product desciption

Domain Specific Highlevel Synthesis For Cryptographic Workloads 1st Ed Ayesha Khalid by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay 9789811010699, 9789811010705, 9811010692, 9811010706 instant download after payment.


This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.


Related Products