skip to content
Domain specific high-level synthesis for cryptographic workloads Preview this item
ClosePreview this item
Checking...

Domain specific high-level synthesis for cryptographic workloads

Author: Ayesha Khalid; Goutam Paul; Anupam Chattopadhyay
Publisher: Singapore : Springer, 2019.
Series: Computer architecture and design methodologies
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Printed edition:
Printed edition:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ayesha Khalid; Goutam Paul; Anupam Chattopadhyay
ISBN: 9789811010705 9811010706 9811010692 9789811010699 9789811010712 9811010714
OCLC Number: 1091581479
Description: 1 online resource (xxii, 237 pages) : illustrations (some color)
Contents: Introduction --
Background --
Dwarfs of Cryptography --
High Level Synthesis for Symmetric Key Cryptography --
Manual Optimizations for Efficient Designs --
Study of Flexibility --
Study of Scalability --
Efficient Cryptanalytic Hardware --
Conclusion and Future Work.
Series Title: Computer architecture and design methodologies
Responsibility: Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay.

Abstract:

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1091581479> # Domain specific high-level synthesis for cryptographic workloads
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "1091581479" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/si> ;
    schema:about <http://dewey.info/class/005.824/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/9013885452#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/9013885452#Topic/cryptography> ; # Cryptography
    schema:author <http://experiment.worldcat.org/entity/work/data/9013885452#Person/khalid_ayesha> ; # Ayesha Khalid
    schema:author <http://experiment.worldcat.org/entity/work/data/9013885452#Person/paul_goutam> ; # Goutam Paul
    schema:author <http://experiment.worldcat.org/entity/work/data/9013885452#Person/chattopadhyay_anupam> ; # Anupam Chattopadhyay
    schema:bookFormat schema:EBook ;
    schema:datePublished "2019" ;
    schema:description "This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations."@en ;
    schema:description "Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/9013885452> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/2367-3478> ; # Computer architecture and design methodologies,
    schema:isSimilarTo <http://worldcat.org/entity/work/data/9013885452#CreativeWork/> ;
    schema:name "Domain specific high-level synthesis for cryptographic workloads"@en ;
    schema:productID "1091581479" ;
    schema:url <https://link.springer.com/book/10.1007/978-981-10-1070-5> ;
    schema:url <https://doi.org/10.1007/978-981-10-1070-5> ;
    schema:workExample <http://worldcat.org/isbn/9789811010712> ;
    schema:workExample <http://worldcat.org/isbn/9789811010699> ;
    schema:workExample <http://dx.doi.org/10.1007/978-981-10-1070-5> ;
    schema:workExample <http://worldcat.org/isbn/9789811010705> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB968450> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1091581479> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/9013885452#Person/chattopadhyay_anupam> # Anupam Chattopadhyay
    a schema:Person ;
    schema:familyName "Chattopadhyay" ;
    schema:givenName "Anupam" ;
    schema:name "Anupam Chattopadhyay" ;
    .

<http://experiment.worldcat.org/entity/work/data/9013885452#Person/khalid_ayesha> # Ayesha Khalid
    a schema:Person ;
    schema:familyName "Khalid" ;
    schema:givenName "Ayesha" ;
    schema:name "Ayesha Khalid" ;
    .

<http://experiment.worldcat.org/entity/work/data/9013885452#Person/paul_goutam> # Goutam Paul
    a schema:Person ;
    schema:familyName "Paul" ;
    schema:givenName "Goutam" ;
    schema:name "Goutam Paul" ;
    .

<http://experiment.worldcat.org/entity/work/data/9013885452#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://worldcat.org/entity/work/data/9013885452#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1091581479> ; # Domain specific high-level synthesis for cryptographic workloads
    .

<http://worldcat.org/isbn/9789811010699>
    a schema:ProductModel ;
    schema:isbn "9811010692" ;
    schema:isbn "9789811010699" ;
    .

<http://worldcat.org/isbn/9789811010705>
    a schema:ProductModel ;
    schema:isbn "9811010706" ;
    schema:isbn "9789811010705" ;
    .

<http://worldcat.org/isbn/9789811010712>
    a schema:ProductModel ;
    schema:isbn "9811010714" ;
    schema:isbn "9789811010712" ;
    .

<http://worldcat.org/issn/2367-3478> # Computer architecture and design methodologies,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1091581479> ; # Domain specific high-level synthesis for cryptographic workloads
    schema:issn "2367-3478" ;
    schema:name "Computer architecture and design methodologies," ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.