找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptographic Algorithms on Reconfigurable Hardware; Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e Book 2007 Springer-Verlag US 2007

[復(fù)制鏈接]
查看: 22991|回復(fù): 45
樓主
發(fā)表于 2025-3-21 19:15:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware
編輯Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e
視頻videohttp://file.papertrans.cn/241/240534/240534.mp4
概述Presents a comprehensive methodology for efficient implementation of cryptographic algorithms on reconfigurable hardware devices.Special emphasis on the practical aspects of reconfigurable hardware de
叢書(shū)名稱(chēng)Signals and Communication Technology
圖書(shū)封面Titlebook: Cryptographic Algorithms on Reconfigurable Hardware;  Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e Book 2007 Springer-Verlag US 2007
描述.Cryptographic solutions using software methods can be used for those security applications where data traffic is not too large and low encryption rate is tolerable. On the other hand, hardware methods offer high-speed solutions making them highly suitable for applications where data traffic is fast and large data is required to be encrypted in real time. VLSI (also known as ASIC), and FPGAs (Field Programmable Gate Arrays) are two alternatives for implementing cryptographic algorithms in hardware. FPGAs offer several benefits for cryptographic algorithm implementations over VLSI as they offer high flexibility. Due to its reconfigurable property, keys can be changed rapidly. Moreover, basic primitives in most cryptographic algorithms can efficiently be implemented in FPGAs...Since the invention of the Data Encryption Standard (DES), some 40 years ago, a considerable amount of cryptographic algorithm implementation literature has been produced both, for software and hardware platforms. Unfortunately, virtually there exists no book explaining how the main cryptographic algorithms can be implemented on reconfigurable hardware devices...This book will cover the study of computational m
出版日期Book 2007
關(guān)鍵詞ASIC; DES; Elliptic Curve Cryptography; FPGA; Hardware; IC; Software; VLSI; algorithm; algorithms; computer; fi
版次1
doihttps://doi.org/10.1007/978-0-387-36682-1
isbn_softcover978-1-4419-4156-5
isbn_ebook978-0-387-36682-1Series ISSN 1860-4862 Series E-ISSN 1860-4870
issn_series 1860-4862
copyrightSpringer-Verlag US 2007
The information of publication is updating

書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware影響因子(影響力)




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware被引頻次




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware被引頻次學(xué)科排名




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware年度引用




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware年度引用學(xué)科排名




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware讀者反饋




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:21:07 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:33:02 | 只看該作者
Tetsuya Sumi,Sameh A. Kantoush,Mohamed Saberep description of MD5 has been provided which we hope will be useful for understanding the mathematical and logical operations involved in it. The study and analysis of MD5 will be utilized as a base for explaining the most recent SHA2 family of hash algorithms.
地板
發(fā)表于 2025-3-22 07:59:35 | 只看該作者
Tetsuya Sumi,Sameh A. Kantoush,Mohamed Sabertudied and analyzed in order to obtain efficient implementations of them on reconfigurable devices. As a case of study, those techniques are applied to the Data Encryption Standard (DES), thus producing a compact DES core.
5#
發(fā)表于 2025-3-22 08:52:50 | 只看該作者
6#
發(fā)表于 2025-3-22 15:26:26 | 只看該作者
7#
發(fā)表于 2025-3-22 18:13:47 | 只看該作者
General Guidelines for Implementing Block Ciphers in FPGAs,tudied and analyzed in order to obtain efficient implementations of them on reconfigurable devices. As a case of study, those techniques are applied to the Data Encryption Standard (DES), thus producing a compact DES core.
8#
發(fā)表于 2025-3-22 22:04:33 | 只看該作者
Architectural Designs For the Advanced Encryption Standard,eo conferencing where high performance is required. The target throughput, expressed in gigabits per second (Gbps), must be specified, and to achieve such a high performance we can replicate several functional units to increase parallelism. That would however imply higher power and hardware area requirements.
9#
發(fā)表于 2025-3-23 05:00:51 | 只看該作者
10#
發(fā)表于 2025-3-23 06:48:16 | 只看該作者
Book 2007e is tolerable. On the other hand, hardware methods offer high-speed solutions making them highly suitable for applications where data traffic is fast and large data is required to be encrypted in real time. VLSI (also known as ASIC), and FPGAs (Field Programmable Gate Arrays) are two alternatives f
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 23:43
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
乐业县| 辽宁省| 济宁市| 吉水县| 江津市| 科技| 江门市| 乐昌市| 岳阳县| 松江区| 开江县| 鲁山县| 辽宁省| 稷山县| 京山县| 碌曲县| 淮滨县| 县级市| 阿克苏市| 那坡县| 谢通门县| 淳安县| 河源市| 玉龙| 磴口县| 静安区| 济源市| 叙永县| 久治县| 左云县| 西丰县| 东乡县| 惠来县| 逊克县| 关岭| 宁乡县| 桂阳县| 班戈县| 资阳市| 甘孜县| 图们市|