找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptographic Algorithms on Reconfigurable Hardware; Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e Book 2007 Springer-Verlag US 2007

[復(fù)制鏈接]
查看: 22984|回復(fù): 45
樓主
發(fā)表于 2025-3-21 19:15:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Cryptographic Algorithms on Reconfigurable Hardware
編輯Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e
視頻videohttp://file.papertrans.cn/241/240534/240534.mp4
概述Presents a comprehensive methodology for efficient implementation of cryptographic algorithms on reconfigurable hardware devices.Special emphasis on the practical aspects of reconfigurable hardware de
叢書名稱Signals and Communication Technology
圖書封面Titlebook: Cryptographic Algorithms on Reconfigurable Hardware;  Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e Book 2007 Springer-Verlag US 2007
描述.Cryptographic solutions using software methods can be used for those security applications where data traffic is not too large and low encryption rate is tolerable. On the other hand, hardware methods offer high-speed solutions making them highly suitable for applications where data traffic is fast and large data is required to be encrypted in real time. VLSI (also known as ASIC), and FPGAs (Field Programmable Gate Arrays) are two alternatives for implementing cryptographic algorithms in hardware. FPGAs offer several benefits for cryptographic algorithm implementations over VLSI as they offer high flexibility. Due to its reconfigurable property, keys can be changed rapidly. Moreover, basic primitives in most cryptographic algorithms can efficiently be implemented in FPGAs...Since the invention of the Data Encryption Standard (DES), some 40 years ago, a considerable amount of cryptographic algorithm implementation literature has been produced both, for software and hardware platforms. Unfortunately, virtually there exists no book explaining how the main cryptographic algorithms can be implemented on reconfigurable hardware devices...This book will cover the study of computational m
出版日期Book 2007
關(guān)鍵詞ASIC; DES; Elliptic Curve Cryptography; FPGA; Hardware; IC; Software; VLSI; algorithm; algorithms; computer; fi
版次1
doihttps://doi.org/10.1007/978-0-387-36682-1
isbn_softcover978-1-4419-4156-5
isbn_ebook978-0-387-36682-1Series ISSN 1860-4862 Series E-ISSN 1860-4870
issn_series 1860-4862
copyrightSpringer-Verlag US 2007
The information of publication is updating

書目名稱Cryptographic Algorithms on Reconfigurable Hardware影響因子(影響力)




書目名稱Cryptographic Algorithms on Reconfigurable Hardware影響因子(影響力)學(xué)科排名




書目名稱Cryptographic Algorithms on Reconfigurable Hardware網(wǎng)絡(luò)公開度




書目名稱Cryptographic Algorithms on Reconfigurable Hardware網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cryptographic Algorithms on Reconfigurable Hardware被引頻次




書目名稱Cryptographic Algorithms on Reconfigurable Hardware被引頻次學(xué)科排名




書目名稱Cryptographic Algorithms on Reconfigurable Hardware年度引用




書目名稱Cryptographic Algorithms on Reconfigurable Hardware年度引用學(xué)科排名




書目名稱Cryptographic Algorithms on Reconfigurable Hardware讀者反饋




書目名稱Cryptographic Algorithms on Reconfigurable Hardware讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:21:07 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:33:02 | 只看該作者
Tetsuya Sumi,Sameh A. Kantoush,Mohamed Saberep description of MD5 has been provided which we hope will be useful for understanding the mathematical and logical operations involved in it. The study and analysis of MD5 will be utilized as a base for explaining the most recent SHA2 family of hash algorithms.
地板
發(fā)表于 2025-3-22 07:59:35 | 只看該作者
Tetsuya Sumi,Sameh A. Kantoush,Mohamed Sabertudied and analyzed in order to obtain efficient implementations of them on reconfigurable devices. As a case of study, those techniques are applied to the Data Encryption Standard (DES), thus producing a compact DES core.
5#
發(fā)表于 2025-3-22 08:52:50 | 只看該作者
6#
發(fā)表于 2025-3-22 15:26:26 | 只看該作者
7#
發(fā)表于 2025-3-22 18:13:47 | 只看該作者
General Guidelines for Implementing Block Ciphers in FPGAs,tudied and analyzed in order to obtain efficient implementations of them on reconfigurable devices. As a case of study, those techniques are applied to the Data Encryption Standard (DES), thus producing a compact DES core.
8#
發(fā)表于 2025-3-22 22:04:33 | 只看該作者
Architectural Designs For the Advanced Encryption Standard,eo conferencing where high performance is required. The target throughput, expressed in gigabits per second (Gbps), must be specified, and to achieve such a high performance we can replicate several functional units to increase parallelism. That would however imply higher power and hardware area requirements.
9#
發(fā)表于 2025-3-23 05:00:51 | 只看該作者
10#
發(fā)表于 2025-3-23 06:48:16 | 只看該作者
Book 2007e is tolerable. On the other hand, hardware methods offer high-speed solutions making them highly suitable for applications where data traffic is fast and large data is required to be encrypted in real time. VLSI (also known as ASIC), and FPGAs (Field Programmable Gate Arrays) are two alternatives f
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 14:17
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
北辰区| 奉贤区| 松潘县| 政和县| 诸城市| 理塘县| 寿阳县| 安义县| 安庆市| 重庆市| 永胜县| 余庆县| 郸城县| 长兴县| 肥乡县| 温泉县| 微博| 浑源县| 嘉义县| 肥城市| 特克斯县| 屏东市| 德清县| 高清| 新田县| 和平区| 厦门市| 吐鲁番市| 苍南县| 宣汉县| 鞍山市| 辰溪县| 个旧市| 砀山县| 西林县| 鲜城| 循化| 苏州市| 许昌县| 咸宁市| 长沙县|