找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptographic Algorithms on Reconfigurable Hardware; Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e Book 2007 Springer-Verlag US 2007

[復(fù)制鏈接]
查看: 22991|回復(fù): 45
樓主
發(fā)表于 2025-3-21 19:15:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware
編輯Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e
視頻videohttp://file.papertrans.cn/241/240534/240534.mp4
概述Presents a comprehensive methodology for efficient implementation of cryptographic algorithms on reconfigurable hardware devices.Special emphasis on the practical aspects of reconfigurable hardware de
叢書(shū)名稱(chēng)Signals and Communication Technology
圖書(shū)封面Titlebook: Cryptographic Algorithms on Reconfigurable Hardware;  Francisco Rodríguez-Henríquez,Arturo Díaz Pérez,?e Book 2007 Springer-Verlag US 2007
描述.Cryptographic solutions using software methods can be used for those security applications where data traffic is not too large and low encryption rate is tolerable. On the other hand, hardware methods offer high-speed solutions making them highly suitable for applications where data traffic is fast and large data is required to be encrypted in real time. VLSI (also known as ASIC), and FPGAs (Field Programmable Gate Arrays) are two alternatives for implementing cryptographic algorithms in hardware. FPGAs offer several benefits for cryptographic algorithm implementations over VLSI as they offer high flexibility. Due to its reconfigurable property, keys can be changed rapidly. Moreover, basic primitives in most cryptographic algorithms can efficiently be implemented in FPGAs...Since the invention of the Data Encryption Standard (DES), some 40 years ago, a considerable amount of cryptographic algorithm implementation literature has been produced both, for software and hardware platforms. Unfortunately, virtually there exists no book explaining how the main cryptographic algorithms can be implemented on reconfigurable hardware devices...This book will cover the study of computational m
出版日期Book 2007
關(guān)鍵詞ASIC; DES; Elliptic Curve Cryptography; FPGA; Hardware; IC; Software; VLSI; algorithm; algorithms; computer; fi
版次1
doihttps://doi.org/10.1007/978-0-387-36682-1
isbn_softcover978-1-4419-4156-5
isbn_ebook978-0-387-36682-1Series ISSN 1860-4862 Series E-ISSN 1860-4870
issn_series 1860-4862
copyrightSpringer-Verlag US 2007
The information of publication is updating

書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware影響因子(影響力)




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware被引頻次




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware被引頻次學(xué)科排名




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware年度引用




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware年度引用學(xué)科排名




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware讀者反饋




書(shū)目名稱(chēng)Cryptographic Algorithms on Reconfigurable Hardware讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:21:07 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:33:02 | 只看該作者
Tetsuya Sumi,Sameh A. Kantoush,Mohamed Saberep description of MD5 has been provided which we hope will be useful for understanding the mathematical and logical operations involved in it. The study and analysis of MD5 will be utilized as a base for explaining the most recent SHA2 family of hash algorithms.
地板
發(fā)表于 2025-3-22 07:59:35 | 只看該作者
Tetsuya Sumi,Sameh A. Kantoush,Mohamed Sabertudied and analyzed in order to obtain efficient implementations of them on reconfigurable devices. As a case of study, those techniques are applied to the Data Encryption Standard (DES), thus producing a compact DES core.
5#
發(fā)表于 2025-3-22 08:52:50 | 只看該作者
6#
發(fā)表于 2025-3-22 15:26:26 | 只看該作者
7#
發(fā)表于 2025-3-22 18:13:47 | 只看該作者
General Guidelines for Implementing Block Ciphers in FPGAs,tudied and analyzed in order to obtain efficient implementations of them on reconfigurable devices. As a case of study, those techniques are applied to the Data Encryption Standard (DES), thus producing a compact DES core.
8#
發(fā)表于 2025-3-22 22:04:33 | 只看該作者
Architectural Designs For the Advanced Encryption Standard,eo conferencing where high performance is required. The target throughput, expressed in gigabits per second (Gbps), must be specified, and to achieve such a high performance we can replicate several functional units to increase parallelism. That would however imply higher power and hardware area requirements.
9#
發(fā)表于 2025-3-23 05:00:51 | 只看該作者
10#
發(fā)表于 2025-3-23 06:48:16 | 只看該作者
Book 2007e is tolerable. On the other hand, hardware methods offer high-speed solutions making them highly suitable for applications where data traffic is fast and large data is required to be encrypted in real time. VLSI (also known as ASIC), and FPGAs (Field Programmable Gate Arrays) are two alternatives f
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 23:43
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
土默特左旗| 鹤山市| 六盘水市| 北辰区| 集贤县| 湖北省| 莆田市| 阿城市| 金山区| 潢川县| 铁岭市| 上杭县| 迁安市| 丘北县| 义乌市| 盘山县| 凭祥市| 桃园县| 报价| 建湖县| 凤凰县| 历史| 花垣县| 建水县| 奈曼旗| 钟祥市| 陆良县| 神木县| 高尔夫| 句容市| 界首市| 如东县| 鞍山市| 田林县| 玉龙| 大石桥市| 广汉市| 宜春市| 三亚市| 潢川县| 龙江县|