Embedded Cryptographic Hardware
Nova Science Publishers Inc (Verlag)
978-1-59454-012-7 (ISBN)
CONTENTS: Preface; Unified Hardware Architecture for the Secure Hash Standard (Akashi Staoh, IBM Research, Tokyo Research Lab.); A Hardware Accelerator for Elliptic Curve Cryptography over GF(2m) (Joseph Riley and Michael J. Schulte, Univ. of Wisconsin -- Madison); Two New Algorithms For Modular Multiplication (Viktor Bunimov and Manfred Schimmler, Technical Univ. of Braunschweig); AES Packet Encryption on a SIMD Stream Processor (Yu-Kuen Lai and Gregory T. Byrd, North Carolina State Univ.); High-Speed Cryptography (Bertil Schmidt, Nanyang Technological Univ.,Manfred Schimmler, Technische Univ. Braunschweig and Heiko Schroder, RMIT University); A Design Framework for Scalable and Unified Multipliers in GF(p) and GF(2m) (Alexandre F. Tenca, Oregon State Univ., Erkay Sava, Sabanci Univ. Istanbul and Cetin K. Koc, Oregon State Univ); Three Hardware Implementations for the Binary Modular Exponentiation (Nadia Nedjah and Luiza de Macedo Mourelle, State Univ. of Rio de Janeiro); An on Chip CAST-128 Based Block Cipher with Dynamically Reconfigurable Sboxes Generated in Parallel (Panayiotis E. Nastou, Communication Group Paleo Faliro, Greece and Yiannis C. Stamatiou, Univ. of the Aegean); An FPGA-Based Design Flow of Five Cryptographic Algorithms (Juan M. Diaz, Slobodan Bojanic, Carlos Carreras, Octavio Nieto-Taladriz, Technical Univ. of Madrid); A Carry-Free Montgomery Inversion Algorithm (Erkay Savas, Sabanci Univ.); Fully Distributed and Robust Threshold RSA Function Sharing Efficient for Small Number of Players (Maged H. Ibrahim, I. A. Ali, I.I.Ibrahim and A. H. El-Sawi, Helwin Univ.); Masked Inversion in GF(2n) Using Mixed Field Representations and its Efficient Implementation for AES (Shay Gueron, Ori Parzanchevsky and Or Zur, Univ. of Haifa); Embedded Cryptography Using One Instruction Computing (Phillip A. Laplante, Colin J. Neill and William Gilreath, Pennsylvania State Univ.); Unified Point Addition Formulae for Elliptic Curve Cryptosystems (Eric Brier, Marc Joye, Card Security Group, La Ciotat Cedex, France and Isabelle Dechene, McGill Univ.); Accelerating Public-Key Cryptography Using the Co-Design Methodology (Nadia Nedjah and Luiza de Macedo Mourelle, State Univ. of Rio de Janeiro); On Specialized Hardware for Supporting the Number Field Sieve (Willi Geiselmann and Rainer Steinwandt, Univ. Karlsruhe (TH)); Index.
Erscheint lt. Verlag | 8.10.2004 |
---|---|
Zusatzinfo | Illustrations |
Verlagsort | New York |
Sprache | englisch |
Maße | 260 x 180 mm |
Gewicht | 702 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Programmiersprachen / -werkzeuge |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-59454-012-8 / 1594540128 |
ISBN-13 | 978-1-59454-012-7 / 9781594540127 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich