01236nam0-22003851i-450-99000553023020331620050713120000.0000553023USA01000553023(ALEPH)000553023USA0100055302320050713d1983-------|0itac50------baitaIT|||| |||||Axes de communication d'interet international: situation fin 1982Materiale cartograficoConference Europeenne des Ministres des Trasports. -Scale [1:4000000]ParisCemtc1983col.USA19432Trunk lines of comunication of international importancemateriale cartograficoFIParis526.076cartografia21CEMTCemtITSOL20120104990005530230203316DIP.TO SCIENZE ECONOMICHE - (SA)DS 500 526.076 CEM451 DISES500 526.076 CEM451 DISESBKDISES20121027USA01153220121027USA011613Axes de communication d'interet international: situation fin 19821130585UNISAUSA1499204022nam 22007455 450 991029990820332120200705191649.0981-10-8899-310.1007/978-981-10-8899-5(CKB)4100000004244332(DE-He213)978-981-10-8899-5(MiAaPQ)EBC5396654(PPN)227401018(EXLCZ)99410000000424433220180516d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierReconfigurable Cryptographic Processor /by Leibo Liu, Bo Wang, Shaojun Wei1st ed. 2018.Singapore :Springer Singapore :Imprint: Springer,2018.1 online resource (XV, 386 p.) 981-10-8898-5 Introduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture -- Compilation Techniques -- Case Studies in Design -- Countermeasures against Physical Attacks -- Perspective: Application Trends.This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also presents a case study of implementing the reconfigurable cryptographic processor “Anole” designed by the authors’ team. Moreover, it features discussions on countermeasures against physical attacks utilizing partially and dynamically reconfigurable array architecture to enhance security, as well as the latest trends for reconfigurable cryptographic processors. This book is intended for research scientists, graduate students, and engineers in electronic science and technology, cryptography, network and information security, as well as computer science and technology.Signal processingImage processingSpeech processing systemsData encryption (Computer science)MicroprocessorsElectrical engineeringAlgorithmsCoding theoryInformation theorySignal, Image and Speech Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/T24051Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Processor Architectureshttps://scigraph.springernature.com/ontologies/product-market-codes/I13014Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Signal processing.Image processing.Speech processing systems.Data encryption (Computer science)Microprocessors.Electrical engineering.Algorithms.Coding theory.Information theory.Signal, Image and Speech Processing.Cryptology.Processor Architectures.Communications Engineering, Networks.Algorithm Analysis and Problem Complexity.Coding and Information Theory.621.382Liu Leiboauthttp://id.loc.gov/vocabulary/relators/aut1060030Wang Boauthttp://id.loc.gov/vocabulary/relators/autWei Shaojunauthttp://id.loc.gov/vocabulary/relators/autBOOK9910299908203321Reconfigurable Cryptographic Processor2517878UNINA