LEADER 03463nam 22005535 450 001 9910337635503321 005 20200701004549.0 010 $a981-10-1070-6 024 7 $a10.1007/978-981-10-1070-5 035 $a(CKB)4930000000042055 035 $a(MiAaPQ)EBC5742740 035 $a(DE-He213)978-981-10-1070-5 035 $a(PPN)23522989X 035 $a(EXLCZ)994930000000042055 100 $a20190328d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDomain Specific High-Level Synthesis for Cryptographic Workloads /$fby Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (254 pages) 225 1 $aComputer Architecture and Design Methodologies,$x2367-3478 311 $a981-10-1069-2 327 $aIntroduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work. 330 $aThis book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations. 410 0$aComputer Architecture and Design Methodologies,$x2367-3478 606 $aElectronic circuits 606 $aData encryption (Computer science) 606 $aSystem safety 606 $aCircuits and Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/T24068 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 615 0$aElectronic circuits. 615 0$aData encryption (Computer science) 615 0$aSystem safety. 615 14$aCircuits and Systems. 615 24$aCryptology. 615 24$aSecurity Science and Technology. 676 $a652.8 700 $aKhalid$b Ayesha$4aut$4http://id.loc.gov/vocabulary/relators/aut$0862560 702 $aPaul$b Goutam$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aChattopadhyay$b Anupam$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910337635503321 996 $aDomain Specific High-Level Synthesis for Cryptographic Workloads$91925300 997 $aUNINA