Domain Specific High-Level Synthesis for Cryptographic Workloads / / by Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay |
Autore | Khalid Ayesha |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (254 pages) |
Disciplina | 652.8 |
Collana | Computer Architecture and Design Methodologies |
Soggetto topico |
Electronic circuits
Data encryption (Computer science) System safety Circuits and Systems Cryptology Security Science and Technology |
ISBN | 981-10-1070-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work. |
Record Nr. | UNINA-9910337635503321 |
Khalid Ayesha | ||
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Operating systems : internals and design principles / / William Stallings |
Autore | Stallings William |
Edizione | [Seventh edition, International edition /] |
Pubbl/distr/stampa | Harlow, England ; ; Boston : , : Pearson Education, , [2012] |
Descrizione fisica | 1 online resource (788 pages) : illustrations |
Disciplina | 005.43 |
Soggetto topico | Operating systems (Computers) |
ISBN | 1-4479-3014-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Operating Systems -- Contents -- Online Resources -- Preface -- About the Author -- Reader's and Instructor's Guide -- Outline of this Book -- Example Systems -- A Roadmap for Readers and Instructors -- Internet and Web Resources -- Part 1 Background -- Computer System Overview -- Basic Elements -- Evolution of the Microprocessor -- Instruction Execution -- Interrupts -- The Memory Hierarchy -- Cache Memory -- Direct Memory Access -- Multiprocessor and Multicore Organization -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix 1A Performance Characteristics of Two-level Memories -- Operating System Overview -- Operating System Objectives and Functions -- The Evolution of Operating Systems -- Major Achievements -- Developments Leading to Modern Operating Systems -- Virtual Machines -- OS Design Considerations for Multiprocessor and Multicore -- Microsoft Windows Overview -- Traditional UNIX Systems -- Modern UNIX Systems -- Linux -- Linux Vserver Virtual Machine Architecture -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 2 Processes -- Process Description and Control -- What Is a Process? -- Process States -- Process Description -- Process Control -- Execution of the Operating System -- Security Issues -- UNIX SVR4 Process Management -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Threads -- Processes and Threads -- Types of Threads -- Multicore and Multithreading -- Windows 7 Thread and SMP Management -- Solaris Thread and SMP Management -- Linux Process and Thread Management -- Mac OS X Grand Central Dispatch -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Mutual Exclusion and Synchronization -- Principles of Concurrency -- Mutual Exclusion: Hardware Support -- Semaphores.
Monitors -- Message Passing -- Readers/Writers Problem -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Deadlock and Starvation -- Principles of Deadlock -- Deadlock Prevention -- Deadlock Avoidance -- Deadlock Detection -- An Integrated Deadlock Strategy -- Dining Philosophers Problem -- UNIX Concurrency Mechanisms -- Linux Kernel Concurrency Mechanisms -- Solaris Thread Synchronization Primitives -- Windows 7 Concurrency Mechanisms -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 3 Memory -- Memory Management -- Memory Management Requirements -- Memory Partitioning -- Paging -- Segmentation -- Security Issues -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Appendix 7A Loading and Linking -- Virtual Memory -- Hardware and Control Structures -- Operating System Software -- UNIX and Solaris Memory Management -- Linux Memory Management -- Windows Memory Management -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 4 Scheduling -- Uniprocessor Scheduling -- Types of Processor Scheduling -- Scheduling Algorithms -- Traditional UNIX Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Multiprocessor and Real-Time Scheduling -- Multiprocessor Scheduling -- Real-time Scheduling -- Linux Scheduling -- UNIX SVR4 Scheduling -- UNIX FreeBSD Scheduling -- Windows Scheduling -- Linux Virtual Machine Process Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 5 Input/Output and Files -- I/O Management and Disk Scheduling -- I/O Devices -- Organization of the I/O Function -- Operating System Design Issues -- I/O Buffering -- Disk Scheduling -- RAID -- Disk Cache -- UNIX SVR4 I/O -- Linux I/O -- Windows I/O. Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- File Management -- Overview -- File Organization and Access -- B-Trees -- File Directories -- File Sharing -- Record Blocking -- Secondary Storage Management -- File System Security -- UNIX File Management -- Linux Virtual File System -- Windows File System -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 6 Embedded Systems -- Embedded Operating Systems -- Embedded Systems -- Characteristics of Embedded Operating Systems -- eCos -- TinyOS -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 7 Computer Security -- Computer Security Threats -- Computer Security Concepts -- Threats, Attacks, and Assets -- Intruders -- Malicious Software Overview -- Viruses, Worms, and Bots -- Rootkits -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Computer Security Techniques -- Authentication -- Access Control -- Intrusion Detection -- Malware Defense -- Dealing with Buffer Overflow Attacks -- Windows 7 Security -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 8 Distributed Systems -- Distributed Processing, Client/Server, and Clusters -- Client/Server Computing -- Service-Oriented Architecture -- Distributed Message Passing -- Remote Procedure Calls -- Clusters -- Windows Cluster Server -- Beowulf and Linux Clusters -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix A Topics in Concurrency -- Mutual Exclusion: Software Approaches -- Race Conditions and Semaphores -- A Barbershop Problem -- Problems -- Appendix B Programming and Operating System Projects -- OS/161 -- Simulations -- Programming Projects -- Research Projects -- Reading/Report Assignments -- Writing Assignments. Discussion Topics -- BACI -- Glossary -- References -- Index. |
Record Nr. | UNINA-9910151651403321 |
Stallings William | ||
Harlow, England ; ; Boston : , : Pearson Education, , [2012] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in Cryptology - INDOCRYPT 2013 [[electronic resource] ] : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings / / edited by Goutam Paul, Paul Vaudenay |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVIII, 319 p. 64 illus.) : online resource |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Cryptology Systems and Data Security |
ISBN | 3-319-03515-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Provable security -- Hash functions and signatures -- Side channel attacks -- Symmetric key cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.- Coding theory in cryptography. |
Record Nr. | UNISA-996465667503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology - INDOCRYPT 2013 : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings / / edited by Goutam Paul, Paul Vaudenay |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVIII, 319 p. 64 illus.) : online resource |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Cryptology Systems and Data Security |
ISBN | 3-319-03515-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Provable security -- Hash functions and signatures -- Side channel attacks -- Symmetric key cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.- Coding theory in cryptography. |
Record Nr. | UNINA-9910484289103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|