Embedded Cryptographic Hardware: Methodologies & Architectures

Author:   Nadia Nedjah ,  Luiza Macedo Mourelle
Publisher:   Nova Science Publishers Inc
ISBN:  

9781594540127


Pages:   295
Publication Date:   08 October 2004
Format:   Hardback
Availability:   Awaiting stock   Availability explained
The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you.

Our Price $514.80 Quantity:  
Add to Cart

Share |

Embedded Cryptographic Hardware: Methodologies & Architectures


Add your own review!

Overview

Modern cryptology, which is the basis of information security techniques, started in the late 70's and developed in the 80's. As communication networks were spreading deep into society, the need for secure communication greatly promoted cryptographic research. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated systems for cryptography are becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, hardware implementations of cryptographic algorithms become cost-effective. The focus of this book is on all aspects of embedded cryptographic hardware. Of special interest are contributions that describe new secure and fast hardware implementations and new efficient algorithms, methodologies and protocols for secure communications. This book is organised in two parts. The first part is dedicated to embedded hardware of cryptosystems while the second part focuses on new algorithms for cryptography, design methodologies and secure protocols.

Full Product Details

Author:   Nadia Nedjah ,  Luiza Macedo Mourelle
Publisher:   Nova Science Publishers Inc
Imprint:   Nova Science Publishers Inc
Weight:   0.702kg
ISBN:  

9781594540127


ISBN 10:   1594540128
Pages:   295
Publication Date:   08 October 2004
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Awaiting stock   Availability explained
The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you.

Table of Contents

CONTENTS: Preface; Unified Hardware Architecture for the Secure Hash Standard (Akashi Staoh, IBM Research, Tokyo Research Lab.); A Hardware Accelerator for Elliptic Curve Cryptography over GF(2m) (Joseph Riley and Michael J. Schulte, Univ. of Wisconsin -- Madison); Two New Algorithms For Modular Multiplication (Viktor Bunimov and Manfred Schimmler, Technical Univ. of Braunschweig); AES Packet Encryption on a SIMD Stream Processor (Yu-Kuen Lai and Gregory T. Byrd, North Carolina State Univ.); High-Speed Cryptography (Bertil Schmidt, Nanyang Technological Univ.,Manfred Schimmler, Technische Univ. Braunschweig and Heiko Schroder, RMIT University); A Design Framework for Scalable and Unified Multipliers in GF(p) and GF(2m) (Alexandre F. Tenca, Oregon State Univ., Erkay Sava, Sabanci Univ. Istanbul and Cetin K. Koc, Oregon State Univ); Three Hardware Implementations for the Binary Modular Exponentiation (Nadia Nedjah and Luiza de Macedo Mourelle, State Univ. of Rio de Janeiro); An on Chip CAST-128 Based Block Cipher with Dynamically Reconfigurable Sboxes Generated in Parallel (Panayiotis E. Nastou, Communication Group Paleo Faliro, Greece and Yiannis C. Stamatiou, Univ. of the Aegean); An FPGA-Based Design Flow of Five Cryptographic Algorithms (Juan M. Diaz, Slobodan Bojanic, Carlos Carreras, Octavio Nieto-Taladriz, Technical Univ. of Madrid); A Carry-Free Montgomery Inversion Algorithm (Erkay Savas, Sabanci Univ.); Fully Distributed and Robust Threshold RSA Function Sharing Efficient for Small Number of Players (Maged H. Ibrahim, I. A. Ali, I.I.Ibrahim and A. H. El-Sawi, Helwin Univ.); Masked Inversion in GF(2n) Using Mixed Field Representations and its Efficient Implementation for AES (Shay Gueron, Ori Parzanchevsky and Or Zur, Univ. of Haifa); Embedded Cryptography Using One Instruction Computing (Phillip A. Laplante, Colin J. Neill and William Gilreath, Pennsylvania State Univ.); Unified Point Addition Formulae for Elliptic Curve Cryptosystems (Eric Brier, Marc Joye, Card Security Group, La Ciotat Cedex, France and Isabelle Dechene, McGill Univ.); Accelerating Public-Key Cryptography Using the Co-Design Methodology (Nadia Nedjah and Luiza de Macedo Mourelle, State Univ. of Rio de Janeiro); On Specialized Hardware for Supporting the Number Field Sieve (Willi Geiselmann and Rainer Steinwandt, Univ. Karlsruhe (TH)); Index.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List