Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Domain Specific High-Level Synthesis for Cryptographic Workloads
  • Language: en
  • Pages: 254

Domain Specific High-Level Synthesis for Cryptographic Workloads

  • Type: Book
  • -
  • Published: 2019-03-28
  • -
  • Publisher: Springer

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.

Emerging Technology and Architecture for Big-data Analytics
  • Language: en
  • Pages: 330

Emerging Technology and Architecture for Big-data Analytics

  • Type: Book
  • -
  • Published: 2017-04-19
  • -
  • Publisher: Springer

This book describes the current state of the art in big-data analytics, from a technology and hardware architecture perspective. The presentation is designed to be accessible to a broad audience, with general knowledge of hardware design and some interest in big-data analytics. Coverage includes emerging technology and devices for data-analytics, circuit design for data-analytics, and architecture and algorithms to support data-analytics. Readers will benefit from the realistic context used by the authors, which demonstrates what works, what doesn’t work, and what are the fundamental problems, solutions, upcoming challenges and opportunities. Provides a single-source reference to hardware architectures for big-data analytics; Covers various levels of big-data analytics hardware design abstraction and flow, from device, to circuits and systems; Demonstrates how non-volatile memory (NVM) based hardware platforms can be a viable solution to existing challenges in hardware architecture for big-data analytics.

Security, Privacy, and Applied Cryptography Engineering
  • Language: en
  • Pages: 219

Security, Privacy, and Applied Cryptography Engineering

  • Type: Book
  • -
  • Published: 2018-12-06
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018. The 12 full papers presented were carefully reviewed and selected from 34 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Emerging Electronic Devices, Circuits and Systems
  • Language: en
  • Pages: 465

Emerging Electronic Devices, Circuits and Systems

The book constitutes peer-reviewed proceedings of a workshop on Emerging Electronics Devices, Circuits, and Systems (EEDCS) held in conjunction with International Symposium on Devices, Circuits, and Systems (ISDCS 2022). The book focuses on the recent development in devices, circuits, and systems. It also discusses innovations, trends, practical challenges, and solutions adopted in device design, modeling, fabrication, characterization, and their circuit implementation with pertinent system applications. It will be useful for researchers, developers, engineers, academicians, and students.

Progress in Cryptology – INDOCRYPT 2023
  • Language: en
  • Pages: 364

Progress in Cryptology – INDOCRYPT 2023

None

Applied Reconfigurable Computing
  • Language: en
  • Pages: 557

Applied Reconfigurable Computing

  • Type: Book
  • -
  • Published: 2015-03-30
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th International Symposium on Applied Reconfigurable Computing, ARC 2015, held in Bochum, Germany, in April 2015. The 23 full papers and 20 short papers presented in this volume were carefully reviewed and selected from 85 submissions. They are organized in topical headings named: architecture and modeling; tools and compilers; systems and applications; network-on-a-chip; cryptography applications; extended abstracts of posters. In addition, the book contains invited papers on funded R&D - running and completed projects and Horizon 2020 funded projects.

In-/Near-Memory Computing
  • Language: en
  • Pages: 124

In-/Near-Memory Computing

This book provides a structured introduction of the key concepts and techniques that enable in-/near-memory computing. For decades, processing-in-memory or near-memory computing has been attracting growing interest due to its potential to break the memory wall. Near-memory computing moves compute logic near the memory, and thereby reduces data movement. Recent work has also shown that certain memories can morph themselves into compute units by exploiting the physical properties of the memory cells, enabling in-situ computing in the memory array. While in- and near-memory computing can circumvent overheads related to data movement, it comes at the cost of restricted flexibility of data repres...

Progress in Cryptology -- INDOCRYPT 2014
  • Language: en
  • Pages: 444

Progress in Cryptology -- INDOCRYPT 2014

  • Type: Book
  • -
  • Published: 2014-10-24
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.

Reversible Computation
  • Language: en
  • Pages: 255

Reversible Computation

  • Type: Book
  • -
  • Published: 2017-06-26
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 9th International Conference on Reversible Computation, RC 2017, held in Kolkata, India, in July 2017. The 13 full and 5 short papers included in this volume together with one invited paper were carefully reviewed and selected from 47 submissions. The papers are organized in the following topical sections: foundations; reversible circuit synthesis; reversible circuit optimization; testing and fault tolerance; and quantum circuits.

Automated Methods in Cryptographic Fault Analysis
  • Language: en
  • Pages: 334

Automated Methods in Cryptographic Fault Analysis

  • Type: Book
  • -
  • Published: 2019-03-19
  • -
  • Publisher: Springer

This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.