000839393 000__ 02574cam\a2200433Ii\4500 000839393 001__ 839393 000839393 005__ 20230306144646.0 000839393 006__ m\\\\\o\\d\\\\\\\\ 000839393 007__ cr\un\nnnunnun 000839393 008__ 180521s2018\\\\si\\\\\\ob\\\\000\0\eng\d 000839393 020__ $$a9789811088995$$q(electronic book) 000839393 020__ $$a9811088993$$q(electronic book) 000839393 020__ $$z9789811088988 000839393 035__ $$aSP(OCoLC)on1036986120 000839393 035__ $$aSP(OCoLC)1036986120 000839393 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dAZU$$dUAB$$dOCLCF$$dOCLCQ 000839393 049__ $$aISEA 000839393 050_4 $$aQA76.9.A3 000839393 08204 $$a004$$223 000839393 1001_ $$aLiu, Leibo,$$eauthor. 000839393 24510 $$aReconfigurable cryptographic processor /$$cLeibo Liu, Bo Wang, Shaojun Wei. 000839393 264_1 $$aSingapore :$$bSpringer,$$c2018. 000839393 300__ $$a1 online resource 000839393 336__ $$atext$$btxt$$2rdacontent 000839393 337__ $$acomputer$$bc$$2rdamedia 000839393 338__ $$aonline resource$$bcr$$2rdacarrier 000839393 504__ $$aIncludes bibliographical references. 000839393 5050_ $$aIntroduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture -- Compilation Techniques -- Case Studies in Design -- Countermeasures against Physical Attacks -- Perspective: Application Trends. 000839393 506__ $$aAccess limited to authorized users. 000839393 520__ $$aThis book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also presents a case study of implementing the reconfigurable cryptographic processor “Anole” designed by the authors’ team. Moreover, it features discussions on countermeasures against physical attacks utilizing partially and dynamically reconfigurable array architecture to enhance security, as well as the latest trends for reconfigurable cryptographic processors. This book is intended for research scientists, graduate students, and engineers in electronic science and technology, cryptography, network and information security, as well as computer science and technology. 000839393 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 21, 2018). 000839393 650_0 $$aAdaptive computing systems. 000839393 650_0 $$aData encryption (Computer science) 000839393 7001_ $$aWang, Bo,$$eauthor. 000839393 7001_ $$aWei, Shaojun,$$eauthor. 000839393 852__ $$bebk 000839393 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-8899-5$$zOnline Access$$91397441.1 000839393 909CO $$ooai:library.usi.edu:839393$$pGLOBAL_SET 000839393 980__ $$aEBOOK 000839393 980__ $$aBIB 000839393 982__ $$aEbook 000839393 983__ $$aOnline 000839393 994__ $$a92$$bISE