Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » Computer Science and Robotics » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
The Copper Garden: New Zealand Novels
$195.00
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Bestsellers
01.Robotics in Surgery: History, Current and Future Applications
02.From Problem Toward Solution: Wireless Sensor Networks Security
03.Introduction to Graph and Hypergraph Theory
04.Wiki Supporting Formal and Informal Learning
05.Intelligent Vehicle Systems: A 4D/RCS Approach
06.Artificial Intelligence in Energy and Renewable Energy Systems
07.Advances in Security Information Management: Perceptions and Outcomes
08.Computer Vision and Robotics
09.MOSFETs: Properties, Preparations and Performance
10.Expert Systems Research Trends
Notifications more
NotificationsNotify me of updates to Embedded Cryptographic Hardware: Methodologies & Architectures
Tell A Friend
 
Tell someone you know about this product.
Embedded Cryptographic Hardware: Methodologies & Architectures
Retail Price: $195.00
10% Online Discount
You Pay:

$175.50
Editors: Nedjah, Nadia and Mourelle, Luiza de Macedo (State Univ. of Rio de Janeiro)
Book Description:
Modern cryptology, which is the basis of information security techniques, started in the late 70’s and developed in the 80’s. As communication networks were spreading deep into society, the need for secure communication greatly promoted cryptographic research. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated systems for cryptography are becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, hardware implementations of cryptographic algorithms become cost-effective.
The focus of this book is on all aspects of embedded cryptographic hardware. Of special interest are contributions that describe new secure and fast hardware implementations and new efficient algorithms, methodologies and protocols for secure communications.
This book is organized in two parts. The first part is dedicated to embedded hardware of cryptosystems while the second part focuses on new algorithms for cryptography, design methodologies and secure protocols

Table of Contents:
Preface; Unified Hardware Architecture for the Secure Hash Standard (Akashi Staoh, IBM Research, Tokyo Research Lab.); A Hardware Accelerator for Elliptic Curve Cryptography over GF(2m) (Joseph Riley and Michael J. Schulte, Univ. of Wisconsin - Madison); Two New Algorithms For Modular Multiplication (Viktor Bunimov and Manfred Schimmler, Technical Univ. of Braunschweig); AES Packet Encryption on a SIMD Stream Processor (Yu-Kuen Lai and Gregory T. Byrd, North Carolina State Univ.); High-Speed Cryptography (Bertil Schmidt, Nanyang Technological Univ.,Manfred Schimmler, Technische Univ. Braunschweig and Heiko Schroder, RMIT University); A Design Framework for Scalable and Unified Multipliers in GF(P) and GF(2M) (Alexandre F. Tenca, Oregon State Univ., Erkay Sava, Sabanci Univ. Istanbul and Çetin K. Koç, Oregon State Univ); Three Hardware Implementations for the Binary Modular Exponentiation (Nadia Nedjah and Luiza de Macedo Mourelle, State Univ. of Rio de Janeiro); An on Chip CAST-128 Based Block Cipher with Dynamically Reconfigurable Sboxes Generated in Parallel (Panayiotis E. Nastou, Communication Group Paleo Faliro, Greece and Yiannis C. Stamatiou, Univ. of the Aegean); An FPGA-Based Design Flow of Five Cryptographic Algorithms (Juan M. Diaz, Slobodan Bojaniċ, Carlos Carreras, Octavio Nieto-Taladriz, Technical Univ. of Madrid); A Carry-Free Montgomery Inversion Algorithm (Erkay Savaş, Sabanci Univ.); Fully Distributed and Robust Threshold RSA Function Sharing Efficient for Small Number of Players (Maged H. Ibrahim, I. A. Ali, I.I.Ibrahim and A. H. El-Sawi, Helwin Univ.); Masked Inversion in GF(2n) Using Mixed Field Representations and its Efficient Implementation for AES (Shay Gueron, Ori Parzanchevsky and Or Zur, Univ. of Haifa); Embedded Cryptography Using One Instruction Computing (Phillip A. Laplante, Colin J. Neill and William Gilreath, Pennsylvania State Univ.); Unified Point Addition Formulæ for Elliptic Curve Cryptosystems (Eric Brier, Marc Joye, Card Security Group, La Ciotat Cedex, France and Isabelle Dechene, McGill Univ.); Accelerating Public-Key Cryptography Using the Co-Design Methodology (Nadia Nedjah and Luiza de Macedo Mourelle, State Univ. of Rio de Janeiro); On Specialized Hardware for Supporting the Number Field Sieve (Willi Geiselmann and Rainer Steinwandt, Univ. Karlsruhe (TH)); Index.

   Binding: Hardcover
   Pub. Date: 2004
   ISBN: 978-1-59454-012-7
  
  
Customers who bought this product also purchased
Embedded Cryptographic Hardware: Design and Security
Embedded Cryptographic Hardware: Design and Security
Special Focus Titles
01.Chaliapin and the Jews: The Question of Chaliapin's Purported Antisemitism
02.The Humanities: Past, Present and Future
03.The Poles: Myths and Reality
04.Child-Rearing: Practices, Attitudes and Cultural Differences
05."A Home Away from Home": A Community of International and South African University Students
06.Palliative Care: Oncology Experience from Hong Kong
07.The Enigma of Autism: Genius, Disorder or Just Different?
08.The Collector Mentality: Modernization of the Hunter-Gatherer
09.Face Processing: Systems, Disorders and Cultural Differences
10.Occurrences, Structure, Biosynthesis, and Health Benefits Based on Their Evidences of Medicinal Phytochemicals in Vegetables and Fruits. Volume 8
11.Crystal Growth: Concepts, Mechanisms and Applications
12.The Economic, Social and Political Impact of Mining on Akyem Abuakwa from the Pre-Colonial Era up to 1943

Nova Science Publishers
© Copyright 2004 - 2017

Embedded Cryptographic Hardware: Methodologies & Architectures