Atnaujintas knygų su minimaliais defektais pasiūlymas! Naršykite ČIA >>

System-on-Chip Architectures and Implementations for Private-Key Data Encryption

-15% su kodu: ENG15
143,97 
Įprasta kaina: 169,38 
-15% su kodu: ENG15
Kupono kodas: ENG15
Akcija baigiasi: 2025-03-03
-15% su kodu: ENG15
143,97 
Įprasta kaina: 169,38 
-15% su kodu: ENG15
Kupono kodas: ENG15
Akcija baigiasi: 2025-03-03
-15% su kodu: ENG15
2025-02-28 169.3800 InStock
Nemokamas pristatymas į paštomatus per 11-15 darbo dienų užsakymams nuo 10,00 

Knygos aprašymas

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation. In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation.

Informacija

Autorius: John V. McCanny, Máire McLoone,
Leidėjas: Springer New York
Išleidimo metai: 2012
Knygos puslapių skaičius: 180
ISBN-10: 1461348978
ISBN-13: 9781461348979
Formatas: 235 x 155 x 11 mm. Knyga minkštu viršeliu
Kalba: Anglų

Pirkėjų atsiliepimai

Parašykite atsiliepimą apie „System-on-Chip Architectures and Implementations for Private-Key Data Encryption“

Būtina įvertinti prekę

Goodreads reviews for „System-on-Chip Architectures and Implementations for Private-Key Data Encryption“