Cryptographic Algorithms on Reconfigurable Hardware [electronic resource] / by Francisco Rodríguez-Henríquez, Arturo Díaz Pérez, Nazar Abbas Saqib, Çetin Kaya Koç.
Contributor(s): Pérez, Arturo Díaz [author.] | Saqib, Nazar Abbas [author.] | Koç, Çetin Kaya [author.] | SpringerLink (Online service).Material type: BookSeries: Signals and Communication Technology: Publisher: Boston, MA : Springer US, 2007Description: XXVI, 362 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9780387366821.Subject(s): Engineering | Computer hardware | Computer Communication Networks | Data structures (Computer science) | Telecommunication | Systems engineering | Engineering | Communications Engineering, Networks | Data Structures, Cryptology and Information Theory | Circuits and Systems | Computer Hardware | Computer Communication Networks | Signal, Image and Speech ProcessingDDC classification: 621.382 Online resources: Click here to access online
A Brief Introduction to Modern Cryptography -- Reconfigurable Hardware Technology -- Mathematical Background -- Prime Finite Field Arithmetic -- Binary Finite Field Arithmetic -- Reconfigurable Hardware Implementation of Hash Functions -- General Guidelines for Implementing Block Ciphers in FPGAs -- Architectural Designs For the Advanced Encryption Standard -- Elliptic Curve Cryptography.
This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The concepts and techniques reviewed in this book will make special emphasis on the practical aspects of reconfigurable hardware design, explaining the basic mathematics related and giving a comprehensive description of state-of-the-art implementation techniques. The authors show how high-speed cryptographic algorithms implementations can be achieved on reconfigurable hardware devices without posing prohibited high requirements for hardware resources. The material in this book will be of interest to engineering professionals, programmers, hardware designers, and graduate students interested in the development of security and cryptographic mechanisms at a beginning/intermediate level.