Login       My Wishlist
  My Cart
$0.00 / 0 items
 
EMS Linux
Utilizing the Best Tools With Linux
 
International Access
Global Shipping Options Available
Home About Us News Our Blog Our Catalog My Cart My Account Track Shippment Contact Us
  Our Catalog   Algorithms

Cryptographic Algorithms on Reconfigurable Hardware (Signals and Communication Technology)


Mega Sale! Save 22% on the Cryptographic Algorithms on Reconfigurable Hardware (Signals and Communication Technology) by Brand: Springer at EMS Linux. Hurry! Limited time offer. Offer valid only while supplies last. Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But


Product Description

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.

Additional Information

Manufacturer:Springer
Brand:Brand: Springer
Publisher:Springer
Studio:Springer
EAN:9780132621304
Item Weight:1.71 pounds
Item Size:0.88 x 9.21 x 9.21 inches
Package Weight:1.6 pounds
Package Size:6.1 x 1.3 x 1.3 inches

Cryptographic Algorithms on Reconfigurable Hardware (Signals and Communication Technology) by Brand: Springer

Buy Now:
Cryptographic Algorithms on Reconfigurable Hardware (Signals and Communication Technology)

Brand: Brand: Springer
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$179.99
$141.13
You Save: 22%


Quantity:  

 


View More In Algorithms.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Brand: Springer, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers


By Brand: Artech Print on Demand
sku: 9780890067604, ean: 9780890067604, isbn: 0890067600,

By Ingramcontent
ean: 9783319420547, isbn: 3319420542,

By Behrooz Parhami
ean: 9780306459702, isbn: 0306459701,

By Brand: Springer
mpn: 1 black & white tables, biography, ean: 9783540880769, isbn: 3540880763,

By Ingramcontent
mpn: 35 black & white illustrations, 146 colo, ean: 9783319152899, isbn: 3319152890,

By Springer
mpn: biography, ean: 9783540430605, isbn: 3540430601,
This second and revised edition contains a detailed introduction to the key classes of intelligent data analysis methods. The twelve coherently written chapters by leading experts provide complete coverage of the core issues. The first half of the bo...

By The MIT Press
ean: 9780262531962, isbn: 0262531968,

By Wiley
ean: 9780470383261, isbn: 0470383267,
* This newest edition examines fundamental data structures by following a consistent object-oriented framework that builds intuition and analysis skills of data structures and algorithms * Presents new figures, simpler language, and more practical mo...

By Springer
mpn: 48 black & white illustrations, 17 black, ean: 9783540425809, isbn: 3540425802,
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This boo...

By Brand: Springer
mpn: references, index, ean: 9783540431077, isbn: 3540431071,
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the ...



Privacy Policy / Terms of Service
© 2018 - emslinux.com. All Rights Reserved.