229,58 €
255,09 €
-10% with code: EXTRA
Domain Specific High-Level Synthesis for Cryptographic Workloads
Domain Specific High-Level Synthesis for Cryptographic Workloads
229,58
255,09 €
  • We will send in 10–14 business days.
Includes case studies that illustrate step-by-step undertaking of cryptographic functions for mapping using the cryptographic kernels toolkit (CRYKET)Enables cryptographers working with any class of symmetric key cryptography to achieve area efficiency and throughput maximization over a wide range of platformsFeatures the state-of-the-art cryptographic functions including eSTREAM (for stream ciphers), AES/PRESENT (ISO standards for traditional and lightweight ciphers), and SHA-3 finalists (for…
255.09
  • Publisher:
  • Year: 2017
  • ISBN-10: 9811010692
  • ISBN-13: 9789811010699
  • Format: 15.6 x 23.4 x 1.6 cm, kieti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

Domain Specific High-Level Synthesis for Cryptographic Workloads (e-book) (used book) | bookbook.eu

Reviews

Description

Includes case studies that illustrate step-by-step undertaking of cryptographic functions for mapping using the cryptographic kernels toolkit (CRYKET)

Enables cryptographers working with any class of symmetric key cryptography to achieve area efficiency and throughput maximization over a wide range of platforms
Features the state-of-the-art cryptographic functions including eSTREAM (for stream ciphers), AES/PRESENT (ISO standards for traditional and lightweight ciphers), and SHA-3 finalists (for hash functions)

EXTRA 10 % discount with code: EXTRA

229,58
255,09 €
We will send in 10–14 business days.

The promotion ends in 21d.19:30:26

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 2,55 Book Euros!?
  • Author: Ayesha Khalid
  • Publisher:
  • Year: 2017
  • ISBN-10: 9811010692
  • ISBN-13: 9789811010699
  • Format: 15.6 x 23.4 x 1.6 cm, kieti viršeliai
  • Language: English English

Includes case studies that illustrate step-by-step undertaking of cryptographic functions for mapping using the cryptographic kernels toolkit (CRYKET)

Enables cryptographers working with any class of symmetric key cryptography to achieve area efficiency and throughput maximization over a wide range of platforms
Features the state-of-the-art cryptographic functions including eSTREAM (for stream ciphers), AES/PRESENT (ISO standards for traditional and lightweight ciphers), and SHA-3 finalists (for hash functions)

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)