Søkt på: Søkeresultat
totalt 20 treff
Lattice-Based Public-Key Cryptography in Hardware
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network …
Fault Tolerant Architectures for Cryptography and Hardware Security
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the …
Invasive Tightly Coupled Processor Arrays
This book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, architecture designs, and …
Emerging Computing: From Devices to Systems
The book covers a range of topics dealing with emerging computing technologies which are being developed in response to challenges faced due to scaling CMOS technologies. It …
Classical and Physical Security of Symmetric Key Cryptographic Algorithms
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the …
Energy Efficient High Performance Processors
This book explores energy efficiency techniques for high-performance computing (HPC) systems using power-management methods. Adopting a step-by-step approach, it describes …
Compact and Fast Machine Learning Accelerator for IoT Devices
This book presents the latest techniques for machine learning based data analytics on IoT edge devices. A comprehensive literature review on neural network compression and machine …
Domain Specific High-Level Synthesis for Cryptographic Workloads
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key …
High-level Estimation and Exploration of Reliability for Multi-Processor System-on-Chip
This book introduces a novel framework for accurately modeling the errors in nanoscale CMOS technology and developing a smooth tool flow at high-level design abstractions to …
Fully Homomorphic Encryption in Real World Applications
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the …
Invasive Tightly Coupled Processor Arrays
This book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, architecture designs, and …
Implementation and Analysis of Ciphers in Quantum Computing
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering …