Picture 1 of 3
Picture 1 of 3
System-on-Chip Architectures and Implementation s for Private-Key Data Encryption
US $99.99
ApproximatelyS$ 129.32
Condition:
Brand New
A new, unread, unused book in perfect condition with no missing or damaged pages.
Postage:
US $5.60 (approx S$ 7.24) USPS Media MailTM.
Located in: Brighton, Colorado, United States
Delivery:
Estimated between Thu, 26 Sep and Mon, 30 Sep to 43230
Returns:
No returns accepted.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:313365450100
Item specifics
- Condition
- Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
- Narrative Type
- Nonfiction
- Subject
- Information Theory, Security / Cryptography, Electronics / Circuits / General
- ISBN-13
- 9781461348979
- ISBN
- 9781461348979
- EAN
- 9781461348979
- Subject Area
- Computers, Technology & Engineering
- Publication Name
- System-On-Chip Architectures and Implementations for Private-Key Data Encryption
- Publisher
- Springer
- Item Length
- 9.3 in
- Publication Year
- 2012
- Type
- Textbook
- Format
- Trade Paperback
- Language
- English
- Item Weight
- 10.1 Oz
- Item Width
- 6.1 in
- Number of Pages
- Xiv, 160 Pages
About this product
Product Identifiers
Publisher
Springer
ISBN-10
1461348978
ISBN-13
9781461348979
eBay Product ID (ePID)
175879714
Product Key Features
Number of Pages
Xiv, 160 Pages
Language
English
Publication Name
System-On-Chip Architectures and Implementations for Private-Key Data Encryption
Subject
Information Theory, Security / Cryptography, Electronics / Circuits / General
Publication Year
2012
Type
Textbook
Subject Area
Computers, Technology & Engineering
Format
Trade Paperback
Dimensions
Item Weight
10.1 Oz
Item Length
9.3 in
Item Width
6.1 in
Additional Product Features
Intended Audience
Scholarly & Professional
Reviews
From the reviews: "Security has become a very critical issue in the provision of mobile services. The demands for effective and secure communications in wireless networks are especially notable in the electronics area. ... This is an easy book to read. It focuses on efficient hardware implementation for private key algorithms. ... From the technical point of view, the book is very good, with enough explanations and solution trade-offs." (IEEE Circuits & Devices Magazine, Vol. 21 (6), 2005)
Number of Volumes
1 vol.
Illustrated
Yes
Table Of Content
1 Background Theory.- 1.1. Introduction.- 1.2. Cryptographic Algorithms.- 1.3. Cryptanalysis.- 1.4. Hardware-Based Cryptographic Implementation.- 1.5. AES Development Effort.- 1.6. Rijndael Algorithm Finite Field Mathematics.- 1.7. Conclusions.- 2 Des Algorithm Architectures and Implementations.- 2.1. Introduction.- 2.2. DES Algorithm Description.- 2.3. DES Modes of Operation.- 2.4. Triple-DES.- 2.5. Review of Previous Work.- 2.6. Generic Parameterisable DES IP Architecture Design.- 2.7. Novel Key Scheduling Method.- 2.8. Conclusions.- 3 Rijndael Architectures and Implementations.- 3.1. Introduction.- 3.2. Rijndael Algorithm Description.- 3.3. Review of Rijndael Hardware Implementations.- 3.4. Design of High Speed Rijndael Encryptor Core.- 3.5. Encryptor/Decryptor Core.- 3.6. Performance Results.- 3.7. Conclusions.- 4 Further Rijndael Algorithm Architectures and Implementations.- 4.1. Introduction.- 4.2. Look-Up Table Based Rijndael Architecture.- 4.3. Rijndael Modes of Operation.- 4.4. Overall Generic AES Architecture.- 4.5. Conclusions.- 5 Hash Algorithms and Security Applications.- 5.1. Introduction.- 5.2. Internet Protocol Security (IPSec).- 5.3. IPSec Authentication Algorithms.- 5.4. IPSec Cryptographic Processor Design.- 5.5. Performance Results.- 5.6. IPSec Cryptographic Processor Use in Other Applications.- 5.7. SHA-384/SHA-512 Processor.- 5.8. Conclusions.- 6 Concluding Summary and Future Work.- 6.1. Concluding Summary.- 6.2. Future work.- Appendix A - Modulo Arithmetic.- Appendix B - DES Algorithm Permutations and S-Boxes.- Appendix C - LUTs Utilised in Rijndael Algorithm.- Appendix D - LUTs in LUT-Based Rijndael Architecture.- Appendix E - SHA-384/SHA-512 Constants.- References.
Synopsis
In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation. In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation.
LC Classification Number
QA268
Item description from the seller
Seller feedback (48)
- a***a (7)- Feedback left by buyer.Past 6 monthsVerified purchaseGreat condition book.MILTON AVERY- Hardcover 1980 Strathcona Pub by Bonnie Lee Grad 1st edition (#313514698379)
- p***t (639)- Feedback left by buyer.More than a year agoVerified purchaseGood eBayer would buy from againClymer Repair Manual Yamaha 250 - 500 cc Enduro & Motocross 1968 - 1978 M415 (#314302256701)
- m***. (23)- Feedback left by buyer.More than a year agoVerified purchaseGreat seller1996 CHEVROLET/GMC C/K Truck Service Manual Set 2-YUKON TAHOE SUBURBAN SILVERADO (#314302253672)