MIPS Pipeline Cryptoprocessor: 􀀍􀀎􀀏􀀂􀀋􀀊􀀐􀀆􀀑􀀒􀀓􀀈􀀎􀀒􀀎􀀊􀀅􀀄􀀅􀀂􀀔􀀊􀀆􀀄􀀊􀀕􀀆􀀉􀀖􀀊􀀅􀀌􀀎􀀏􀀂􀀏􀀍􀀎􀀏􀀂􀀋􀀊􀀐􀀆􀀑􀀒􀀓􀀈􀀎􀀒􀀎􀀊􀀅􀀄􀀅􀀂􀀔􀀊􀀆􀀄􀀊􀀕􀀆􀀉􀀖􀀊􀀅􀀌􀀎􀀏􀀂􀀏􀀍􀀎􀀏􀀂􀀋􀀊􀀐􀀆􀀑􀀒􀀓􀀈􀀎􀀒􀀎􀀊􀀅􀀄􀀅􀀂􀀔􀀊􀀆􀀄􀀊􀀕􀀆􀀉􀀖􀀊􀀅􀀌􀀎􀀏􀀂􀀏Design, Implementation and Synthesis

· LAP Lambert Academic Publishing
eBook
480
Pages

About this eBook

 The design and implementation of a crypto processor based on Cryptographic algorithms can be used in wide range of electronic devices, include PCs, PDAs, hardware security modules, web servers etc. The growing problem of breaches in information security in recent years has created a demand for earnest efforts towards ensuring security in electronic processors. The successful deployment of these electronic processors for ecommerce, Internet banking, government online services, VPNs, mobile commerce etc., are dependent on the effectiveness of the security solutions. These security concerns are further compounded when resource-constrained environments and real-time speed requirements have to be considered in next generation applications. Consequently, these IT and Network security issues have been a subject of intensive research in areas of computing, networking and cryptography these last few years. Computational methodologies, computer arithmetic, and encryption algorithms need deep investigation and research to obtain efficient integrations of crypto-processors, with desirable improvements and optimizations. Approaches on silicon achieve high values of speed and bandwidth.

Rate this eBook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Centre instructions to transfer the files to supported eReaders.