Advertisement

Domain Specific High-Level Synthesis for Cryptographic Workloads

  • Ayesha Khalid
  • Goutam Paul
  • Anupam Chattopadhyay

Part of the Computer Architecture and Design Methodologies book series (CADM)

Table of contents

  1. Front Matter
    Pages i-xxii
  2. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 1-4
  3. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 5-22
  4. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 23-49
  5. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 51-90
  6. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 91-125
  7. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 127-168
  8. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 169-194
  9. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 195-213
  10. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 215-217
  11. Back Matter
    Pages 219-237

About this book

Introduction

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.

Keywords

Symmetric Key Cryptography Block Ciphers Stream Ciphers Hash Function Cryptographic Primitives Rapid Prototyping Cryptosystems Application Specific Integrated Circuit (ASIC) Cryptographic Kernels Toolkit (CRYKET) Cryptanalytic Hardware

Authors and affiliations

  • Ayesha Khalid
    • 1
  • Goutam Paul
    • 2
  • Anupam Chattopadhyay
    • 3
  1. 1.The Institute of Electronics, Communications and Information TechnologyQueen’s University BelfastBelfastIreland
  2. 2.Cryptology and Security Research Unit, R. C. Bose Centre for Cryptology and SecurityIndian Statistical InstituteKolkataIndia
  3. 3.School of Computer EngineeringNanyang Technological UniversitySingaporeSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-10-1070-5
  • Copyright Information Springer Nature Singapore Pte Ltd 2019
  • Publisher Name Springer, Singapore
  • eBook Packages Engineering
  • Print ISBN 978-981-10-1069-9
  • Online ISBN 978-981-10-1070-5
  • Series Print ISSN 2367-3478
  • Series Online ISSN 2367-3486
  • Buy this book on publisher's site
Industry Sectors
Automotive
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering