Embedded Cryptographic Hardware Methodologies & Architectures 2004 Edition at Meripustak

Embedded Cryptographic Hardware Methodologies & Architectures 2004 Edition

Books from same Author: Nadia Nedjah, Luiza Macedo Mourelle

Books from same Publisher: Nova Science

Related Category: Author List / Publisher List


  • Retail Price: ₹ 17589/- [ 0.00% off ]

    Seller Price: ₹ 17589

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 0.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 0.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Nadia Nedjah, Luiza Macedo Mourelle
    PublisherNova Science
    ISBN9781594540127
    Pages295
    BindingHardback
    LanguageEnglish
    Publish YearOctober 2004

    Description

    Nova Science Embedded Cryptographic Hardware Methodologies & Architectures 2004 Edition by Nadia Nedjah, Luiza Macedo Mourelle

    Modern cryptology, which is the basis of information security techniques, started in the late 70's and developed in the 80's. As communication networks were spreading deep into society, the need for secure communication greatly promoted cryptographic research. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated systems for cryptography are becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, hardware implementations of cryptographic algorithms become cost-effective. The focus of this book is on all aspects of embedded cryptographic hardware. Of special interest are contributions that describe new secure and fast hardware implementations and new efficient algorithms, methodologies and protocols for secure communications. This book is organised in two parts. The first part is dedicated to embedded hardware of cryptosystems while the second part focuses on new algorithms for cryptography, design methodologies and secure protocols.