Hardware architectures for post-quantum digital signature schemes (Record no. 33048)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240319b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030576813
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.133
Item number SON
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Soni, Deepraj
245 ## - TITLE STATEMENT
Title Hardware architectures for post-quantum digital signature schemes
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2021
Place of publication, distribution, etc Cham :
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 170 p. ;
Other physical details ill.,
Dimensions 25 cm.
365 ## - TRADE PRICE
Price amount 99.99
Price type code
Unit of pricing 93.50
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based; Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms; Enables designers to build hardware implementations that are resilient to a variety of side-channels.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer algorithms
Topical term or geographic name as entry element Quantum computing
Topical term or geographic name as entry element Area overhead
Topical term or geographic name as entry element Baseline implementation
Topical term or geographic name as entry element Dynamic memory allocation
Topical term or geographic name as entry element Hash function
Topical term or geographic name as entry element Loop unrolling
Topical term or geographic name as entry element Secret key
Topical term or geographic name as entry element Signature verification
Topical term or geographic name as entry element Unrolling and loop
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Basu, Kanad
Personal name Nabeel, Mohammed
Personal name Aaraj, Najwa
Personal name Manzano, Marc
Personal name Karri, Ramesh
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2024-03-15 9349.07 005.133 SON 034851 2024-03-19 Books

Powered by Koha