×







We sell 100% Genuine & New Books only!

Embedded Cryptographic Hardware Methodologies & Architectures 2004 Edition at Meripustak

Embedded Cryptographic Hardware Methodologies & Architectures 2004 Edition by Nadia Nedjah, Luiza Macedo Mourelle , Nova Science

Books from same Author: Nadia Nedjah, Luiza Macedo Mourelle

Books from same Publisher: Nova Science

Related Category: Author List / Publisher List


  • Price: ₹ 16829.00/- [ 11.00% off ]

    Seller Price: ₹ 14977.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Nadia Nedjah, Luiza Macedo Mourelle
    PublisherNova Science
    ISBN9781594540127
    Pages295
    BindingHardback
    LanguageEnglish
    Publish YearOctober 2004

    Description

    Nova Science Embedded Cryptographic Hardware Methodologies & Architectures 2004 Edition by Nadia Nedjah, Luiza Macedo Mourelle

    Modern cryptology, which is the basis of information security techniques, started in the late 70's and developed in the 80's. As communication networks were spreading deep into society, the need for secure communication greatly promoted cryptographic research. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated systems for cryptography are becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, hardware implementations of cryptographic algorithms become cost-effective. The focus of this book is on all aspects of embedded cryptographic hardware. Of special interest are contributions that describe new secure and fast hardware implementations and new efficient algorithms, methodologies and protocols for secure communications. This book is organised in two parts. The first part is dedicated to embedded hardware of cryptosystems while the second part focuses on new algorithms for cryptography, design methodologies and secure protocols.



    Book Successfully Added To Your Cart