Dwarfs of Cryptography

  • Khalid A
  • Paul G
  • Chattopadhyay A
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Here the aim is to develop better performance optimized hardware implementations for the domain of cryptography. Towards this goal, the current chapter first focuses on the necessity of classifying and identifying a range of operations that are representative of a whole range of algorithms for a specific application domain, namely, cryptography.

Cite

CITATION STYLE

APA

Khalid, A., Paul, G., & Chattopadhyay, A. (2019). Dwarfs of Cryptography (pp. 23–49). https://doi.org/10.1007/978-981-10-1070-5_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free