Here the aim is to develop better performance optimized hardware implementations for the domain of cryptography. Towards this goal, the current chapter first focuses on the necessity of classifying and identifying a range of operations that are representative of a whole range of algorithms for a specific application domain, namely, cryptography.
CITATION STYLE
Khalid, A., Paul, G., & Chattopadhyay, A. (2019). Dwarfs of Cryptography (pp. 23–49). https://doi.org/10.1007/978-981-10-1070-5_3
Mendeley helps you to discover research relevant for your work.