10% off all books and free delivery over £50
Buy from our bookstore and 25% of the cover price will be given to a school of your choice to buy more books. *15% of eBooks.

Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories

View All Editions (1)

The selected edition of this book is not available to buy right now.
Add To Wishlist
Write A Review

About

Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories Synopsis

In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems such as non-volatile flash memories. A new concept for elliptic curve cryptography is presented, which uses an arithmetic over Gaussian integers. Gaussian integers are a subset of the complex numbers with integers as real and imaginary parts. Ordinary modular arithmetic over Gaussian integers is computational expensive. To reduce the complexity, a new arithmetic based on the Montgomery reduction is presented. For the elliptic curve point multiplication, this arithmetic over Gaussian integers improves the computational efficiency, the resistance against side channel attacks, and reduces the memory requirements. Furthermore, an efficient variant of the Lempel-Ziv-Welch (LZW) algorithm for universal lossless data compression is investigated. Instead of one LZW dictionary, this algorithm applies several dictionaries to speed up the encoding process. Two dictionary partitioning techniques are introduced that improve the compression rate and reduce the memory size of this parallel dictionary LZW algorithm.

About This Edition

ISBN: 9783658344580
Publication date:
Author: Malek Safieh
Publisher: Springer Vieweg an imprint of Springer Fachmedien Wiesbaden
Format: Paperback
Pagination: 142 pages
Series: Schriftenreihe der Institute für Systemdynamik (ISD) und optische Systeme (IOS)
Genres: Computer architecture and logic design
Computer security
Network security
Computer hardware
Coding theory and cryptology
Data encryption