Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. It focuses on cryptographic algorithms, such as symmetric- and public-key, before dealing with the construction of cryptographic protocols. The author examines tradeoffs between code size, hardware logic resource requirements, memory usage, speed, power consumption, and more. He includes many examples and problems to evaluate implementation results of several software and hardware languages. He also provides C and VHDL frameworks...
Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and em...