Includes case studies that illustrate step-by-step undertaking of cryptographic functions for mapping using the cryptographic kernels toolkit (CRYKET)
Enables cryptographers working with any class of symmetric key cryptography to achieve area efficiency and throughput maximization over a wide range of platforms