Search Books
Dynamic RAM: Technology Adv… Buttonless: Incredible iPho…

Hardware Security: Design, Threats, and Safeguards

Author Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Publisher Chapman and Hall/CRC
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
61.33 89.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $80.13

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN143989583X
ISBN-139781439895832
AvailabilityUsually ships in 24 hours
Sales Rank138,002
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

Gain a Comprehensive Understanding of Hardware Security from Fundamentals to Practical Applications

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards:

  • Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
  • Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
  • Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention

Design for Security and Meet Real-Time Requirements

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View