Hardware Security

About The Book

<p>Beginning with an introduction to cryptography <b>Hardware Security: Design Threats and Safeguards</b> explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems complete with examples of Advanced Encryption Standard (AES) ciphers asymmetric ciphers and elliptic curve cryptography (ECC).</p><p>Gain a Comprehensive Understanding of Hardware Security—from Fundamentals to Practical Applications</p><p>Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys <b>Hardware Security: Design Threats and Safeguards</b>:</p><ul> <p> </p> <li>Details algorithmic- and circuit-level countermeasures for attacks based on power timing fault cache and scan chain analysis</li> <li>Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking</li> <li>Discusses hardware obfuscation and physically unclonable functions (PUFs) as well as Trojan modeling taxonomy detection and prevention</li> </ul><p>Design for Security and Meet Real-Time Requirements</p><p>If you consider security as critical a metric for integrated circuits (ICs) as power area and performance you’ll embrace the design-for-security methodology of <b>Hardware Security: Design Threats and Safeguards</b>.</p>
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE