Hardware Security: Design, Threats, and Safeguards

ebook
542
Σελίδες
Κατάλληλο
Οι αξιολογήσεις και οι κριτικές δεν επαληθεύονται  Μάθετε περισσότερα

Σχετικά με το ebook

Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Presenting state-of-the-art research and strategies for the design of very large scale integrated circuits and symmetric cryptosystems, the text discusses hardware intellectual property protection, obfuscation and physically unclonable functions, Trojan threats, and algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis. Gain a comprehensive understanding of hardware security from fundamentals to practical applications.

Σχετικά με τον συγγραφέα

Dr. Debdeep Mukhopadhyay is an associate professor at the Indian Institute of Technology (IIT) Kharagpur, West Bengal, where he has been instrumental in setting up a side channel analysis laboratory. Previously, he worked as an assistant professor at the IIT Kharagpur and Madras. His research interests include VLSI of cryptographic algorithms and side channel analysis. A popular invited speaker, he has authored around 100 international conference and journal papers, co-authored a textbook on cryptography and network security, reviewed and served on program committees for several international conferences, and collaborated with several organizations including ISRO, DIT, ITI, DRDO, and NTT-Labs Japan. He has been the recipient of the prestigious INSA Young Scientist Award and the INAE Young Engineer Award.

Dr. Rajat Subhra Chakraborty is an assistant professor at the Indian Institute of Technology Kharagpur, West Bengal. Previously, he worked as a CAD software engineer at National Semiconductor, Bangalore, Karnataka, India and a co-op at Advanced Micro Devices, Sunnyvale, California, USA. His research interests include design methodology for hardware IPIIC protection, hardware Trojan detection/prevention through design and testing, attacks on hardware implementation of cryptographic algorithms, and reversible watermarking for digital content protection. He has authored over 25 conference and journal publications and presented at numerous events including the 2011 IEEE VLSI Design Conference, where he delivered a tutorial on hardware security.

Αξιολογήστε αυτό το ebook

Πείτε μας τη γνώμη σας.

Πληροφορίες ανάγνωσης

Smartphone και tablet
Εγκαταστήστε την εφαρμογή Βιβλία Google Play για Android και iPad/iPhone. Συγχρονίζεται αυτόματα με τον λογαριασμό σας και σας επιτρέπει να διαβάζετε στο διαδίκτυο ή εκτός σύνδεσης, όπου κι αν βρίσκεστε.
Φορητοί και επιτραπέζιοι υπολογιστές
Μπορείτε να ακούσετε ηχητικά βιβλία τα οποία αγοράσατε στο Google Play, χρησιμοποιώντας το πρόγραμμα περιήγησης στον ιστό του υπολογιστή σας.
eReader και άλλες συσκευές
Για να διαβάσετε περιεχόμενο σε συσκευές e-ink, όπως είναι οι συσκευές Kobo eReader, θα χρειαστεί να κατεβάσετε ένα αρχείο και να το μεταφέρετε στη συσκευή σας. Ακολουθήστε τις αναλυτικές οδηγίες του Κέντρου βοήθειας για να μεταφέρετε αρχεία σε υποστηριζόμενα eReader.