Hardware Security: Design, Threats, and Safeguards

· CRC Press
Е-книга
542
Страници
Соодветна
Оцените и рецензиите не се потврдени  Дознајте повеќе

За е-книгава

Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Presenting state-of-the-art research and strategies for the design of very large scale integrated circuits and symmetric cryptosystems, the text discusses hardware intellectual property protection, obfuscation and physically unclonable functions, Trojan threats, and algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis. Gain a comprehensive understanding of hardware security from fundamentals to practical applications.

За авторот

Dr. Debdeep Mukhopadhyay is an associate professor at the Indian Institute of Technology (IIT) Kharagpur, West Bengal, where he has been instrumental in setting up a side channel analysis laboratory. Previously, he worked as an assistant professor at the IIT Kharagpur and Madras. His research interests include VLSI of cryptographic algorithms and side channel analysis. A popular invited speaker, he has authored around 100 international conference and journal papers, co-authored a textbook on cryptography and network security, reviewed and served on program committees for several international conferences, and collaborated with several organizations including ISRO, DIT, ITI, DRDO, and NTT-Labs Japan. He has been the recipient of the prestigious INSA Young Scientist Award and the INAE Young Engineer Award.

Dr. Rajat Subhra Chakraborty is an assistant professor at the Indian Institute of Technology Kharagpur, West Bengal. Previously, he worked as a CAD software engineer at National Semiconductor, Bangalore, Karnataka, India and a co-op at Advanced Micro Devices, Sunnyvale, California, USA. His research interests include design methodology for hardware IPIIC protection, hardware Trojan detection/prevention through design and testing, attacks on hardware implementation of cryptographic algorithms, and reversible watermarking for digital content protection. He has authored over 25 conference and journal publications and presented at numerous events including the 2011 IEEE VLSI Design Conference, where he delivered a tutorial on hardware security.

Оценете ја е-книгава

Кажете ни што мислите.

Информации за читање

Паметни телефони и таблети
Инсталирајте ја апликацијата Google Play Books за Android и iPad/iPhone. Автоматски се синхронизира со сметката и ви овозможува да читате онлајн или офлајн каде и да сте.
Лаптопи и компјутери
Може да слушате аудиокниги купени од Google Play со користење на веб-прелистувачот на компјутерот.
Е-читачи и други уреди
За да читате на уреди со е-мастило, како што се е-читачите Kobo, ќе треба да преземете датотека и да ја префрлите на уредот. Следете ги деталните упатства во Центарот за помош за префрлање на датотеките на поддржани е-читачи.