Image for Hardware Security

Hardware Security : Design, Threats, and Safeguards

See all formats and editions

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms.

It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC). Gain a Comprehensive Understanding of Hardware Security—from Fundamentals to Practical ApplicationsSince most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards: Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysisDescribes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarkingDiscusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and preventionDesign for Security and Meet Real-Time RequirementsIf you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you’ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.

Read More
Special order line: only available to educational & business accounts. Sign In
£110.50 Save 15.00%
RRP £130.00
Product Details
Chapman & Hall/CRC
143989583X / 9781439895832
Hardback
005.8
29/10/2014
United States
English
600 p. : ill.
24 cm