Millions of books in English, Spanish and other languages. Free UK delivery 

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada hardware security
Type
Physical Book
Publisher
Language
English
Pages
600
Format
Hardcover
Dimensions
25.8 x 19.6 x 3.5 cm
Weight
1.22 kg.
ISBN
143989583x
ISBN13
9781439895832

hardware security

Debdeep Mukhopadhyay (Author) · Rajat Subhra Chakraborty (Author) · CRC Press · Hardcover

hardware security - Mukhopadhyay, Debdeep ; Chakraborty, Rajat Subhra

Physical Book

£ 117.00

£ 130.00

You save: £ 13.00

10% discount
  • Condition: New
It will be shipped from our warehouse between Monday, June 03 and Thursday, June 06.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.

Synopsis "hardware security"

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC). Gain a Comprehensive Understanding of Hardware Security-from Fundamentals to Practical Applications Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards: Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention Design for Security and Meet Real-Time Requirements If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you'll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Hardcover.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews