000 | a | ||
---|---|---|---|
999 |
_c33050 _d33050 |
||
008 | 240319b xxu||||| |||| 00| 0 eng d | ||
020 | _a9783031191879 | ||
082 |
_a929.605 _bTEH |
||
100 | _aTehranipoor, Mohammad H. | ||
245 | _aHardware Security Primitives | ||
260 |
_bSpringer, _c2023 _aCham : |
||
300 |
_axvii, 350 p. ; _bill., _c24 cm. |
||
365 |
_b69.99 _c€ _d93.50 |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _aThis book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security. | ||
650 | _aComputer architecture | ||
650 | _aIntrinsic Racetrack PUF | ||
650 | _aEmbedded Watermarks | ||
650 | _aBlock ciphers | ||
650 | _aFault injection | ||
650 | _aHamming distance | ||
650 | _aIntegrated circuits | ||
650 | _aPiscataway | ||
650 | _aRing oscillators | ||
650 | _aSide-channel attacks | ||
650 | _aSmart contracts | ||
650 | _aSmart contracts | ||
700 | _aPundir, Nitin | ||
700 | _aVashistha, Nidish | ||
700 | _aFarahmandi, Farimah | ||
942 |
_2ddc _cBK |