000 a
999 _c33050
_d33050
008 240319b xxu||||| |||| 00| 0 eng d
020 _a9783031191879
082 _a929.605
_bTEH
100 _aTehranipoor, Mohammad H.
245 _aHardware Security Primitives
260 _bSpringer,
_c2023
_aCham :
300 _axvii, 350 p. ;
_bill.,
_c24 cm.
365 _b69.99
_c
_d93.50
504 _aIncludes bibliographical references and index.
520 _aThis book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security.
650 _aComputer architecture
650 _aIntrinsic Racetrack PUF
650 _aEmbedded Watermarks
650 _aBlock ciphers
650 _aFault injection
650 _aHamming distance
650 _aIntegrated circuits
650 _aPiscataway
650 _aRing oscillators
650 _aSide-channel attacks
650 _aSmart contracts
650 _aSmart contracts
700 _aPundir, Nitin
700 _aVashistha, Nidish
700 _aFarahmandi, Farimah
942 _2ddc
_cBK