机读格式显示(MARC)
- 000 03038cam a2200385 i 4500
- 008 230107s2023 sz a b 001 0 eng d
- 020 __ |z 9783031191855 |q (electronic bk.)
- 020 __ |z 3031191854 |q (electronic bk.)
- 035 __ |a (OCoLC)1356007632 |z (OCoLC)1355267816 |z (OCoLC)1357115971
- 040 __ |a EBLCP |b eng |e rda |c EBLCP |d GW5XE |d STF |d YDX
- 082 04 |a 005.8 |2 23/eng/20230110
- 100 1_ |a Tehranipoor, Mohammad H., |d 1974- |e author.
- 245 10 |a Hardware security primitives / |c Mark Tehranipoor, Nitin Pundir, Nidish Vashistha, Farimah Farahmandi.
- 260 __ |a Cham : |b Springer, |c 2023.
- 300 __ |a 340 pages : |b illustrations (black and white, and colour) ; |c 24 cm
- 336 __ |a text |b txt |2 rdacontent
- 337 __ |a unmediated |b n |2 rdamedia
- 338 __ |a volume |b nc |2 rdacarrier
- 504 __ |a Includes bibliographical references and index.
- 505 0_ |a Introduction -- Hardware Security Primitives and their Applications -- Racetrack PUF -- TERO PUF -- Direct Characterization PUF -- Volatile Memory Based PUF -- Emerging Memory Based PUF -- Extrinsic Characterization of PUF -- Radio PUFs and CoAs -- Optical PUFs -- True Random Number Generators -- Hardware Camouflaging -- Temper Detection Methods -- Embedded Watermarking -- Counterfeit and Recycled IC Detection -- Package-Level Counterfeit IC Detection -- Side Channels Protection in Cryptographic Hardware -- Fault Injection Resistant Cryptographic Hardware -- Energy and Performance Optimization for Cryptography -- Lightweight Cryptography -- Post-Quantum Cryptography -- Virtual Proof of Reality -- Analog Security.
- 520 __ |a This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security.
- 650 _0 |a Computer security.
- 700 1_ |a Pundir, Nitin, |e author.
- 700 1_ |a Vashistha, Nidish, |e author.
- 700 1_ |a Farahmandi, Farimah, |e author.
- 710 2_ |a Ohio Library and Information Network.
- 776 08 |i Print version: |a Tehranipoor, Mark |t Hardware Security Primitives |d Cham : Springer International Publishing AG,c2023 |z 9783031191848