Hardware security : design, threats, and safeguards

著者

    • Mukhopadhyay, Debdeep
    • Chakraborty, Rajat Subhra

書誌事項

Hardware security : design, threats, and safeguards

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

CRC Press, c2015

  • : hardback

大学図書館所蔵 件 / 5

この図書・雑誌をさがす

注記

Bibliography: p. 505-534

Includes index

内容説明・目次

内容説明

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC). Gain a Comprehensive Understanding of Hardware Security-from Fundamentals to Practical Applications Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards: Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention Design for Security and Meet Real-Time Requirements If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you'll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.

目次

Mathematical Background. Overview of Modern Cryptography. Modern Hardware Design Practices. Hardware Design of the Advanced Encryption Standard. Efficient Design of Finite Field Arithmetic on FPGAs. High Speed Implementation of Elliptic Curve Scalar Multiplication on FPGAs. Introduction to Side Channel Analysis. Differential Fault Analysis of Ciphers. Cache Attacks on Ciphers. Power Analysis of Cipher Implementations. Testability of Cryptographic Hardware. Hardware Intellectual Property Protection through Obfuscation. Overview of Hardware Trojans. Logic Testing-Based Hardware Trojan Detection. Side-Channel Analysis Techniques for Hardware Trojans Detection. Design Techniques for Hardware Trojan Threat Mitigation. Physically Unclonable Functions: A Root-of-Trust for Hardware Security. Genetic Programming-Based Model Building Attack on PUFs.

「Nielsen BookData」 より

詳細情報

  • NII書誌ID(NCID)
    BB18164439
  • ISBN
    • 9781439895832
  • 出版国コード
    us
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    Boca Raton, Fla.
  • ページ数/冊数
    xxxiii, 556 p.
  • 大きさ
    26 cm
  • 分類
  • 件名
ページトップへ