ABSTRACT
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Presenting state-of-the-art research and strategies for the design of very large scale integrated circuits and symmetric cryptosystems, the text discusses hardware intellectual property protection, obfuscation and physically unclonable functions, Trojan threats, and algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis. Gain a comprehensive understanding of hardware security from fundamentals to practical applications.
TABLE OF CONTENTS
part 1|2 pages
Part I Background
part 2|2 pages
Part II Hardware Design Of Cryptographic Algorithms
part 3|2 pages
Part III Side Channel Analysis
part 4|2 pages
Part IV Hardware Intellectual Property Protection
part 5|2 pages
Part V Hardware Trojans
part 6|2 pages
Part VI Physically Unclonable Functions