by Debdeep Mukhopadhyay (Author), Debdeep Mukhopadhyay (Author), Rajat Subhra Chakraborty (Author)
Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).
Gain a Comprehensive Understanding of Hardware Security-from Fundamentals to Practical Applications
Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards:
Design for Security and Meet Real-Time Requirements
If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you'll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.
Format: Illustrated
Pages: 590
Edition: 1
Publisher: Chapman and Hall/CRC
Published: 07 Nov 2014
ISBN 10: 143989583X
ISBN 13: 9781439895832
... an excellent job introducing the field of hardware security. It is a good source for upper undergraduates, postgraduates, and practitioners. The book does not need to be read cover to cover, and a select subset of chapters can form an undergraduate or graduate course in hardware security. ... an excellent reference and can help graduate students move quickly to the frontiers of research. With its 432 references, the book helps direct readers who want to explore a specific topic in more detail.
-Computing Reviews, April 2015