000 04189nam a22005655i 4500
001 978-3-319-76804-5
003 DE-He213
005 20210201191414.0
007 cr nn 008mamaa
008 180418s2018 gw | s |||| 0|eng d
020 _a9783319768045
_9978-3-319-76804-5
050 4 _aTK7888.4
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aHalak, Basel.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aPhysically Unclonable Functions
_h[electronic resource] :
_bFrom Basic Design Principles to Advanced Hardware Security Applications /
_cby Basel Halak.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXIX, 250 p. 92 illus., 62 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
500 _aAcceso multiusuario
505 0 _aA Primer on Cryptographic Primitives and Security Attacks -- Physically Unclonable Functions: Design Principles and Evaluation Metrics -- Reliability Challenges of Silicon-Based Physically Unclonable Functions -- Reliability Enhancement Techniques for Physically Unclonable Functions -- Security Attacks on Physically Unclonable Functions and Possible Countermeasures -- Hardware-based Security Applications of Physically Unclonable Functions -- Appendix 1 -- Appendix 2 -- Appendix 3.
520 _aThis book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book: Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures; Includes an intensive tutorial on how to design and evaluate physically unclonable functions, supported by circuit diagrams and exemplar hardware implementations; Discusses the reliability challenges facing PUF technology and explains in details the state of the art mitigation approaches adopted, including those based on error correction codes and/or pre-processing techniques; Gives a comprehensive tutorial on the security threats facing PUF technology, including modelling attacks using machine learning algorithms, side channel analysis, and physical attacks. It also outlines possible countermeasures and defence mechanisms; Explains in detailed the practical applications of PUF technology, these include secure cryptographic key generation and storage, hardware-assisted security protocols, low cost secure sensors, anti-counterfeit integrated circuits and anti-tamper hardware. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading. .
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aElectronic circuits.
650 0 _aMicroprocessors.
650 0 _aSignal processing.
650 0 _aImage processing.
650 0 _aSpeech processing systems.
650 1 4 _aCircuits and Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24068
650 2 4 _aProcessor Architectures.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13014
650 2 4 _aSignal, Image and Speech Processing.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24051
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319768038
776 0 8 _iPrinted edition:
_z9783319768052
776 0 8 _iPrinted edition:
_z9783030082932
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-76804-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c243126
_d243125