000 03885nam a22005895i 4500
001 978-3-031-19185-5
003 DE-He213
005 20240207153519.0
007 cr nn 008mamaa
008 221215s2023 sz | s |||| 0|eng d
020 _a9783031191855
_9978-3-031-19185-5
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aTehranipoor, Mark.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aHardware Security Primitives
_h[electronic resource] /
_cby Mark Tehranipoor, Nitin Pundir, Nidish Vashistha, Farimah Farahmandi.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aXVII, 350 p. 147 illus., 140 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
500 _aAcceso multiusuario
505 0 _aIntroduction -- Hardware Security Primitives and their Applications -- Racetrack PUF -- TERO PUF -- Direct Characterization PUF -- Volatile Memory Based PUF -- Emerging Memory Based PUF -- Extrinsic Characterization of PUF -- Radio PUFs and CoAs -- Optical PUFs -- True Random Number Generators -- Hardware Camouflaging -- Temper Detection Methods -- Embedded Watermarking -- Counterfeit and Recycled IC Detection -- Package-Level Counterfeit IC Detection -- Side Channels Protection in Cryptographic Hardware -- Fault Injection Resistant Cryptographic Hardware -- Energy and Performance Optimization for Cryptography -- Lightweight Cryptography -- Post-Quantum Cryptography -- Virtual Proof of Reality -- Analog Security.
520 _aThis book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security.
541 _fUABC ;
_cPerpetuidad
650 0 _aElectronic circuits.
650 0 _aElectronic circuit design.
650 0 _aMicroprocessors.
650 0 _aComputer architecture.
650 1 4 _aElectronic Circuits and Systems.
650 2 4 _aElectronics Design and Verification.
650 2 4 _aProcessor Architectures.
700 1 _aPundir, Nitin.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aVashistha, Nidish.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aFarahmandi, Farimah.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031191848
776 0 8 _iPrinted edition:
_z9783031191862
776 0 8 _iPrinted edition:
_z9783031191879
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-19185-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c260940
_d260939