000 | 03885nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-031-19185-5 | ||
003 | DE-He213 | ||
005 | 20240207153519.0 | ||
007 | cr nn 008mamaa | ||
008 | 221215s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031191855 _9978-3-031-19185-5 |
||
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aTehranipoor, Mark. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aHardware Security Primitives _h[electronic resource] / _cby Mark Tehranipoor, Nitin Pundir, Nidish Vashistha, Farimah Farahmandi. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXVII, 350 p. 147 illus., 140 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
500 | _aAcceso multiusuario | ||
505 | 0 | _aIntroduction -- Hardware Security Primitives and their Applications -- Racetrack PUF -- TERO PUF -- Direct Characterization PUF -- Volatile Memory Based PUF -- Emerging Memory Based PUF -- Extrinsic Characterization of PUF -- Radio PUFs and CoAs -- Optical PUFs -- True Random Number Generators -- Hardware Camouflaging -- Temper Detection Methods -- Embedded Watermarking -- Counterfeit and Recycled IC Detection -- Package-Level Counterfeit IC Detection -- Side Channels Protection in Cryptographic Hardware -- Fault Injection Resistant Cryptographic Hardware -- Energy and Performance Optimization for Cryptography -- Lightweight Cryptography -- Post-Quantum Cryptography -- Virtual Proof of Reality -- Analog Security. | |
520 | _aThis book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aElectronic circuits. | |
650 | 0 | _aElectronic circuit design. | |
650 | 0 | _aMicroprocessors. | |
650 | 0 | _aComputer architecture. | |
650 | 1 | 4 | _aElectronic Circuits and Systems. |
650 | 2 | 4 | _aElectronics Design and Verification. |
650 | 2 | 4 | _aProcessor Architectures. |
700 | 1 |
_aPundir, Nitin. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aVashistha, Nidish. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aFarahmandi, Farimah. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031191848 |
776 | 0 | 8 |
_iPrinted edition: _z9783031191862 |
776 | 0 | 8 |
_iPrinted edition: _z9783031191879 |
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-19185-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c260940 _d260939 |