Hardware security and trust : design and deployment of integrated circuits in a threatened environment

"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a gi...

Full description

Saved in:
Bibliographic Details
Other Authors Sklavos, Nicolas (Editor), Chaves, Ricardo (Editor), Di Natali, Giogio (Editor), Regazzoni, Francesco (Editor)
Format Electronic eBook
LanguageEnglish
Published Cham, Switzerland : Springer, [2017]
Subjects
Online AccessFull text
ISBN9783319443188
9783319443164
Physical Description1 online resource (254 pages) : illustrations

Cover

LEADER 00000cam a2200000Ii 4500
001 99737
003 CZ-ZlUTB
005 20251008111958.0
006 m o d
007 cr |n|||||||||
008 170120s2017 sz a ob 001 0 eng d
040 |a IDEBK  |b eng  |e rda  |e pn  |c IDEBK  |d EBLCP  |d GW5XE  |d OCLCF  |d YDX  |d UAB  |d OCLCQ  |d CNCGM  |d IDEBK  |d COO  |d WAU  |d UPM  |d IOG  |d VT2  |d UWO  |d ESU  |d JBG  |d IAD  |d ICW  |d ICN  |d OTZ  |d OCLCQ  |d N$T  |d U3W  |d OCLCA  |d CAUOI  |d OCLCQ  |d KSU  |d WYU  |d UKMGB  |d AUD  |d UKAHL  |d OCLCQ  |d ERF  |d UKBTH  |d LEATE  |d OCLCQ  |d SRU 
020 |a 9783319443188  |q (electronic bk.) 
020 |z 9783319443164  |q (hardcover) 
024 7 |a 10.1007/978-3-319-44318-8  |2 doi 
035 |a (OCoLC)969443234  |z (OCoLC)969420086  |z (OCoLC)974651138  |z (OCoLC)981018858  |z (OCoLC)981843978  |z (OCoLC)988795674  |z (OCoLC)1005794710  |z (OCoLC)1011794889  |z (OCoLC)1048140480  |z (OCoLC)1066462836  |z (OCoLC)1066608980  |z (OCoLC)1086522559  |z (OCoLC)1112545750  |z (OCoLC)1112926416  |z (OCoLC)1113421090  |z (OCoLC)1116210381  |z (OCoLC)1122816042  |z (OCoLC)1127209404 
245 0 0 |a Hardware security and trust :  |b design and deployment of integrated circuits in a threatened environment /  |c Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natali, Francesco Regazzoni, editors. 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (254 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a AES datapaths on FPGAs: a state of the art analysis -- Fault attacks, injection techniques and tools for simulation -- Recent developments in side-channel analysis on elliptic curve cryptography implementations -- Practical session: differential power analysis for beginners -- Fault and power analysis attack protection techniques for standardized public key cryptosystems -- Scan design: basics, advancements and vulnerabilities -- Manufacturing testing & security countermeasures -- Malware threats and solutions for trustworthy mobile systems design -- Ring oscillators and hardware Trojan detection -- Notions on silicon physically unclonable functions -- Implementation of delay-based PUFs on Altera FPGAs -- Implementation and analysis of ring oscillator circuits on Xilinx FPGAs. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a "This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers"--Provided by publisher. 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Computer security. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Sklavos, Nicolas,  |e editor. 
700 1 |a Chaves, Ricardo,  |e editor. 
700 1 |a Di Natali, Giogio,  |e editor. 
700 1 |a Regazzoni, Francesco,  |e editor. 
776 0 8 |i Printed edition:  |z 9783319443164 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-44318-8 
992 |c NTK-SpringerENG 
999 |c 99737  |d 99737 
993 |x NEPOSILAT  |y EIZ