Frontiers in hardware security and trust theory, design and practice
The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security...
Saved in:
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Stevenage
The Institution of Engineering and Technology
2020
|
Series: | Materials, circuits and devices series ;
66. |
Subjects: | |
ISBN: | 1785619284 9781785619281 9781785619274 1785619276 |
Physical Description: | 1 online resource illustrations |
Summary: | The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security; silicon-based true random number generators; micro-architectural attacks and countermeasures on public-key implementations; CACHEKIT attack mitigation; deep learning network security; nondigital components; homomorphic encryption; information leakage from robust codes protecting cryptographic primitives; confidential and energy-efficient cognitive communications; physical-layer security; mm-wave massive MIMO communications in 5G networks; and in-vehicle controller area network |
---|---|
Bibliography: | Includes bibliographical references and index |
ISBN: | 1785619284 9781785619281 9781785619274 1785619276 |
Access: | Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty |