Frontiers in hardware security and trust theory, design and practice

The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security...

Full description

Saved in:
Bibliographic Details
Other Authors: Chang, Chip-Hong, (Editor), Cao, Yuan, (Editor)
Format: eBook
Language: English
Published: Stevenage The Institution of Engineering and Technology 2020
Series: Materials, circuits and devices series ; 66.
Subjects:
ISBN: 1785619284
9781785619281
9781785619274
1785619276
Physical Description: 1 online resource illustrations

Cover

Table of contents

LEADER 04692cam a22005177c 4500
001 kn-on1202624304
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 201019t20202021enka ob 001 0 eng d
040 |a STF  |b eng  |e rda  |e pn  |c STF  |d OCLCO  |d OCLCF  |d EBLCP  |d UKAHL  |d CUV  |d CUS  |d OCL  |d OCLCO  |d N$T  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 1785619284  |q electronic bk. 
020 |a 9781785619281  |q (electronic bk.) 
020 |z 9781785619274 
020 |z 1785619276 
035 |a (OCoLC)1202624304 
245 0 0 |a Frontiers in hardware security and trust  |b theory, design and practice  |c edited by Chip Hong Chang, Yuan Cao 
264 1 |a Stevenage  |b The Institution of Engineering and Technology  |c 2020 
264 4 |c ©2021 
300 |a 1 online resource  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Materials, circuits and devices  |v 66 
504 |a Includes bibliographical references and index 
505 0 |a IP/IC piracy threats of reversible circuits / Samah Mohamed Saeed -- Improvements and recent updates of persistent fault analysis on block ciphers / Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, Shivam Bhasin, Xinjie Zhao, Shize Guo, and Kui Ren -- Deployment of EMC techniques in design of IC chips for hardware security / Makoto Nagata -- Hardware obfuscation for IP protection / Abdulrahman Alaql, Md Moshiur Rahman, Tamzidul Hoque, and Swarup Bhunia -- Formal verification for SoC security / Jiaji He, Xialong Guo, Yiqiang Zhao and Yier Jin -- Silicon-based true random number generators / Yuan Cao, Egbochukwu Chukwuemeka Chidiebere, Chenkai Fang, Mingrui Zhou, Wanyi Liu Xiaojin Zhao, and Chip-Hong Chang -- Micro-architectual attacks and countermeasures on public-key implementations / Sarani Bhattacharya and Debdeep Mukhopadhyay -- Mitigating the CacheKit attack / Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, and Gail-Jon Ahn -- Deep learning network security / Si Wang and Chip-Hong Chang -- Security implications of non-digital components / Xiaoxi Ren, Xhe Zhou, Di Tang, and Kehuan Zhang -- Accelerating homomorphic encryption in hardware : a review / Truong Phu Truan Ho and Chip-Hong Chang -- Information leakage from robust codes protecting cryptographic primitives / Osnat Keren and Ilia Polian -- Confidential and energy-efficient cognitive communications by physical-layer security / Pin-Hsun Lin and Eduard A. Jorswieck -- Physical-layer security for mmWave massive MIMO communications in 5G networks / Ning Wang, Long Jiao, Jie Tang, and Kai Zeng -- Security of in-vehicle controller area network : a review and future directions / Zhaojun Lu, Qian Wang, Gang Qu, and Zhenglin Liu. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security; silicon-based true random number generators; micro-architectural attacks and countermeasures on public-key implementations; CACHEKIT attack mitigation; deep learning network security; nondigital components; homomorphic encryption; information leakage from robust codes protecting cryptographic primitives; confidential and energy-efficient cognitive communications; physical-layer security; mm-wave massive MIMO communications in 5G networks; and in-vehicle controller area network 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Computer security. 
650 0 |a Internet of things. 
650 0 |a Cell phone systems. 
650 0 |a Cognitive radio networks. 
650 0 |a Computer software  |x Verification. 
650 0 |a Industrial property. 
650 0 |a Integrated circuits. 
650 0 |a Machine learning. 
650 0 |a Neural networks (Computer science) 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Chang, Chip-Hong,  |e editor. 
700 1 |a Cao, Yuan,  |e editor. 
776 0 8 |i Print version:  |t Frontiers in hardware security and trust  |d Stevenage : Institution of Engineering and Technology, 2020  |z 9781785619274  |w (OCoLC)1202844165 
830 0 |a Materials, circuits and devices series ;  |v 66. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpFHSTTDP2/frontiers-in-hardware?kpromoter=marc  |y Full text