Introduction to Hardware Security and Trust, 2012
Coordonnateurs : Tehranipoor Mohammad, Wang Cliff
1. Background on VLSI Testing.- 2. Hardware Implementation of Hash Functions.- 3. RSA: Implementation and Security.- 4. Security based on Physical Unclonability and Disorder.- 5. Hardware Metering: A Survey.- 6. Secure Hardware IPs by Digital Watermark.- 7. Physical Attacks and Tamper Resistance.-8. Side Channel Attacks and Countermeasures.- 9. Trusted Design in FPGAs.- 10. Security in Embedded Systems.- 11. Side-channel Attacks and Countermeasures for Embedded Microcontrollers.- 12. Security for RFID Tags.- 13. Memory Integrity Protection.- 14. Trojan Taxonomy.- 15. Hardware Trojan Detection.-16. Design for Hardware Trust.- 17. Security and Testing.- 18. Protecting IPs Against Scan-Based Side-Channel Attacks.
Ouvrage de 427 p.
15.5x23.5 cm
Ouvrage de 427 p.
15.5x23.5 cm