Hardware Security : Design, Threats, and Safeguards

個数:

Hardware Security : Design, Threats, and Safeguards

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 590 p./サイズ 140 illus.
  • 言語 ENG
  • 商品コード 9781439895832
  • DDC分類 005.8

基本説明

Covers cryptographic algorithms and their implementations, side-channel analysis, hardware intellectual property protection, piracy prevention, hardware Trojan threats, and solutions.

Full Description

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

Gain a Comprehensive Understanding of Hardware Security—from Fundamentals to Practical Applications

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards:




Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention

Design for Security and Meet Real-Time Requirements

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you'll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.

Contents

Mathematical Background. Overview of Modern Cryptography. Modern Hardware Design Practices. Hardware Design of the Advanced Encryption Standard. Efficient Design of Finite Field Arithmetic on FPGAs. High Speed Implementation of Elliptic Curve Scalar Multiplication on FPGAs. Introduction to Side Channel Analysis. Differential Fault Analysis of Ciphers. Cache Attacks on Ciphers. Power Analysis of Cipher Implementations. Testability of Cryptographic Hardware. Hardware Intellectual Property Protection through Obfuscation. Overview of Hardware Trojans. Logic Testing-Based Hardware Trojan Detection. Side-Channel Analysis Techniques for Hardware Trojans Detection. Design Techniques for Hardware Trojan Threat Mitigation. Physically Unclonable Functions: A Root-of-Trust for Hardware Security. Genetic Programming-Based Model Building Attack on PUFs.

最近チェックした商品