Secure Integrated Circuits and Systems
As information processing moves at a fast pace to small portable embedded devices, the information channels and endpoints need greater protection. Secure Integrated Circuits and Systems provides the integrated circuits designer and embedded system designer with insights into the basics of security a...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic |
Language: | English |
Published: |
Boston, MA :
Springer US,
2010.
|
Series: | Integrated Circuits and Systems,
|
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-71829-3 |
Table of Contents:
- Section 1:Introduction
- Introduction to Cryptography
- Side Channel Attacks: Introduction
- Side Channel Attacks: Advanced Attacks
- Intrusive Attacks
- Section 2: Security Modules and Primitives
- Public-Key Crypto Implementations
- Secret Key Crypto Implementations
- Hash Functions
- Random Number Generators for Integrated Circuits and FPGAs
- PUFs: Physically Unclonable Devices
- Secure Memories
- Section 3: Design Methods for Security
- Secure Design Methodology and the Tree of Trust
- The Side-Channel Attack Toolbox
- Side-Channel Resistant Circuit Styles and Associated IC Design Flow
- Section 4: Applications
- Security for Mobile Wireless Applications
- Compact Implementations for RFID and Sensor Nodes
- Security for Smart-Cards
- Security Evaluations, Common Criteria.