Overview
- Provides a comprehensive introduction to hardware security and trust Includes coverage at the circuit and systems levels, with applications to design and implementation Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attach and countermeasures for smart cards.
- Includes supplementary material: sn.pub/extras
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (18 chapters)
Keywords
About this book
Reviews
From the reviews:
“Editors Tehranipoor and Wand help fill this important gap with their book on the security of electronic devices and systems … . The text begins with an introduction to very-large-scale integration (VLSI) testing and hardware implementation of hash functions. … Overall, this book represents an important contribution to the cyber security body of knowledge, providing a comprehensive introduction to hardware security and trust. I consider it highly relevant and recommend it.” (Alessandro Berni, ACM Computing Reviews, June, 2012)
Editors and Affiliations
Bibliographic Information
Book Title: Introduction to Hardware Security and Trust
Editors: Mohammad Tehranipoor, Cliff Wang
DOI: https://doi.org/10.1007/978-1-4419-8080-9
Publisher: Springer New York, NY
eBook Packages: Engineering, Engineering (R0)
Copyright Information: Springer Science+Business Media, LLC 2012
Hardcover ISBN: 978-1-4419-8079-3
Softcover ISBN: 978-1-4899-9036-5
eBook ISBN: 978-1-4419-8080-9
Edition Number: 1
Number of Pages: VIII, 427
Topics: Circuits and Systems, Electronics and Microelectronics, Instrumentation, Processor Architectures