Beginning with an creation to cryptography, Hardware protection: layout, Threats, and Safeguards explains the underlying mathematical rules had to layout complicated cryptographic algorithms. It then offers effective cryptographic set of rules implementation tools, in addition to state of the art examine and methods for the layout of very huge scale built-in (VLSI) circuits and symmetric cryptosystems, whole with examples of complex Encryption common (AES) ciphers, uneven ciphers, and elliptic curve cryptography (ECC).
Gain a finished realizing of Security—from basics to functional Applications
Since such a lot implementations of ordinary cryptographic algorithms leak details that may be exploited via adversaries to assemble wisdom approximately mystery encryption keys, Hardware defense: layout, Threats, and Safeguards:
- Details algorithmic- and circuit-level countermeasures for assaults according to strength, timing, fault, cache, and test chain analysis
- Describes highbrow estate piracy and security concepts at various degrees of abstraction in response to watermarking
- Discusses obfuscation and bodily unclonable features (PUFs), in addition to Trojan modeling, taxonomy, detection, and prevention
Design for defense and Meet Real-Time Requirements
If you think about safeguard as severe a metric for built-in circuits (ICs) as strength, region, and function, you’ll embody the design-for-security technique of Hardware defense: layout, Threats, and Safeguards.