Atjaunināt sīkdatņu piekrišanu

Secure Integrated Circuits and Systems 2010 ed. [Hardback]

  • Formāts: Hardback, 246 pages, height x width: 235x155 mm, weight: 1190 g, 92 Illustrations, black and white; X, 246 p. 92 illus., 1 Hardback
  • Sērija : Integrated Circuits and Systems
  • Izdošanas datums: 10-Mar-2010
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 0387718273
  • ISBN-13: 9780387718279
  • Hardback
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 246 pages, height x width: 235x155 mm, weight: 1190 g, 92 Illustrations, black and white; X, 246 p. 92 illus., 1 Hardback
  • Sērija : Integrated Circuits and Systems
  • Izdošanas datums: 10-Mar-2010
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 0387718273
  • ISBN-13: 9780387718279

On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits.

Part I Basics
Modular Integer Arithmetic for Public-Key Cryptography
3(24)
Tim Guneysu
Christof Paar
Introduction to Side-Channel Attacks
27(18)
Francois-Xavier Standaert
Part II Cryptomodules and Arithmetic
Secret Key Crypto Implementations
45(18)
Guido Marco Bertoni
Filippo Melzani
Arithmetic for Public-Key Cryptography
63(16)
Kazuo Sakiyama
Lejla Batina
Hardware Design for Hash Functions
79(28)
Yong Ki Lee
Miroslav Knezevic
Ingrid M.R. Verbauwhede
Part III Design Methods for Security
Random Number Generators for Integrated Circuits and FPGAs
107(18)
Berk Sunar
Dries Schellekens
Process Variations for Security: PUFs
125(20)
Roel Maes
Pim Tuyls
Part IV Applications
Side-Channel Resistant Circuit Styles and Associated IC Design Flow
145(14)
Kris Tiri
Counteracting Power Analysis Attacks by Masking
159(20)
Elisabeth Oswald
Stefan Mangard
Compact Public-Key Implementations for RFID and Sensor Nodes
179(18)
Lejla Batina
Kazuo Sakiyama
Ingrid M.R. Verbauwhede
Demonstrating End-Point Security in Embedded Systems
197(18)
Patrick Schaumont
Eric Simpson
Pengyuan Yu
From Secure Memories to Smart Card Security
215(20)
Helena Handschuh
Elena Trichina
Index 235