The Next Era in Hardware Security (Record no. 78770)

000 -LEADER
fixed length control field 04244nam a22005775i 4500
001 - CONTROL NUMBER
control field 978-3-030-85792-9
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801220630.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211023s2021 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783030857929
-- 978-3-030-85792-9
082 04 - CLASSIFICATION NUMBER
Call Number 621.3815
100 1# - AUTHOR NAME
Author Rangarajan, Nikhil.
245 14 - TITLE STATEMENT
Title The Next Era in Hardware Security
Sub Title A Perspective on Emerging Technologies for Secure Electronics /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XX, 255 p. 126 illus., 112 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Reconfigurability for Static Camouflaging -- Runtime Polymorphism for Dynamic Camouflaging -- Nonlinearity for Physically-Unclonable Functions -- Intrinsic Entropy for True Random Number Generation -- Heterogeneous Physical Integration for Securing the Hardware and the Runtime Data -- Tamper-Proof Hardware from Emerging Technologies -- Resilience Against Side-Channel Attacks in Emerging Technologies -- Conclusions.
520 ## - SUMMARY, ETC.
Summary, etc This book provides a comprehensive coverage of hardware security concepts, derived from the unique characteristics of emerging logic and memory devices and related architectures. The primary focus is on mapping device-specific properties, such as multi-functionality, runtime polymorphism, intrinsic entropy, nonlinearity, ease of heterogeneous integration, and tamper-resilience to the corresponding security primitives that they help realize, such as static and dynamic camouflaging, true random number generation, physically unclonable functions, secure heterogeneous and large-scale systems, and tamper-proof memories. The authors discuss several device technologies offering the desired properties (including spintronics switches, memristors, silicon nanowire transistors and ferroelectric devices) for such security primitives and schemes, while also providing a detailed case study for each of the outlined security applications. Overall, the book gives a holistic perspective of how the promising properties found in emerging devices, which are not readily afforded by traditional CMOS devices and systems, can help advance the field of hardware security. Presents clear and concise foundations of hardware security primitives driven by emerging technologies; Explains how emerging devices can enable security-centric circuit design practices; Illustrates recent, emerging security concepts with detailed case studies.
700 1# - AUTHOR 2
Author 2 Patnaik, Satwik.
700 1# - AUTHOR 2
Author 2 Knechtel, Johann.
700 1# - AUTHOR 2
Author 2 Rakheja, Shaloo.
700 1# - AUTHOR 2
Author 2 Sinanoglu, Ozgur.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-030-85792-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cooperating objects (Computer systems).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Microprocessors.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer architecture.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cyber-Physical Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Processor Architectures.
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.