Narrow your search

Library

VUB (4)

AP (2)

KDG (2)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

More...

Resource type

book (5)

digital (2)


Language

English (5)


Year
From To Submit

2021 (2)

2020 (3)

Listing 1 - 5 of 5
Sort by

Book
Trustworthy Hardware Design: Combinational Logic Locking Techniques
Authors: --- ---
ISBN: 3030153347 3030153339 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.


Multi
Trustworthy Hardware Design: Combinational Logic Locking Techniques
Authors: --- ---
ISBN: 9783030153342 Year: 2020 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.


Book
Trustworthy Hardware Design: Combinational Logic Locking Techniques
Authors: --- --- ---
ISBN: 9783030153342 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
The Next Era in Hardware Security : A Perspective on Emerging Technologies for Secure Electronics
Authors: --- --- --- ---
ISBN: 9783030857929 9783030857936 9783030857943 9783030857912 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a comprehensive coverage of hardware security concepts, derived from the unique characteristics of emerging logic and memory devices and related architectures. The primary focus is on mapping device-specific properties, such as multi-functionality, runtime polymorphism, intrinsic entropy, nonlinearity, ease of heterogeneous integration, and tamper-resilience to the corresponding security primitives that they help realize, such as static and dynamic camouflaging, true random number generation, physically unclonable functions, secure heterogeneous and large-scale systems, and tamper-proof memories. The authors discuss several device technologies offering the desired properties (including spintronics switches, memristors, silicon nanowire transistors and ferroelectric devices) for such security primitives and schemes, while also providing a detailed case study for each of the outlined security applications. Overall, the book gives a holistic perspective of how the promising properties found in emerging devices, which are not readily afforded by traditional CMOS devices and systems, can help advance the field of hardware security. Presents clear and concise foundations of hardware security primitives driven by emerging technologies; Explains how emerging devices can enable security-centric circuit design practices; Illustrates recent, emerging security concepts with detailed case studies.


Book
The Next Era in Hardware Security
Authors: --- --- --- --- --- et al.
ISBN: 9783030857929 9783030857936 9783030857943 9783030857912 Year: 2021 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 5 of 5
Sort by