Listing 1 - 5 of 5 |
Sort by
|
Choose an application
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.
Logic circuits. --- Logic design. --- Hardware Trojans (Computers) --- Systems engineering. --- Computer science. --- Circuits and Systems. --- Logic Design. --- Arithmetic and Logic Structures. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Electronic circuits. --- Arithmetic and logic units, Computer. --- Arithmetic and logic units, Computer --- Computer arithmetic --- Electronic digital computers --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Circuits
Choose an application
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.
Logic --- Electrical engineering --- Computer. Automation --- processoren --- ontwerpen --- elektrische circuits
Choose an application
Logic --- Electrical engineering --- Computer. Automation --- processoren --- ontwerpen --- elektrische circuits
Choose an application
This book provides a comprehensive coverage of hardware security concepts, derived from the unique characteristics of emerging logic and memory devices and related architectures. The primary focus is on mapping device-specific properties, such as multi-functionality, runtime polymorphism, intrinsic entropy, nonlinearity, ease of heterogeneous integration, and tamper-resilience to the corresponding security primitives that they help realize, such as static and dynamic camouflaging, true random number generation, physically unclonable functions, secure heterogeneous and large-scale systems, and tamper-proof memories. The authors discuss several device technologies offering the desired properties (including spintronics switches, memristors, silicon nanowire transistors and ferroelectric devices) for such security primitives and schemes, while also providing a detailed case study for each of the outlined security applications. Overall, the book gives a holistic perspective of how the promising properties found in emerging devices, which are not readily afforded by traditional CMOS devices and systems, can help advance the field of hardware security. Presents clear and concise foundations of hardware security primitives driven by emerging technologies; Explains how emerging devices can enable security-centric circuit design practices; Illustrates recent, emerging security concepts with detailed case studies.
Electronics --- Electrical engineering --- Computer architecture. Operating systems --- Computer. Automation --- microprocessoren --- algoritmen --- architectuur (informatica) --- elektrische circuits
Choose an application
Electronics --- Electrical engineering --- Computer architecture. Operating systems --- Computer. Automation --- microprocessoren --- algoritmen --- architectuur (informatica) --- elektrische circuits
Listing 1 - 5 of 5 |
Sort by
|