Hardware security :
xxxiii, 556 p. : illustrations ; 27 cm. Content notes : I. Background --
II . Hardware design of cryptographic algorithms --
III. Side channel analysis --
IV. Hardware intellectual property protection --
V. Hardware trojans --
VI. Physically unclonable functions --
Bibliography --
Index. Data encryption (Computer science) Integrated circuits - Design and construction.
