MARC details
| 000 -LEADER |
| fixed length control field |
01665 a2200265 4500 |
| 001 - CONTROL NUMBER |
| control field |
136795 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
ISI Library, Kolkata |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20160504152453.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
160504b xxu||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781439895832 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
ISI Library |
| Language of cataloging |
eng |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
M953 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Mukhopadhyay, Debdeep. |
| 245 10 - TITLE STATEMENT |
| Title |
Hardware security : |
| Remainder of title |
design, threats, and safeguards / |
| Statement of responsibility, etc |
Debdeep Mukhopadhyay and Rajat Subhra Chakraborty. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Boca Raton : |
| Name of publisher, distributor, etc |
CRC Press, |
| Date of publication, distribution, etc |
c2015. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxxiii, 556 p. : |
| Other physical details |
illustrations ; |
| Dimensions |
27 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
I. Background --<br/>II . Hardware design of cryptographic algorithms --<br/>III. Side channel analysis --<br/>IV. Hardware intellectual property protection --<br/>V. Hardware trojans --<br/>VI. Physically unclonable functions --<br/>Bibliography --<br/>Index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Data encryption (Computer science) |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Integrated circuits |
| General subdivision |
Design and construction. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Chakraborty, Rajat Subhra, |
| Relator term |
author |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |