Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Hardware security : (Record no. 420759)

MARC details
000 -LEADER
fixed length control field 01665 a2200265 4500
001 - CONTROL NUMBER
control field 136795
003 - CONTROL NUMBER IDENTIFIER
control field ISI Library, Kolkata
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160504152453.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160504b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439895832
040 ## - CATALOGING SOURCE
Original cataloging agency ISI Library
Language of cataloging eng
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number M953
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mukhopadhyay, Debdeep.
245 10 - TITLE STATEMENT
Title Hardware security :
Remainder of title design, threats, and safeguards /
Statement of responsibility, etc Debdeep Mukhopadhyay and Rajat Subhra Chakraborty.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc c2015.
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 556 p. :
Other physical details illustrations ;
Dimensions 27 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note I. Background --<br/>II . Hardware design of cryptographic algorithms --<br/>III. Side channel analysis --<br/>IV. Hardware intellectual property protection --<br/>V. Hardware trojans --<br/>VI. Physically unclonable functions --<br/>Bibliography --<br/>Index.
520 ## - SUMMARY, ETC.
Summary, etc Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Integrated circuits
General subdivision Design and construction.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chakraborty, Rajat Subhra,
Relator term author
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Not for loan Home library Current library Date acquired Cost, normal purchase price Full call number Accession Number Koha item type
    ISI Library, Kolkata ISI Library, Kolkata 31/03/2016 4991.02 005.8 M953 136795 Books
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in