Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Image from Google Jackets

Hardware security : design, threats, and safeguards / Debdeep Mukhopadhyay and Rajat Subhra Chakraborty.

By: Contributor(s): Publication details: Boca Raton : CRC Press, c2015.Description: xxxiii, 556 p. : illustrations ; 27 cmISBN:
  • 9781439895832
Subject(s): DDC classification:
  • 005.8 23 M953
Contents:
I. Background -- II . Hardware design of cryptographic algorithms -- III. Side channel analysis -- IV. Hardware intellectual property protection -- V. Hardware trojans -- VI. Physically unclonable functions -- Bibliography -- Index.
Summary: Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books ISI Library, Kolkata 005.8 M953 (Browse shelf(Opens below)) Available 136795
Total holds: 0

Includes bibliographical references and index.

I. Background --
II . Hardware design of cryptographic algorithms --
III. Side channel analysis --
IV. Hardware intellectual property protection --
V. Hardware trojans --
VI. Physically unclonable functions --
Bibliography --
Index.

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

There are no comments on this title.

to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in