Advertisement

Trustworthy Hardware Design: Combinational Logic Locking Techniques

  • Muhammad Yasin
  • Jeyavijayan (JV) Rajendran
  • Ozgur Sinanoglu

Part of the Analog Circuits and Signal Processing book series (ACSP)

Table of contents

  1. Front Matter
    Pages i-xxi
  2. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 1-16
  3. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 17-31
  4. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 33-46
  5. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 47-56
  6. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 57-67
  7. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 69-76
  8. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 77-92
  9. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 93-102
  10. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 103-118
  11. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 119-130
  12. Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu
    Pages 131-137
  13. Back Matter
    Pages 139-142

About this book

Introduction

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research.

Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.


Keywords

logic locking concepts qualitative security evaluation security techniques combinational logic locking hardware design Hardware security

Authors and affiliations

  • Muhammad Yasin
    • 1
  • Jeyavijayan (JV) Rajendran
    • 2
  • Ozgur Sinanoglu
    • 3
  1. 1.New York University Abu DhabiSaadiyaat Island, Abu DhabiUnited Arab Emirates
  2. 2.Department of Electrical & Computer Engineering, WEB 333HTexas A&M UniversityCollege StationUSA
  3. 3.New York University Abu DhabiSaadiyaat Island, Abu DhabiUnited Arab Emirates

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-15334-2
  • Copyright Information Springer Nature Switzerland AG 2020
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-030-15333-5
  • Online ISBN 978-3-030-15334-2
  • Series Print ISSN 1872-082X
  • Series Online ISSN 2197-1854
  • Buy this book on publisher's site