Overview
- Provides a comprehensive introduction to hardware security and trust Includes coverage at the circuit and systems levels, with applications to design and implementation Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attach and countermeasures for smart cards.
- Includes supplementary material: sn.pub/extras
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
Table of contents (18 chapters)
Reviews
From the reviews:
“Editors Tehranipoor and Wand help fill this important gap with their book on the security of electronic devices and systems … . The text begins with an introduction to very-large-scale integration (VLSI) testing and hardware implementation of hash functions. … Overall, this book represents an important contribution to the cyber security body of knowledge, providing a comprehensive introduction to hardware security and trust. I consider it highly relevant and recommend it.” (Alessandro Berni, ACM Computing Reviews, June, 2012)
Editors and Affiliations
Bibliographic Information
Book Title: Introduction to Hardware Security and Trust
Editors: Mohammad Tehranipoor, Cliff Wang
DOI: https://doi.org/10.1007/978-1-4419-8080-9
Publisher: Springer New York, NY
eBook Packages: Engineering, Engineering (R0)
Copyright Information: Springer Science+Business Media, LLC 2012
Hardcover ISBN: 978-1-4419-8079-3Published: 21 September 2011
Softcover ISBN: 978-1-4899-9036-5Published: 20 October 2014
eBook ISBN: 978-1-4419-8080-9Published: 22 September 2011
Edition Number: 1
Number of Pages: VIII, 427
Topics: Circuits and Systems, Electronics and Microelectronics, Instrumentation, Processor Architectures