Overview
- First book on this topic
- Contains important background material for students and practitioners
- Many contributions from interdisciplinary teams
- Includes supplementary material: sn.pub/extras
Part of the book series: Information Security and Cryptography (ISC)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (18 chapters)
-
Physically Unclonable Functions (PUFs)
-
Hardware-based Cryptography
-
Hardware Attacks
-
Hardware-based Policy Enforcement
-
Hardware-Security in Contactless Tokens
Keywords
- Contactless tokens
- Counterfeiting
- Hardware
- Hardware attacks
- Hardware-based cryptography
- Hardware-intrinsic security
- Leakage-resilient cryptography
- Optical media fingerprints
- Physically Unclonable Function (PUF)
- Radio-Frequency Identification (RFID)
- Trojan Horse
- algorithms
- coding theory
- cryptography
- statistics
About this book
Reviews
Editors and Affiliations
Bibliographic Information
Book Title: Towards Hardware-Intrinsic Security
Book Subtitle: Foundations and Practice
Editors: Ahmad-Reza Sadeghi, David Naccache
Series Title: Information Security and Cryptography
DOI: https://doi.org/10.1007/978-3-642-14452-3
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2010
Hardcover ISBN: 978-3-642-14451-6Published: 04 November 2010
Softcover ISBN: 978-3-642-26578-5Published: 02 January 2013
eBook ISBN: 978-3-642-14452-3Published: 03 November 2010
Series ISSN: 1619-7100
Series E-ISSN: 2197-845X
Edition Number: 1
Number of Pages: XVI, 407
Topics: Electronics and Microelectronics, Instrumentation, Data Structures and Information Theory, Computer Hardware, Electrical Engineering