ABSTRACT
Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very la
TABLE OF CONTENTS
part 1|2 pages
Part I Background
part 2|2 pages
Part II Hardware Design Of Cryptographic Algorithms
part 3|2 pages
Part III Side Channel Analysis
part 4|2 pages
Part IV Hardware Intellectual Property Protection
part 5|2 pages
Part V Hardware Trojans
part 6|2 pages
Part VI Physically Unclonable Functions