![]() |
![]() |
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.
This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. Due to COVID-19, the workshop was held online. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. The workshop covers subjects from wide ranges such as secure design, side channel attacks and countermeasures, and architectures and protocols.
|
![]() ![]() You may like...
Wits University At 100 - From Excavation…
Wits Communications
Paperback
Adaptive Thermal Comfort: Foundations…
Michael Humphreys, Fergus Nicol, …
Paperback
R1,711
Discovery Miles 17 110
The Science and Best Practices of…
Timothy D. Ludwig, Matthew M. Laske
Paperback
R962
Discovery Miles 9 620
User Interface Requirements for Medical…
Michael Wiklund, Erin Davis, …
Paperback
R2,139
Discovery Miles 21 390
Women In Solitary - Inside The Female…
Shanthini Naidoo
Paperback
![]()
|