0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (7)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

High Performance Integer Arithmetic Circuit Design on FPGA - Architecture, Implementation and Design Automation (Hardcover, 1st... High Performance Integer Arithmetic Circuit Design on FPGA - Architecture, Implementation and Design Automation (Hardcover, 1st ed. 2016)
Ayan Palchaudhuri, Rajat Subhra Chakraborty
R3,263 Discovery Miles 32 630 Ships in 12 - 17 working days

This book describes the optimized implementations of several arithmetic datapath, controlpath and pseudorandom sequence generator circuits for realization of high performance arithmetic circuits targeted towards a specific family of the high-end Field Programmable Gate Arrays (FPGAs). It explores regular, modular, cascadable and bit-sliced architectures of these circuits, by directly instantiating the target FPGA-specific primitives in the HDL. Every proposed architecture is justified with detailed mathematical analyses. Simultaneously, constrained placement of the circuit building blocks is performed, by placing the logically related hardware primitives in close proximity to one another by supplying relevant placement constraints in the Xilinx proprietary "User Constraints File". The book covers the implementation of a GUI-based CAD tool named FlexiCore integrated with the Xilinx Integrated Software Environment (ISE) for design automation of platform-specific high-performance arithmetic circuits from user-level specifications. This tool has been used to implement the proposed circuits, as well as hardware implementations of integer arithmetic algorithms where several of the proposed circuits are used as building blocks. Implementation results demonstrate higher performance and superior operand-width scalability for the proposed circuits, with respect to implementations derived through other existing approaches. This book will prove useful to researchers, students and professionals engaged in the domain of FPGA circuit optimization and implementation.

Deep Learning for Computational Problems in Hardware Security - Modeling Attacks on Strong Physically Unclonable Function... Deep Learning for Computational Problems in Hardware Security - Modeling Attacks on Strong Physically Unclonable Function Circuits (Hardcover, 1st ed. 2023)
Pranesh Santikellur, Rajat Subhra Chakraborty
R2,877 R1,563 Discovery Miles 15 630 Save R1,314 (46%) Ships in 12 - 17 working days

The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.

Digital Image Forensics - Theory and Implementation (Hardcover, 1st ed. 2020): Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat... Digital Image Forensics - Theory and Implementation (Hardcover, 1st ed. 2020)
Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on "copy-move forgery" in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on "Digital Image Processing", "Information Security", "Machine Learning", "Computer Vision" and "Multimedia Security and Forensics".

Hardware Security - Design, Threats, and Safeguards (Hardcover): Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Hardware Security - Design, Threats, and Safeguards (Hardcover)
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
R3,891 Discovery Miles 38 910 Ships in 12 - 17 working days

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC)."

Gain a Comprehensive Understanding of Hardware Security from Fundamentals to Practical Applications"

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards

  • Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
  • Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
  • Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention
"

Design for Security and Meet Real-Time Requirements"

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you ll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards."

Security and Fault Tolerance in Internet of Things (Hardcover, 1st ed. 2019): Rajat Subhra Chakraborty, Jimson Mathew,... Security and Fault Tolerance in Internet of Things (Hardcover, 1st ed. 2019)
Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V Vasilakos
R3,280 Discovery Miles 32 800 Ships in 10 - 15 working days

This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.

Artificial Intelligence and Deep Learning for Computer Network - Management and Analysis (Hardcover): Sangita Roy, Rajat Subhra... Artificial Intelligence and Deep Learning for Computer Network - Management and Analysis (Hardcover)
Sangita Roy, Rajat Subhra Chakraborty, Jimson Mathew, Arka Prokash Mazumdar, Sudeshna Chakraborty
R2,953 Discovery Miles 29 530 Ships in 12 - 17 working days

Artificial Intelligence and Deep Learning for Computer Network: Management and Analysis aims to systematically collect quality research spanning AI, ML and Deep Learning (DL) applications to diverse sub-topics of computer networks, communications, and security, under a single cover. It also aspires to provide more insights on the applicability of the theoretical similitudes, otherwise a rarity in many such books. Features: A diverse collection of important and cutting-edge topics covered in a single volume. Several chapters on cyber security, an extremely active research area. Recent research results from leading researchers and some pointers to future advancements in methodology. Detailed experimental results obtained from standard data sets. This book serves as a valuable reference book for students, researchers and practitioners who wish to study and get acquainted with the application of cutting-edge AI, ML and DL techniques to network management and cyber security.

High Performance Integer Arithmetic Circuit Design on FPGA - Architecture, Implementation and Design Automation (Paperback,... High Performance Integer Arithmetic Circuit Design on FPGA - Architecture, Implementation and Design Automation (Paperback, Softcover reprint of the original 1st ed. 2016)
Ayan Palchaudhuri, Rajat Subhra Chakraborty
R3,116 Discovery Miles 31 160 Ships in 10 - 15 working days

This book describes the optimized implementations of several arithmetic datapath, controlpath and pseudorandom sequence generator circuits for realization of high performance arithmetic circuits targeted towards a specific family of the high-end Field Programmable Gate Arrays (FPGAs). It explores regular, modular, cascadable and bit-sliced architectures of these circuits, by directly instantiating the target FPGA-specific primitives in the HDL. Every proposed architecture is justified with detailed mathematical analyses. Simultaneously, constrained placement of the circuit building blocks is performed, by placing the logically related hardware primitives in close proximity to one another by supplying relevant placement constraints in the Xilinx proprietary "User Constraints File". The book covers the implementation of a GUI-based CAD tool named FlexiCore integrated with the Xilinx Integrated Software Environment (ISE) for design automation of platform-specific high-performance arithmetic circuits from user-level specifications. This tool has been used to implement the proposed circuits, as well as hardware implementations of integer arithmetic algorithms where several of the proposed circuits are used as building blocks. Implementation results demonstrate higher performance and superior operand-width scalability for the proposed circuits, with respect to implementations derived through other existing approaches. This book will prove useful to researchers, students and professionals engaged in the domain of FPGA circuit optimization and implementation.

Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7,... Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings (Paperback, 1st ed. 2015)
Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
R2,542 Discovery Miles 25 420 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.

Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22,... Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings (Paperback, 2014 ed.)
Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont
R2,439 Discovery Miles 24 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in Pune, India, in October 2014. The 19 papers presented together with two invited papers were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on cryptographic building blocks; mini tutorial; attacks and countermeasures; tools and methods; and secure systems and applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Familiar
Leigh Bardugo Paperback R360 R281 Discovery Miles 2 810
Legendary
Stephanie Garber Hardcover R690 R459 Discovery Miles 4 590
Sword Catcher
Cassandra Clare Paperback R399 R312 Discovery Miles 3 120
Herc
Phoenicia Rogerson Paperback R380 R304 Discovery Miles 3 040
The Covenant Of Water
Abraham Verghese Paperback R283 Discovery Miles 2 830
The Ashes and the Star-Cursed King - The…
Carissa Broadbent Paperback R365 R259 Discovery Miles 2 590
Powerless - Book 1
Lauren Roberts Paperback R213 Discovery Miles 2 130
Sword Catcher
Cassandra Clare Hardcover R840 R708 Discovery Miles 7 080
Caraval
Stephanie Garber Hardcover R690 R459 Discovery Miles 4 590
Heart Of The Sun Warrior
Sue Lynn Tan Paperback R446 Discovery Miles 4 460

 

Partners