Tehranipoor, Mohammad
Introduction to Hardware Security and Trust
1. Background on VLSI Testing
Junxia Ma, Mohammad Tehranipoor
2. Hardware Implementation of Hash Functions
Zhijie Shi, Chujiao Ma, Jordan Cote, Bing Wang
3. RSA: Implementation and Security
Nicholas Tuzzio, Mohammad Tehranipoor
4. Security Based on Physical Unclonability and Disorder
Ulrich Rührmair, Srinivas Devadas, Farinaz Koushanfar
5. Hardware Metering: A Survey
Farinaz Koushanfar
6. Secure Hardware IPs by Digital Watermark
Gang Qu, Lin Yuan
7. Physical Attacks and Tamper Resistance
Sergei Skorobogatov
8. Side Channel Attacks and Countermeasures
Ken Mai
9. Trusted Design in FPGAs
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potkonjak
10. Security in Embedded Systems
Yunsi Fei, Juan Carlos Martinez Santos
11. Side-Channel Attacks and Countermeasures for Embedded Microcontrollers
Patrick Schaumont, Zhimin Chen
12. Security for RFID Tags
Jia Di, Dale R. Thompson
13. Memory Integrity Protection
Yin Hu, Berk Sunar
14. Trojan Taxonomy
Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld
15. Hardware Trojan Detection
Seetharam Narasimhan, Swarup Bhunia
16. Design for Hardware Trust
Yier Jin, Eric Love, Yiorgos Makris
17. Security and Testing
Kurt Rosenfeld, Ramesh Karri
18. Protecting IPs Against Scan-Based Side-Channel Attacks
Mohammad Tehranipoor, Jeremy Lee
Avainsanat: Engineering, Circuits and Systems, Electronics and Microelectronics, Instrumentation, Processor Architectures
- Tekijä(t)
- Tehranipoor, Mohammad
- Wang, Cliff
- Julkaisija
- Springer
- Julkaisuvuosi
- 2012
- Kieli
- en
- Painos
- 1
- Sivumäärä
- 8 sivua
- Kategoria
- Tekniikka, energia, liikenne
- Tiedostomuoto
- E-kirja
- eISBN (PDF)
- 9781441980809