Linked e-resources
Details
Table of Contents
Introduction
Reconfigurability for Static Camouflaging
Runtime Polymorphism for Dynamic Camouflaging
Nonlinearity for Physically-Unclonable Functions
Intrinsic Entropy for True Random Number Generation
Heterogeneous Physical Integration for Securing the Hardware and the Runtime Data
Tamper-Proof Hardware from Emerging Technologies
Resilience Against Side-Channel Attacks in Emerging Technologies
Conclusions.
Reconfigurability for Static Camouflaging
Runtime Polymorphism for Dynamic Camouflaging
Nonlinearity for Physically-Unclonable Functions
Intrinsic Entropy for True Random Number Generation
Heterogeneous Physical Integration for Securing the Hardware and the Runtime Data
Tamper-Proof Hardware from Emerging Technologies
Resilience Against Side-Channel Attacks in Emerging Technologies
Conclusions.