001453642 000__ 03357cam\a2200481\a\4500 001453642 001__ 1453642 001453642 003__ OCoLC 001453642 005__ 20230314003437.0 001453642 006__ m\\\\\o\\d\\\\\\\\ 001453642 007__ cr\un\nnnunnun 001453642 008__ 230107s2023\\\\sz\\\\\\ob\\\\001\0\eng\d 001453642 019__ $$a1355267816$$a1357115971 001453642 020__ $$a9783031191855$$q(electronic bk.) 001453642 020__ $$a3031191854$$q(electronic bk.) 001453642 020__ $$z3031191846 001453642 020__ $$z9783031191848 001453642 0247_ $$a10.1007/978-3-031-19185-5$$2doi 001453642 035__ $$aSP(OCoLC)1356007632 001453642 040__ $$aEBLCP$$beng$$cEBLCP$$dGW5XE$$dSTF$$dYDX$$dUKAHL 001453642 049__ $$aISEA 001453642 050_4 $$aQA76.9.A25 001453642 08204 $$a005.8$$223/eng/20230110 001453642 1001_ $$aTehranipoor, Mohammad H.,$$d1974-$$eauthor. 001453642 24510 $$aHardware security primitives /$$cMark Tehranipoor, Nitin Pundir, Nidish Vashistha, Farimah Farahmandi. 001453642 260__ $$aCham :$$bSpringer,$$c2023. 001453642 300__ $$a1 online resource (356 p.) 001453642 504__ $$aIncludes bibliographical references and index. 001453642 5050_ $$aIntroduction -- Hardware Security Primitives and their Applications -- Racetrack PUF -- TERO PUF -- Direct Characterization PUF -- Volatile Memory Based PUF -- Emerging Memory Based PUF -- Extrinsic Characterization of PUF -- Radio PUFs and CoAs -- Optical PUFs -- True Random Number Generators -- Hardware Camouflaging -- Temper Detection Methods -- Embedded Watermarking -- Counterfeit and Recycled IC Detection -- Package-Level Counterfeit IC Detection -- Side Channels Protection in Cryptographic Hardware -- Fault Injection Resistant Cryptographic Hardware -- Energy and Performance Optimization for Cryptography -- Lightweight Cryptography -- Post-Quantum Cryptography -- Virtual Proof of Reality -- Analog Security. 001453642 506__ $$aAccess limited to authorized users. 001453642 520__ $$aThis book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security. 001453642 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 10, 2023). 001453642 650_0 $$aComputer security. 001453642 655_0 $$aElectronic books. 001453642 7001_ $$aPundir, Nitin,$$eauthor. 001453642 7001_ $$aVashistha, Nidish,$$eauthor. 001453642 7001_ $$aFarahmandi, Farimah,$$eauthor. 001453642 77608 $$iPrint version:$$aTehranipoor, Mark$$tHardware Security Primitives$$dCham : Springer International Publishing AG,c2023$$z9783031191848 001453642 852__ $$bebk 001453642 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-19185-5$$zOnline Access$$91397441.1 001453642 909CO $$ooai:library.usi.edu:1453642$$pGLOBAL_SET 001453642 980__ $$aBIB 001453642 980__ $$aEBOOK 001453642 982__ $$aEbook 001453642 983__ $$aOnline 001453642 994__ $$a92$$bISE