Physically Unclonable Functions From Basic Design Principles to Advanced Hardware Security Applications /

This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book: Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures; Inc...

Full description

Saved in:
Bibliographic Details
Main Author: Halak, Basel (Author)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing, 2018.
Edition:1st ed. 2018.
Subjects:
ISBN:9783319768045
Online Access: Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a22000005i 4500
003 SK-BrCVT
005 20220618102232.0
007 cr nn 008mamaa
008 180418s2018 gw | s |||| 0|eng d
020 |a 9783319768045 
024 7 |a 10.1007/978-3-319-76804-5  |2 doi 
035 |a CVTIDW12656 
040 |a Springer-Nature  |b eng  |c CVTISR  |e AACR2 
041 |a eng 
100 1 |a Halak, Basel.  |4 aut 
245 1 0 |a Physically Unclonable Functions   |h [electronic resource] :  |b From Basic Design Principles to Advanced Hardware Security Applications /  |c by Basel Halak. 
250 |a 1st ed. 2018. 
260 1 |a Cham :  |b Springer International Publishing,  |c 2018. 
300 |a XIX, 250 p. 92 illus., 62 illus. in color.  |b online resource. 
500 |a Engineering  
505 0 |a A Primer on Cryptographic Primitives and Security Attacks -- Physically Unclonable Functions: Design Principles and Evaluation Metrics -- Reliability Challenges of Silicon-Based Physically Unclonable Functions -- Reliability Enhancement Techniques for Physically Unclonable Functions -- Security Attacks on Physically Unclonable Functions and Possible Countermeasures -- Hardware-based Security Applications of Physically Unclonable Functions -- Appendix 1 -- Appendix 2 -- Appendix 3. 
516 |a text file PDF 
520 |a This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book: Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures; Includes an intensive tutorial on how to design and evaluate physically unclonable functions, supported by circuit diagrams and exemplar hardware implementations; Discusses the reliability challenges facing PUF technology and explains in details the state of the art mitigation approaches adopted, including those based on error correction codes and/or pre-processing techniques; Gives a comprehensive tutorial on the security threats facing PUF technology, including modelling attacks using machine learning algorithms, side channel analysis, and physical attacks. It also outlines possible countermeasures and defence mechanisms; Explains in detailed the practical applications of PUF technology, these include secure cryptographic key generation and storage, hardware-assisted security protocols, low cost secure sensors, anti-counterfeit integrated circuits and anti-tamper hardware. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading. . 
650 0 |a Electronic circuits. 
650 0 |a Microprocessors. 
650 0 |a Signal processing. 
650 0 |a Image processing. 
650 0 |a Speech processing systems. 
856 4 0 |u http://hanproxy.cvtisr.sk/han/cvti-ebook-springer-eisbn-978-3-319-76804-5  |y Vzdialený prístup pre registrovaných používateľov 
910 |b ZE09936 
919 |a 978-3-319-76804-5 
974 |a andrea.lebedova  |f Elektronické zdroje 
992 |a SUD 
999 |c 239724  |d 239724