Physically Unclonable Functions From Basic Design Principles to Advanced Hardware Security Applications /
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book: Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures; Inc...
Saved in:
| Main Author: | |
|---|---|
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing,
2018.
|
| Edition: | 1st ed. 2018. |
| Subjects: | |
| ISBN: | 9783319768045 |
| Online Access: |
|
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a22000005i 4500 | ||
|---|---|---|---|
| 003 | SK-BrCVT | ||
| 005 | 20220618102232.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 180418s2018 gw | s |||| 0|eng d | ||
| 020 | |a 9783319768045 | ||
| 024 | 7 | |a 10.1007/978-3-319-76804-5 |2 doi | |
| 035 | |a CVTIDW12656 | ||
| 040 | |a Springer-Nature |b eng |c CVTISR |e AACR2 | ||
| 041 | |a eng | ||
| 100 | 1 | |a Halak, Basel. |4 aut | |
| 245 | 1 | 0 | |a Physically Unclonable Functions |h [electronic resource] : |b From Basic Design Principles to Advanced Hardware Security Applications / |c by Basel Halak. |
| 250 | |a 1st ed. 2018. | ||
| 260 | 1 | |a Cham : |b Springer International Publishing, |c 2018. | |
| 300 | |a XIX, 250 p. 92 illus., 62 illus. in color. |b online resource. | ||
| 500 | |a Engineering | ||
| 505 | 0 | |a A Primer on Cryptographic Primitives and Security Attacks -- Physically Unclonable Functions: Design Principles and Evaluation Metrics -- Reliability Challenges of Silicon-Based Physically Unclonable Functions -- Reliability Enhancement Techniques for Physically Unclonable Functions -- Security Attacks on Physically Unclonable Functions and Possible Countermeasures -- Hardware-based Security Applications of Physically Unclonable Functions -- Appendix 1 -- Appendix 2 -- Appendix 3. | |
| 516 | |a text file PDF | ||
| 520 | |a This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book: Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasures; Includes an intensive tutorial on how to design and evaluate physically unclonable functions, supported by circuit diagrams and exemplar hardware implementations; Discusses the reliability challenges facing PUF technology and explains in details the state of the art mitigation approaches adopted, including those based on error correction codes and/or pre-processing techniques; Gives a comprehensive tutorial on the security threats facing PUF technology, including modelling attacks using machine learning algorithms, side channel analysis, and physical attacks. It also outlines possible countermeasures and defence mechanisms; Explains in detailed the practical applications of PUF technology, these include secure cryptographic key generation and storage, hardware-assisted security protocols, low cost secure sensors, anti-counterfeit integrated circuits and anti-tamper hardware. This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading. . | ||
| 650 | 0 | |a Electronic circuits. | |
| 650 | 0 | |a Microprocessors. | |
| 650 | 0 | |a Signal processing. | |
| 650 | 0 | |a Image processing. | |
| 650 | 0 | |a Speech processing systems. | |
| 856 | 4 | 0 | |u http://hanproxy.cvtisr.sk/han/cvti-ebook-springer-eisbn-978-3-319-76804-5 |y Vzdialený prístup pre registrovaných používateľov |
| 910 | |b ZE09936 | ||
| 919 | |a 978-3-319-76804-5 | ||
| 974 | |a andrea.lebedova |f Elektronické zdroje | ||
| 992 | |a SUD | ||
| 999 | |c 239724 |d 239724 | ||

