Trustworthy Hardware Design: Combinational Logic Locking Techniques

Trustworthy Hardware Design: Combinational Logic Locking Techniques
Author :
Publisher : Springer Nature
Total Pages : 157
Release :
ISBN-10 : 9783030153342
ISBN-13 : 3030153347
Rating : 4/5 (347 Downloads)

Book Synopsis Trustworthy Hardware Design: Combinational Logic Locking Techniques by : Muhammad Yasin

Download or read book Trustworthy Hardware Design: Combinational Logic Locking Techniques written by Muhammad Yasin and published by Springer Nature. This book was released on 2019-09-04 with total page 157 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book have contributed to this field significantly through numerous fundamental papers.


Trustworthy Hardware Design: Combinational Logic Locking Techniques Related Books

Trustworthy Hardware Design: Combinational Logic Locking Techniques
Language: en
Pages: 157
Authors: Muhammad Yasin
Categories: Technology & Engineering
Type: BOOK - Published: 2019-09-04 - Publisher: Springer Nature

GET EBOOK

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Ty
Side Channel Attacks
Language: en
Pages: 258
Authors: Seokhie Hong
Categories: Technology & Engineering
Type: BOOK - Published: 2019-06-12 - Publisher: MDPI

GET EBOOK

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The re
Side-Channel Analysis of Embedded Systems
Language: en
Pages: 163
Authors: Maamar Ouladj
Categories: Computers
Type: BOOK - Published: 2021-07-28 - Publisher: Springer Nature

GET EBOOK

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute c
Secure Integrated Circuits and Systems
Language: en
Pages: 250
Authors: Ingrid M.R. Verbauwhede
Categories: Computers
Type: BOOK - Published: 2010-04-05 - Publisher: Springer Science & Business Media

GET EBOOK

On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link
Advances in Cryptology -- ASIACRYPT 2012
Language: en
Pages: 791
Authors: Xiaoyun Wang
Categories: Computers
Type: BOOK - Published: 2012-11-19 - Publisher: Springer Science & Business Media

GET EBOOK

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacr