Sorry, you do not have access to this eBook
A subscription is required to access the full text content of this book.
A subscription is required to access the full text content of this book.
Other ways to access this content:
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.
Chapter 1: Introduction | Download PDF |
---|---|
Chapter 2: Mathematics and Cryptography | Download PDF |
Chapter 3: Block Ciphers | Download PDF |
Chapter 4: Secure Hashing: SHA-1, SHA-2, and SHA-3 | Download PDF |
Chapter 5: Public Key Cryptography | Download PDF |
Chapter 6: Physically Unclonable Functions: A Window into CMOS Process Variations | Download PDF |
Chapter 7: Random Number Generators for Cryptography | Download PDF |
Chapter 8: Side-Channel Attacks | Download PDF |
Chapter 9: Remarks and Conclusion | Download PDF |
Bibliography | Download PDF |
prelims | Download PDF |
Index | Download PDF |