Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS format (e.g. Zotero)
Printer
Bookmark
Circuits and systems for security and privacy / edited by Farhana Sheikh, Portland, Oregon, USA, Leonel Sousa, INESC-ID, Instituto Superior Tecnico, Universidade de Lisboa, Portugal ; Krzysztof Iniewski, managing editor, Emerging Technologies
Format
Book
Language
English
Εdition
1st ed.
Published/Created
Boca Raton : CRC Press, [2016]
©2016
Description
1 online resource (396 p.)
Details
Subject(s)
Computers
—
Circuits
[Browse]
Computer security
—
Design and construction
[Browse]
Integrated curcuits
[Browse]
Data encryption (Computer science)
[Browse]
Editor
Sheikh, Farhana
[Browse]
Sousa, Leonel A. (Leonel Augusto)
[Browse]
Iniewski, Krzysztof, 1960-
[Browse]
Series
Devices, Circuits, and Systems
[More in this series]
Devices, Circuits, and Systems ; v.57
[More in this series]
Summary note
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.
Notes
Description based upon print version of record.
Language note
English
Contents
Front Cover; Contents; Preface; Editors; Contributors; 1: Introduction; 2: Mathematics and Cryptography; 3: Block Ciphers; 4: Secure Hashing: SHA-1, SHA-2, and SHA-3; 5: Public Key Cryptography; 6: Physically Unclonable Functions: A Window into CMOS Process Variations; 7: Random Number Generators for Cryptography; 8: Side-Channel Attacks; 9: Remarks and Conclusion; Bibliography; Back Cover
ISBN
1-315-37304-1
1-315-35573-6
1-4822-3689-3
9781315373041
OCLC
950613671
Doi
10.1201/b19499
Statement on responsible collection description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Need Help?
Ask a Question
Suggest a Correction
Report a Missing Item
Supplementary Information