The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
With the ever-increasing proliferation of e-business practices, great volumes of secure business transactions and data transmissions are routinely carried out in encrypted forms through devices ranging from personal smartcards to business servers. The cryptographic algorithms are often computationally intensive and are designed in hardware and embedded systems to meet real-time requirements. Addressing diverse aspects of hardware security, this book covers cryptographic algorithms and their implementations, side-channel analysis, hardware intellectual property protection, piracy prevention, hardware Trojan threats, and solutions.