CART

(0) items

Hardware Security: Design, Threats, and Safeguards,9781439895832
This item qualifies for
FREE SHIPPING!
FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Hardware Security: Design, Threats, and Safeguards

by ;
Edition:
1st
ISBN13:

9781439895832

ISBN10:
143989583X
Format:
Hardcover
Pub. Date:
10/29/2014
Publisher(s):
Chapman & Hall

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 1st edition with a publication date of 10/29/2014.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Summary

With the ever-increasing proliferation of e-business practices, great volumes of secure business transactions and data transmissions are routinely carried out in encrypted forms through devices ranging from personal smartcards to business servers. The cryptographic algorithms are often computationally intensive and are designed in hardware and embedded systems to meet real-time requirements. Addressing diverse aspects of hardware security, this book covers cryptographic algorithms and their implementations, side-channel analysis, hardware intellectual property protection, piracy prevention, hardware Trojan threats, and solutions.


Please wait while the item is added to your cart...