Description |
1 online resource (161 p.) |
Contents |
Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Book Description -- About the Authors -- Chapter 1: Introduction -- Chapter 2: Cryptographic Hardware and Hardware-Assisted Cryptography -- 2.1. EXISTING SURVEYS -- 2.2. DESIGN -- 2.2.1. Cryptographic Primitives -- 2.2.2. Cryptographic Hardware -- 2.2.3. Hardware-Assisted Ciphers -- 2.2.4. Automatic Design and Synthesis -- 2.2.5. Design Objectives -- 2.3. IMPLEMENTATION -- 2.3.1. Prototyping -- 2.3.2. Implementation Technologies -- 2.3.3. Implementation Goals and Challenges -- 2.4. EVALUATION -- 2.4.1. Security Evaluation |
|
2.4.2. Simulation and Performance Benchmarking -- Chapter 3: PUFs in Industry, Education Programs and Books -- 3.1. HISTORICAL BACKGROUND -- 3.2. PUF IN INDUSTRY -- 3.3. PUF IN EDUCATION PROGRAMS -- 3.4. PUF IN BOOKS -- Chapter 4: Preliminary Discussions -- 4.1. RELATED WORKS: A SURVEY ON SURVEYS -- 4.2. MOTIVATIONS -- 4.3. METHODOLOGY -- 4.4. WORK SPACE -- Chapter 5: The Classification Tree and Popularities -- 5.1. FIRST-LEVEL CLASSIFICATION AND LIFE CYCLE -- 5.2. DESIGN -- 5.2.1. Modeling -- 5.2.2. Design Objectives -- 5.2.3. Component Design |
|
5.2.4. Post-Process, Expansion, Standardization and Alternatives -- 5.3. IMPLEMENTATION -- 5.4. OPERATION -- 5.4.1. Ecosystem -- 5.4.2. Interfaces -- 5.5. EVALUATION AND PRODUCTION -- Chapter 6: Trend Analysis -- 6.1. TOP TOPICS -- 6.1.1. The Most Popular Topics during the History -- 6.1.2. The Most Popular Topics in Top Conferences -- 6.1.3. Popular Topics in Top Journals -- 6.1.4. Popular Topics in Recent Years -- 6.2. EVOLUTION STUDY -- Chapter 7: Future Roadmap -- 7.1. TRENDS -- 7.2. CONCLUSIONS AND FURTHER WORK -- Bibliography -- Index |
Notes |
Description based upon print version of record |
Form |
Electronic book
|
Author |
Bibak, Khodakhast
|
|
Koshiba, Takeshi
|
|
Nemati, Hamid R
|
|
Mitra, Pinaki
|
ISBN |
9781000382501 |
|
1000382508 |
|