Circuits and Systems for Security and Privacy

Author:   Farhana Sheikh (Portland, Oregon, USA) ,  Leonel Sousa (Instituto Superior Técnico, Universidade de Lisboa, Portugal)
Publisher:   Taylor & Francis Inc
Volume:   57
ISBN:  

9781482236880


Pages:   406
Publication Date:   24 May 2016
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $368.00 Quantity:  
Add to Cart

Share |

Circuits and Systems for Security and Privacy


Add your own review!

Overview

Full Product Details

Author:   Farhana Sheikh (Portland, Oregon, USA) ,  Leonel Sousa (Instituto Superior Técnico, Universidade de Lisboa, Portugal)
Publisher:   Taylor & Francis Inc
Imprint:   CRC Press Inc
Volume:   57
Weight:   0.929kg
ISBN:  

9781482236880


ISBN 10:   1482236885
Pages:   406
Publication Date:   24 May 2016
Audience:   College/higher education ,  Professional and scholarly ,  Tertiary & Higher Education ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Introduction. Mathematics and Cryptography. Block Ciphers. Secure Hashing: SHA-1, SHA-2, and SHA-3. Public Key Cryptography. Physically Unclonable Functions: A Window into CMOS Process Variations. Random Number Generators for Cryptography. Side-Channel Attacks. Remarks and Conclusion.

Reviews

[This book] discusses side-channel attacks and efficient implementations, analysis of advantages, disadvantages, and attack-resistance on various topics such as symmetric-key algorithms, public-key algorithms, hash functions, RNGs, and PUFs. This definitely makes the book stand out from rest. ... The book is suitable for unfamiliar readers to learn more about the topic as well as a comprehensive resource for more experienced readers to quickly become familiar with the recent trends in this area. It helps the reader to design efficient accelerators used in security applications as well as the development of security-aware circuits and systems. The topics covered make the book suitable for both industry and academia. Furthermore, the authors discuss real implementations of security systems suitable for both commercial products as well as academic applications. Another positive aspect is the contributions from experts on each topic. This makes the book an ultimate state-of-the-art reference. ... The presentation, style of writing, and coverage of side-channel attacks is very good. ... [This book is] an extremely valuable addition to the literature on security and privacy that certainly stands out as unique. -Dr. Tony Thomas, Indian Institute of Information Technology and Management, Kerala


[This book] discusses side-channel attacks and efficient implementations, analysis of advantages, disadvantages, and attack-resistance on various topics such as symmetric-key algorithms, public-key algorithms, hash functions, RNGs, and PUFs. This definitely makes the book stand out from rest. ... The book is suitable for unfamiliar readers to learn more about the topic as well as a comprehensive resource for more experienced readers to quickly become familiar with the recent trends in this area. It helps the reader to design efficient accelerators used in security applications as well as the development of security-aware circuits and systems. The topics covered make the book suitable for both industry and academia. Furthermore, the authors discuss real implementations of security systems suitable for both commercial products as well as academic applications. Another positive aspect is the contributions from experts on each topic. This makes the book an ultimate state-of-the-art reference. ... The presentation, style of writing, and coverage of side-channel attacks is very good. ... [This book is] an extremely valuable addition to the literature on security and privacy that certainly stands out as unique. -Dr. Tony Thomas, Indian Institute of Information Technology and Management, Kerala


Author Information

Farhana Sheikh earned her B.Eng. in systems and computer engineering with high distinction, as well as the Chancellor’s Medal, from Carleton University. She earned her M.Sc. and Ph.D. in electrical engineering and computer science from the University of California, Berkeley. She has worked as a software engineer, senior manager, senior research scientist, and staff scientist at several prestigious technology companies. She is currently a senior staff scientist and the technical manager of a digital communications lab for an industry-leading Fortune 500 technology corporation. An IEEE senior member, Dr. Sheikh has coauthored several publications, filed more than 10 patents, and received numerous awards. Leonel Sousa earned his Ph.D. in electrical and computer engineering from the Instituto Superior Técnico, Universidade de Lisboa, where he is currently full professor. He is also senior researcher with the Instituto de Engenharia de Sistemas e Computadores - Investigação e Desenvolvimento. He has contributed to 200+ technical papers, for which he received many awards. An IEEE and ACM senior member and IET fellow, Dr. Sousa has served as keynote presenter and program, general, and topic chair at numerous conferences. He has edited three special issues and is presently associate editor of several journals. He is also editor-in-chief of the EURASIP Journal on Embedded Systems.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

lgn

al

Shopping Cart
Your cart is empty
Shopping cart
Mailing List