000 | 01424cam a2200337Ii 4500 | ||
---|---|---|---|
001 | 9780429066900 | ||
008 | 180331t20152015fluad ob 001 0 eng d | ||
020 |
_a9780429066900 _q(e-book : PDF) |
||
020 |
_z9781439895832 _q(hardback) |
||
024 | 7 |
_a10.1201/b17555 _2doi |
|
035 | _a(OCoLC)896593034 | ||
040 |
_aFlBoTFG _cFlBoTFG _erda |
||
050 | 4 |
_aQA76.9.A25 _bM85 2015 |
|
082 | 0 | 4 |
_a005.8 _bM953 |
100 | 1 |
_aMukhopadhyay, Debdeep, _eauthor. _911041 |
|
245 | 1 | 0 |
_aHardware security : _bdesign, threats, and safeguards / _cDebdeep Mukhopadhyay, Rajat Subhra, Chakraborty Indian Institute of Technology Kharagpur West Bengal, India. |
264 | 1 |
_aBoca Raton : _bCRC Press, _c[2015] |
|
264 | 4 | _c©2015 | |
300 | _a1 online resource | ||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 505-534) and index. | ||
505 | 0 | _a1. Background -- 2. Hardware design of cryptographic algorithms -- 3. Side channel analysis -- 4. Hardware intellectual property protection -- 5. Hardware trojans -- 6. Physically unclonable functions. | |
650 | 0 |
_aComputer security. _93970 |
|
650 | 0 |
_aCryptography. _91973 |
|
700 | 1 |
_aSubhra, Rajat, _eauthor. _911042 |
|
776 | 0 | 8 |
_iPrint version: _z9781439895832 |
856 | 4 | 0 |
_uhttps://www.taylorfrancis.com/books/9781439895849 _zClick here to view. |
942 | _cEBK | ||
999 |
_c69859 _d69859 |