Circuits and Systems for Security and Privacy: Devices, Circuits, and Systems
Editat de Farhana Sheikh, Leonel Sousaen Limba Engleză Paperback – 29 mar 2018
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 391.84 lei 6-8 săpt. | |
CRC Press – 29 mar 2018 | 391.84 lei 6-8 săpt. | |
Hardback (1) | 983.62 lei 6-8 săpt. | |
CRC Press – 24 mai 2016 | 983.62 lei 6-8 săpt. |
Din seria Devices, Circuits, and Systems
- 8% Preț: 390.19 lei
- 8% Preț: 542.60 lei
- 8% Preț: 404.82 lei
- 29% Preț: 1019.63 lei
- 30% Preț: 889.43 lei
- 20% Preț: 1165.92 lei
- 23% Preț: 456.63 lei
- 26% Preț: 878.42 lei
- 18% Preț: 1552.73 lei
- 28% Preț: 1307.37 lei
- 30% Preț: 850.59 lei
- 18% Preț: 751.07 lei
- 29% Preț: 1097.55 lei
- 23% Preț: 427.84 lei
- 23% Preț: 427.84 lei
- 18% Preț: 1118.65 lei
- 26% Preț: 1406.48 lei
- 31% Preț: 681.15 lei
- 30% Preț: 851.82 lei
- 18% Preț: 1391.72 lei
- 26% Preț: 456.63 lei
- 23% Preț: 456.63 lei
- 29% Preț: 1107.18 lei
- 25% Preț: 524.78 lei
- 25% Preț: 769.51 lei
- 31% Preț: 408.36 lei
- 26% Preț: 849.41 lei
- 18% Preț: 846.43 lei
- 22% Preț: 415.43 lei
- 30% Preț: 857.50 lei
- 31% Preț: 1088.40 lei
- 31% Preț: 838.82 lei
- 30% Preț: 828.89 lei
- 25% Preț: 884.86 lei
- 31% Preț: 489.62 lei
- 23% Preț: 456.63 lei
- 26% Preț: 821.13 lei
- 25% Preț: 496.94 lei
- 25% Preț: 885.75 lei
- 26% Preț: 1101.06 lei
Preț: 391.84 lei
Preț vechi: 591.73 lei
-34% Nou
Puncte Express: 588
Preț estimativ în valută:
74.98€ • 78.28$ • 62.05£
74.98€ • 78.28$ • 62.05£
Carte tipărită la comandă
Livrare economică 04-18 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781138586048
ISBN-10: 1138586048
Pagini: 406
Ilustrații: 120
Dimensiuni: 156 x 234 x 28 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Devices, Circuits, and Systems
Locul publicării:Boca Raton, United States
ISBN-10: 1138586048
Pagini: 406
Ilustrații: 120
Dimensiuni: 156 x 234 x 28 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Devices, Circuits, and Systems
Locul publicării:Boca Raton, United States
Cuprins
Introduction. Mathematics and Cryptography. Block Ciphers. Secure Hashing: SHA-1, SHA-2, and SHA-3. Public Key Cryptography. Physically Unclonable Functions: A Window into CMOS Process Variations. Random Number Generators for Cryptography. Side-Channel Attacks. Remarks and Conclusion.
Notă biografică
Farhana Sheikh earned her B.Eng. in systems and computer engineering with high distinction, as well as the Chancellor’s Medal, from Carleton University. She earned her M.Sc. and Ph.D. in electrical engineering and computer science from the University of California, Berkeley. She has worked as a software engineer, senior manager, senior research scientist, and staff scientist at several prestigious technology companies. She is currently a senior staff scientist and the technical manager of a digital communications lab for an industry-leading Fortune 500 technology corporation. An IEEE senior member, Dr. Sheikh has coauthored several publications, filed more than 10 patents, and received numerous awards.
Leonel Sousa earned his Ph.D. in electrical and computer engineering from the Instituto Superior Técnico, Universidade de Lisboa, where he is currently full professor. He is also senior researcher with the Instituto de Engenharia de Sistemas e Computadores - Investigação e Desenvolvimento. He has contributed to 200+ technical papers, for which he received many awards. An IEEE and ACM senior member and IET fellow, Dr. Sousa has served as keynote presenter and program, general, and topic chair at numerous conferences. He has edited three special issues and is presently associate editor of several journals. He is also editor-in-chief of the EURASIP Journal on Embedded Systems.
Leonel Sousa earned his Ph.D. in electrical and computer engineering from the Instituto Superior Técnico, Universidade de Lisboa, where he is currently full professor. He is also senior researcher with the Instituto de Engenharia de Sistemas e Computadores - Investigação e Desenvolvimento. He has contributed to 200+ technical papers, for which he received many awards. An IEEE and ACM senior member and IET fellow, Dr. Sousa has served as keynote presenter and program, general, and topic chair at numerous conferences. He has edited three special issues and is presently associate editor of several journals. He is also editor-in-chief of the EURASIP Journal on Embedded Systems.
Recenzii
"[This book] discusses side-channel attacks and efficient implementations, analysis of advantages, disadvantages, and attack-resistance on various topics such as symmetric-key algorithms, public-key algorithms, hash functions, RNGs, and PUFs. This definitely makes the book stand out from rest. … The book is suitable for unfamiliar readers to learn more about the topic as well as a comprehensive resource for more experienced readers to quickly become familiar with the recent trends in this area. It helps the reader to design efficient accelerators used in security applications as well as the development of security-aware circuits and systems. The topics covered make the book suitable for both industry and academia. Furthermore, the authors discuss real implementations of security systems suitable for both commercial products as well as academic applications. Another positive aspect is the contributions from experts on each topic. This makes the book an ultimate state-of-the-art reference. … The presentation, style of writing, and coverage of side-channel attacks is very good. … [This book is] an extremely valuable addition to the literature on security and privacy that certainly stands out as unique."
—Dr. Tony Thomas, Indian Institute of Information Technology and Management, Kerala
—Dr. Tony Thomas, Indian Institute of Information Technology and Management, Kerala
Descriere
This book begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the text provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.