Introduction.- Hardware Security Primitives and their Applications.- Racetrack PUF.- TERO PUF.- Direct Characterization PUF.- Volatile Memory Based PUF.- Emerging Memory Based PUF.- Extrinsic Characterization of PUF.- Radio PUFs and CoAs.- Optical PUFs.- True Random Number Generators.- Hardware Camouflaging.- Temper Detection Methods.- Embedded Watermarking.- Counterfeit and Recycled IC Detection.- Package-Level Counterfeit IC Detection.- Side Channels Protection in Cryptographic Hardware.- Fault Injection Resistant Cryptographic Hardware.- Energy and Performance Optimization for Cryptography.- Lightweight Cryptography.- Post-Quantum Cryptography.- Virtual Proof of Reality.- Analog Security.
We publiceren alleen reviews die voldoen aan de voorwaarden voor reviews. Bekijk onze voorwaarden voor reviews.