
Introduction.- Hardware Security Primitives and their Applications.- Racetrack PUF.- TERO PUF.- Direct Characterization PUF.- Volatile Memory Based PUF.- Emerging Memory Based PUF.- Extrinsic Characterization of PUF.- Radio PUFs and CoAs.- Optical PUFs.- True Random Number Generators.- Hardware Camouflaging.- Temper Detection Methods.- Embedded Watermarking.- Counterfeit and Recycled IC Detection.- Package-Level Counterfeit IC Detection.- Side Channels Protection in Cryptographic Hardware.- Fault Injection Resistant Cryptographic Hardware.- Energy and Performance Optimization for Cryptography.- Lightweight Cryptography.- Post-Quantum Cryptography.- Virtual Proof of Reality.- Analog Security.
Nous publions uniquement les avis qui respectent les conditions requises. Consultez nos conditions pour les avis.