000 | 00899 a2200229 4500 | ||
---|---|---|---|
003 | OSt | ||
020 | _a9780429066900 | ||
040 | _cIIT Kanpur | ||
041 | _aeng | ||
082 |
_a005.8 _bM896h |
||
100 | _aMukhopadhyay, Debdeep | ||
245 |
_aHardware security [Perpetual access] _bdesign, threats, and safeguards _cDebdeep Mukhopadhyay and Rajat Subhra Chakraborty |
||
260 |
_bCRC Press _c2015 _aBoca Raton |
||
300 | _axxxi, 535p | ||
520 | _aBeginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. | ||
650 | _aComputer security | ||
650 | _aComputers -- Circuits -- Design and construction | ||
650 | _aData encryption (Computer science) | ||
700 | _aChakraborty, Rajat Subhra | ||
856 | _uhttps://doi.org/10.1201/b17555 | ||
942 | _cEBK | ||
999 |
_c565480 _d565480 |