On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits.
Subscribe to:
Post Comments (Atom)
The Colt 1911 Pistol (Osprey Weapon 9)
Download The Colt 1911 Pistol (Osprey Weapon 9) First used in combat during the Punitive Expedition into Me...
-
Download Drawdown: The Most Comprehensive Plan Ever Proposed To Reverse Global Warming The 100 most substan...
-
Download Invision Power Board 2: A User Guide. This book is your guide to configuring, managing and maintai...
-
Download Connection Games: Variations On A Theme A comprehensive study of the connection game genre, Connec...
No comments:
Post a Comment