- ISBN: 9781439895832 | 143989583X
- Cover: Hardcover
- Copyright: 10/29/2014
With the ever-increasing proliferation of e-business practices, great volumes of secure business transactions and data transmissions are routinely carried out in encrypted forms through devices ranging from personal smartcards to business servers. The cryptographic algorithms are often computationally intensive and are designed in hardware and embedded systems to meet real-time requirements. Addressing diverse aspects of hardware security, this book covers cryptographic algorithms and their implementations, side-channel analysis, hardware intellectual property protection, piracy prevention, hardware Trojan threats, and solutions.