Background on VLSI Testing
Hardware Implementation of Hash Functions
RSA: Implementation and Security
Security Based on Physical Unclonability and Disorder
Hardware Metering: A Survey
Secure Hardware IPs by Digital Watermark
Physical Attacks and Tamper Resistance
Side Channel Attacks and Countermeasures
Trusted Design in FPGAs
Security in Embedded Systems
Side-Channel Attacks and Countermeasures for Embedded Microcontrollers
Security for RFID Tags
Memory Integrity Protection
Trojan Taxonomy
Hardware Trojan Detection
Design for Hardware Trust
Security and Testing
Protecting IPs Against Scan-Based Side-Channel Attacks
There are no comments on this title.