Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Trustworthy hardware designcombinati...
~
Rajendran, Jeyavijayan (JV).
Trustworthy hardware designcombinational logic locking techniques /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Trustworthy hardware designby Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu.
Reminder of title:
combinational logic locking techniques /
Author:
Yasin, Muhammad.
other author:
Rajendran, Jeyavijayan (JV).
Published:
Cham :Springer International Publishing :2020.
Description:
xxi, 142 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Logic circuits.
Online resource:
https://doi.org/10.1007/978-3-030-15334-2
ISBN:
9783030153342$q(electronic bk.)
Trustworthy hardware designcombinational logic locking techniques /
Yasin, Muhammad.
Trustworthy hardware design
combinational logic locking techniques /[electronic resource] :by Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu. - Cham :Springer International Publishing :2020. - xxi, 142 p. :ill., digital ;24 cm. - Analog circuits and signal processing,1872-082X. - Analog circuits and signal processing..
The Need for Logic Locking -- A Brief History of Logic Locking -- Pre-SAT Logic Locking -- The SAT Attack -- Post-SAT 1: Point function-based Logic Locking -- Approximate Attacks -- Structural Attacks -- Post-SAT 2: Insertion of SAT-unresolvable Structures -- Post-SAT 3: Stripped-Functionality Logic Locking.
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.
ISBN: 9783030153342$q(electronic bk.)
Standard No.: 10.1007/978-3-030-15334-2doiSubjects--Topical Terms:
182233
Logic circuits.
LC Class. No.: TK7868.L6 / Y37 2020
Dewey Class. No.: 621.395
Trustworthy hardware designcombinational logic locking techniques /
LDR
:02223nmm a2200337 a 4500
001
593144
003
DE-He213
005
20200706004327.0
006
m d
007
cr nn 008maaau
008
210727s2020 sz s 0 eng d
020
$a
9783030153342$q(electronic bk.)
020
$a
9783030153335$q(paper)
024
7
$a
10.1007/978-3-030-15334-2
$2
doi
035
$a
978-3-030-15334-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7868.L6
$b
Y37 2020
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.395
$2
23
090
$a
TK7868.L6
$b
Y29 2020
100
1
$a
Yasin, Muhammad.
$3
884402
245
1 0
$a
Trustworthy hardware design
$h
[electronic resource] :
$b
combinational logic locking techniques /
$c
by Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xxi, 142 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Analog circuits and signal processing,
$x
1872-082X
505
0
$a
The Need for Logic Locking -- A Brief History of Logic Locking -- Pre-SAT Logic Locking -- The SAT Attack -- Post-SAT 1: Point function-based Logic Locking -- Approximate Attacks -- Structural Attacks -- Post-SAT 2: Insertion of SAT-unresolvable Structures -- Post-SAT 3: Stripped-Functionality Logic Locking.
520
$a
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.
650
0
$a
Logic circuits.
$3
182233
650
0
$a
Logic design.
$3
182234
650
0
$a
Hardware Trojans (Computers)
$3
676042
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Logic Design.
$3
276275
650
2 4
$a
Arithmetic and Logic Structures.
$3
276274
700
1
$a
Rajendran, Jeyavijayan (JV).
$3
884403
700
1
$a
Sinanoglu, Ozgur.
$3
884404
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Analog circuits and signal processing.
$3
558088
856
4 0
$u
https://doi.org/10.1007/978-3-030-15334-2
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000193134
電子館藏
1圖書
電子書
EB TK7868.L6 Y29 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-15334-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login