 
                                                            ISBN: 9783030788407
Код товара 163862
Behavioral Synthesis for Hardware Security
 
                                                            ISBN: 9783030788407
Код товара 163862
                                                                                                                12 577 ₽
                                                                                                            
                                            Доставка под заказ
Если Вы закажете книгу до 15.12.2025, то мы привезём её ориентировочно 26.01.2026.
- 
                        АвторKatkoori Srinivas, Islam Sheikh Ariful / Каткури Шринивалс 
- 
                        ИздательSpringer 
- 
                        Тип обложкиHardcover 
- 
                        Размеры23.39 x 15.60 x 2.39 cm 
- 
                        Год издания2021 
- 
                        Вес (г)757 
- 
                        ISBN9783030788407 
- 
                        ЯзыкENG 
- 
                        Кол-во страниц446 
О чём книга?
Introduction.- Background.- Techniques for algorithm-level obfuscation during high-level synthesis.- High-level synthesis of key based obfuscated RTL datapaths.- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation.- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility.- Behavioral synthesis techniques for intellectual property protection.- Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis.- High-Level Synthesis for Side-Channel Defense.- On state encoding against power analysis attacks for finite state controllers.- Examining the consequences of high-level synthesis optimizations on power side-channel.- Towards a timing attack aware high-level synthesis of integrated circuits.- High-Level Synthesis with Timing-Sensitive Information Flow Enforcement.- Mitigating information leakage during critical communication using S*FSM.- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security-Driven Task Scheduling.- Securing industrial control system with high level synthesis.- Conclusions and open research problems.
                                    
                                Introduction.- Background.- Techniques for algorithm-level obfuscation during high-level synthesis.- High-level synthesis of key based obfuscated RTL datapaths.- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation.- Empirical Word
                                            Подпишись на рассылку
                    Подпишись на рассылку
                    Знание — сила
                                Обещаем делиться новинками, статьями, подборками и всем, что действительно важно
P.S. спамить — не в нашем стиле
                
        1.45        s.
        |
        
                s.
    
 
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                    