It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-031.mrc:161301532:3642
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-031.mrc:161301532:3642?format=raw

LEADER: 03642cam a2200637 i 4500
001 15102998
005 20221119232810.0
006 m o d
007 cr |n|||||||||
008 141120s2015 flua ob 001 0 eng d
035 $a(OCoLC)ocn896593034
035 $a(NNC)15102998
040 $aYDXCP$beng$erda$epn$cYDXCP$dE7B$dOSU$dCAUOI$dOCLCQ$dCRCPR$dOCLCQ$dWAU$dEBLCP$dCUS$dN$T$dCDX$dUMI$dCOO$dDEBBG$dVT2$dDEBSZ$dOCLCQ$dMOR$dOTZ$dMERUC$dOCLCQ$dUAB$dOCL$dOCLCA$dOCLCQ$dCEF$dOCLCQ$dU3W$dINT$dOCLCQ$dS9I$dYDX$dTYFRS$dLEAUB$dOCLCQ$dUHL$dOCLCQ$dOCLCO$dOCLCQ
019 $a892749986$a893735501$a896840127$a900200890$a903237950$a906025135
020 $a1439895848$q(electronic bk.)
020 $a9781439895849$q(electronic bk.)
020 $z9781439895832$q(hardback)
020 $z143989583X$q(hardback)
024 7 $a10.1201/b17555$2doi
035 $a(OCoLC)896593034$z(OCoLC)892749986$z(OCoLC)893735501$z(OCoLC)896840127$z(OCoLC)900200890$z(OCoLC)903237950$z(OCoLC)906025135
037 $aCL0500000528$bSafari Books Online
050 4 $aQA76.9.A25$bM85 2015
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$223
049 $aZCUA
100 1 $aMukhopadhyay, Debdeep,$eauthor.
245 10 $aHardware security :$bdesign, threats, and safeguards /$cDebdeep Mukhopadhyay, Rajat Subhra Chakraborty.
264 1 $aBoca Raton, FL :$bCRC Press Taylor & Francis Group,$c[2015]
264 4 $c©20
264 4 $c©2015
300 $a1 online resource (xxxiii, 556 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $adata file
500 $a"A Chapman & Hall book."
504 $aIncludes bibliographical references and index.
588 0 $aPrint version record.
505 0 $a1. Background -- 2. Hardware design of cryptographic algorithms -- 3. Side channel analysis -- 4. Hardware intellectual property protection -- 5. Hardware trojans -- 6. Physically unclonable functions.
520 $aBeginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).
650 0 $aComputer security.
650 0 $aData encryption (Computer science)
650 0 $aIntegrated circuits$xDesign and construction.
650 0 $aComputers$xCircuits$xDesign and construction.
650 6 $aSécurité informatique.
650 6 $aChiffrement (Informatique)
650 6 $aCircuits intégrés$xConception et construction.
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aIntegrated circuits$xDesign and construction.$2fast$0(OCoLC)fst00975545
650 7 $aData encryption (Computer science)$2fast$0(OCoLC)fst00887935
650 7 $aComputers$xCircuits$xDesign and construction.$2fast$0(OCoLC)fst00872793
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
700 1 $aChakraborty, Rajat Subhra,$eauthor.
776 08 $iPrint version:$aMukhopadhyay, Debdeep.$tHardware security.$dBoca Raton, FL : CRC Press Taylor & Francis Group, ©2015$z9781439895832$w(OCoLC)894928398
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15102998$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS