Note: Not guaranteed to come with supplemental materials (access cards, study guides, lab manuals, CDs, etc.)
Extend Your Rental at Any Time
Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.
Sorry, this item is currently unavailable.
With the ever-increasing proliferation of e-business practices, great volumes of secure business transactions and data transmissions are routinely carried out in encrypted forms through devices ranging from personal smartcards to business servers. The cryptographic algorithms are often computationally intensive and are designed in hardware and embedded systems to meet real-time requirements. Addressing diverse aspects of hardware security, this book covers cryptographic algorithms and their implementations, side-channel analysis, hardware intellectual property protection, piracy prevention, hardware Trojan threats, and solutions.