Hardware and VLSI designs

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Efficient and secure hardware implementations have become a very popular topic during the last decades. In this chapter, we discuss the fundamental design approaches to successfully implement integrated circuits (ICs) as well as testing methods and optimization techniques to achieve an adequate solution for various application scenarios. A major topic handled in this chapter is security in the context of hardware implementations. We elaborate on the characteristics of modern CMOS circuits with regard to side-channel attacks and we discuss possible countermeasure approaches against such attacks. Furthermore, we describe a comprehensive practical example of combining cryptographic instruction set extensions with hardware countermeasures on a modern 32-bit processor platform. In the last section of this chapter, we argue about the assets and drawbacks of implementing test structures in digital circuits with regard to unintentionally opening security holes as well as about intentionally introducing malicious hardware structures, also called hardware Trojans.

Cite

CITATION STYLE

APA

Kirschbaum, M., & Plos, T. (2014). Hardware and VLSI designs. In Secure Smart Embedded Devices, Platforms and Applications (Vol. 9781461479154, pp. 95–116). Springer New York. https://doi.org/10.1007/978-1-4614-7915-4_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free