Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design.…mehr
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book). This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Behrouz Zolfaghari is currently a postdoctoral fellow at Indian Institute of Technology Guwahati. His research interests include hardware-oriented cryptography, information-theoretic cryptography, information theory, VLSI design and discrete mathematics. Khodakhast Bibak is an Assistant Professor at the Department of Computer Science and Software Engineering at Miami University. Previously, he was a Postdoctoral Research Associate (September 2017 - August 2018) in the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign. Before this, Khodakhast was a Postdoctoral Research Fellow (May-August 2017) at the Department of Computer Science, University of Victoria, from where he also received his PhD (April 2017). He earned a Master of Mathematics degree (April 2013) at the Department of Combinatorics and Optimization, University of Waterloo, where he was also a member of the Centre for Applied Cryptographic Research (CACR). Khodakhast's research interests are Cybersecurity, Applied Cryptography, Information Theory, Communications, Quantum Information Science (QIS), and related areas. Takeshi Koshiba received the PhD degree from Tokyo Institute of Technology. He is a full professor at the Department of Mathematics, the Faculty of Education and Integrated Arts and Sciences, Waseda University, Japan. His interests include theoretical and applied cryptography, the randomness in algorithms, and quantum computing and cryptography. Hamid R. Nemati is a full Professor of Information Systems at the University of North Carolina at Greensboro. He received his PhD from the University of Georgia in Information Technology and Management Science and his MBA from The University of Massachusetts. He is internationally recognized for his research in various aspects of Information Technology, including data analytics, big data, information security and privacy, organizational and behavioral aspects of Information Technology development and use. He has extensive professional experience as a developer, an analyst and project leader and has been a consultant for numerous major corporations. He has published nine books and over 120 peer reviewed academic publications in various premier scholarly and professional journals and conference proceedings. Pinaki Mitra is currently an associate professor at Department of Computer Science & Engineering, IIT Guwahati. He obtained his B. Tech in Computer Science and Engineering from Jadavpur University, Kolkata in 1987, India and his M. Tech in Computer Science and Engineering from Indian Institute of Science Bangalore, India in 1989. Finally, he obtained his Ph. D from Simon Fraser University, Canada in 1994. He worked on a project at Jadavpur University, department of Computer Science and Engineering. Subsequently he joined National Institute of Management, Kolkata, and served as an assistant professor. He joined IIT Guwahati in December, 2004. His research interest includes Cryptography, Network Security, Computer Graphics, Multimedia and Machine Learning.
Inhaltsangabe
Introduction Cryptographic Hardware and Hardware-Assisted Cryptography 2.1 Existing Surveys 2.2 Design 2.2.1 Cryptographic Primitives 2.2.2 Cryptographic Hardware 2.2.3 Hardware-Assisted Ciphers 2.2.4 Automatic Design and Synthesis 2.2.5 Design Objectives 2.3 Implementation 2.3.1 Prototyping 2.3.2 Implementation Technologies 2.3.3 Implementation Goals and Challenges 2.4 Evaluation 2.4.1 Security Evaluation 2.4.2 Simulation and Performance Benchmarking PUFs in Industry, Education Programs, and Books 3.1 Historical Background 3.2 PUF in Industry 3.3 PUF in Education Programs 3.4 PUF in Books Preliminary Discussions 4.1 Related Works: A Survey on Surveys 4.2 Motivations 4.3 Methodology 4.4 Work Space The classification Tree and Popularities 5.1 First Level Classification and Life Cycle 5.2 Design 5.2.1 Modeling 5.2.2 Design Objectives 5.2.3 Component Design 5.2.4 Post-Process, Expansion, Standardization and Alternatives 5.3 Implementation 5.4 Operation 5.4.1 Ecosystem 5.4.2 Interfaces 5.5 Evaluation and Production Trend Analysis 6.1 Top Topics 6.1.1 The Most Popular Topics during the History 6.1.2 The Most Popular Topics in Top Conferences 6.1.3 Popular Topics in Top Journals 6.1.4 Popular Topics in Recent Years 6.2 Evolution Study Future Roadmap 7.1 Trends 7.2 Conclusions and Further Works References Index
Introduction Cryptographic Hardware and Hardware-Assisted Cryptography 2.1 Existing Surveys 2.2 Design 2.2.1 Cryptographic Primitives 2.2.2 Cryptographic Hardware 2.2.3 Hardware-Assisted Ciphers 2.2.4 Automatic Design and Synthesis 2.2.5 Design Objectives 2.3 Implementation 2.3.1 Prototyping 2.3.2 Implementation Technologies 2.3.3 Implementation Goals and Challenges 2.4 Evaluation 2.4.1 Security Evaluation 2.4.2 Simulation and Performance Benchmarking PUFs in Industry, Education Programs, and Books 3.1 Historical Background 3.2 PUF in Industry 3.3 PUF in Education Programs 3.4 PUF in Books Preliminary Discussions 4.1 Related Works: A Survey on Surveys 4.2 Motivations 4.3 Methodology 4.4 Work Space The classification Tree and Popularities 5.1 First Level Classification and Life Cycle 5.2 Design 5.2.1 Modeling 5.2.2 Design Objectives 5.2.3 Component Design 5.2.4 Post-Process, Expansion, Standardization and Alternatives 5.3 Implementation 5.4 Operation 5.4.1 Ecosystem 5.4.2 Interfaces 5.5 Evaluation and Production Trend Analysis 6.1 Top Topics 6.1.1 The Most Popular Topics during the History 6.1.2 The Most Popular Topics in Top Conferences 6.1.3 Popular Topics in Top Journals 6.1.4 Popular Topics in Recent Years 6.2 Evolution Study Future Roadmap 7.1 Trends 7.2 Conclusions and Further Works References Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der Steintor 70. V V GmbH (zukünftig firmierend: buecher.de internetstores GmbH)
Geschäftsführung: Monica Sawhney | Roland Kölbl
Sitz der Gesellschaft: Hannover
Amtsgericht Hannover HRB 227001
Steuernummer: 321/neu