1st Edition

Circuits and Systems for Security and Privacy

ISBN 9781482236880
Published May 24, 2016 by CRC Press
382 Pages 11 Color & 109 B/W Illustrations

USD $205.00

Prices & shipping based on shipping country


Book Description

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.

Table of Contents

Farhana Sheikh and Leonel Sousa

Mathematics and Cryptography
David O. Novick

Block Ciphers
Deniz Toz, Josep Balasch, and Farhana Sheikh

Secure Hashing: SHA-1, SHA-2, and SHA-3
Ricardo Chaves, Leonel Sousa, Nicolas Sklavos, Apostolos P. Fournaris, Georgina Kalogeridou, Paris Kitsos, and Farhana Sheikh

Public Key Cryptography
Nathaniel Pinckney, David Money Harris, Nan Jiang, Kyle Kelley, Samuel Antao, and Leonel Sousa

Physically Unclonable Functions: A Window into CMOS Process Variations
Raghavan Kumar, Xiaolin Xu, Wayne Burleson, Sami Rosenblatt, and Toshiaki Kirihata

Random Number Generators for Cryptography
Viktor Fischer and Patrick Haddad

Side-Channel Attacks
Josep Balasch, Oscar Reparaz, Ingrid Verbauwhede, Sorin A. Huss, Kai Rohde, Marc Stöttinger, and Michael Zohne

Remarks and Conclusion
Farhana Sheikh and Leonel Sousa

View More



Farhana Sheikh earned her B.Eng. in systems and computer engineering with high distinction, as well as the Chancellor’s Medal, from Carleton University. She earned her M.Sc. and Ph.D. in electrical engineering and computer science from the University of California, Berkeley. She has worked as a software engineer, senior manager, senior research scientist, and staff scientist at several prestigious technology companies. She is currently a senior staff scientist and the technical manager of a digital communications lab for an industry-leading Fortune 500 technology corporation. An IEEE senior member, Dr. Sheikh has coauthored several publications, filed more than 10 patents, and received numerous awards.

Leonel Sousa earned his Ph.D. in electrical and computer engineering from the Instituto Superior Técnico, Universidade de Lisboa, where he is currently full professor. He is also senior researcher with the Instituto de Engenharia de Sistemas e Computadores - Investigação e Desenvolvimento. He has contributed to 200+ technical papers, for which he received many awards. An IEEE and ACM senior member and IET fellow, Dr. Sousa has served as keynote presenter and program, general, and topic chair at numerous conferences. He has edited three special issues and is presently associate editor of several journals. He is also editor-in-chief of the EURASIP Journal on Embedded Systems.


"[This book] discusses side-channel attacks and efficient implementations, analysis of advantages, disadvantages, and attack-resistance on various topics such as symmetric-key algorithms, public-key algorithms, hash functions, RNGs, and PUFs. This definitely makes the book stand out from rest. … The book is suitable for unfamiliar readers to learn more about the topic as well as a comprehensive resource for more experienced readers to quickly become familiar with the recent trends in this area. It helps the reader to design efficient accelerators used in security applications as well as the development of security-aware circuits and systems. The topics covered make the book suitable for both industry and academia. Furthermore, the authors discuss real implementations of security systems suitable for both commercial products as well as academic applications. Another positive aspect is the contributions from experts on each topic. This makes the book an ultimate state-of-the-art reference. … The presentation, style of writing, and coverage of side-channel attacks is very good. … [This book is] an extremely valuable addition to the literature on security and privacy that certainly stands out as unique."
—Dr. Tony Thomas, Indian Institute of Information Technology and Management, Kerala