Skip to content
Hardware Security Textbook
  • Home
  • Features
  • Instructor’s Zone
  • Student’s Zone
  • Adoption List
  • About Authors
  • How to order
  • Contact Us
  • Toggle website search
Menu Close
  • Home
  • Features
  • Instructor’s Zone
  • Student’s Zone
  • Adoption List
  • About Authors
  • How to order
  • Contact Us

Recommended Reading Materials​

  1. Home>
  2. Recommended Reading Materials​
  • Mihir Bellare and Phil Rogaway, Introduction to Modern Cryptography
  • Ross J. Anderson. Security Engineering: A guide to building dependable distributed systems. John Wiley and Sons, 2001
  • Matt Bishop , Computer Security: Art and Science, Addison-Wesley, 2003
  • William Stallings. Cryptography and Network Security, Fourth edition, 2007 (WS)
  • The Hunt for the Kill Switch
  • Hardware Trojan (computing)
  • Defense Science Board Task Force On High Performance Microchip Supply
  • Old Trick Threatens the Newest Weapons
  • A Survey of Hardware Trojan taxonomy and Detection
  • Hardware Trojans: Lessons Learned After One Decade of Research
  • Detecting malicious inclusions in secure hardware: Challenges and Solutions
  • FPGA Design Security Bibliography
  • Supergeek pulls off 'near impossible' crypto chip hack
  • Security through obscurity
  • Trust-Hub
Copyright - WordPress Theme by OceanWP