INDEX

A

ACK, 15

AES, 2, 18, 24, 2932, 39, 210211

Application Specific Integrated Circuit (ASIC), 106, 115, 118, 123

Asymmetric cryptography, 25, 13, 51, 75, 80, 84, 120, 122, 132, 201, 202, 204, 212

Attack space, 6, 7, 11, 42, 45, 171, 179, 203,

Attestation Identity Key (AIK), 108

Authentication, 6, 911, 1416, 47, 52, 55, 58, 62, 6771, 73, 7581, 86, 96, 99100, 104, 107108, 113, 118, 120, 127129, 131, 137138, 140145, 167168, 170, 172173, 178, 186188, 195, 204205, 207208, 212,

B

Bifurcation, 154

Biometrics, 1011, 62, 67, 80, 128134, 137138, 140, 145, 147, 155, 157, 165, 188, 200, 205, 207212

BIOS, 8485, 109

Birthday paradox, 29, 36, 3839, 43

Block cipher, 18, 24, 2829, 40

Blowfish, 18, 2831,

Bootstrap loading, 6061, 8390, 96, 9899, 106107, 200, 204, 210211

Brownian motion, 4849

Brute force attack, 7, 21, 24, 29, 36, 39, 4243, 51, 171, 203

Buffer overflow, 6162, 9093, 107, 110, 206

C

Capacitive scanner, 135, 153

Certifying Authority (CA), 7576, 132

Clock skew, 140, 142143, 196197

Common Access Card (CAC), 174

Common Criteria (CC), 88

Core Root of Trust for Measurement (CRTM), 84, 106

CRC, 2526

Crossover, 154

Cryptography

Symmetric, 2, 5, 19, 21, 24, 84, 201202, 204

Asymmetric, 2, 5, 84, 201202, 204, 212

D

Deep Crack, 7

DES, 2, 7, 16, 1819, 2124, 28, 59, 118, 175

Dictionary attack, 7, 13, 42, 109, 179

Differential power analysis (DPA), 124, 126, 176

Diffie–Helman algorithm, 3

Digital Rights Management (DRM), 111114, 181, 209

Direct Memory ...

Get Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.