Introduction.- Hardware Security Primitives and their Applications.-
Racetrack PUF.- TERO PUF.- Direct Characterization PUF.- Volatile Memory
Based PUF.- Emerging Memory Based PUF.- Extrinsic Characterization of
PUF.- Radio PUFs and CoAs.- Optical PUFs.- True Random Number
Generators.- Hardware Camouflaging.- Temper Detection Methods.- Embedded
Watermarking.- Counterfeit and Recycled IC Detection.- Package-Level
Counterfeit IC Detection.- Side Channels Protection in Cryptographic
Hardware.- Fault Injection Resistant Cryptographic Hardware.- Energy and
Performance Optimization for Cryptography.- Lightweight Cryptography.-
Post-Quantum Cryptography.- Virtual Proof of Reality.- Analog Security.