Farhana Sheikh earned her B.Eng. in systems and computer engineering with high distinction, as well as the Chancellor's Medal, from Carleton University. She earned her M.Sc. and Ph.D. in electrical engineering and computer science from the University of California, Berkeley. She has worked as a software engineer, senior manager, senior research scientist, and staff scientist at several prestigious technology companies. She is currently a senior staff scientist and the technical manager of a digital communications lab for an industry-leading Fortune 500 technology corporation. An IEEE senior member, Dr. Sheikh has coauthored several publications, filed more than 10 patents, and received numerous awards. Leonel Sousa earned his Ph.D. in electrical and computer engineering from the Instituto Superior Tecnico, Universidade de Lisboa, where he is currently full professor. He is also senior researcher with the Instituto de Engenharia de Sistemas e Computadores - Investigacao e Desenvolvimento. He has contributed to 200+ technical papers, for which he received many awards. An IEEE and ACM senior member and IET fellow, Dr. Sousa has served as keynote presenter and program, general, and topic chair at numerous conferences. He has edited three special issues and is presently associate editor of several journals. He is also editor-in-chief of the EURASIP Journal on Embedded Systems.
[This book] discusses side-channel attacks and efficient implementations, analysis of advantages, disadvantages, and attack-resistance on various topics such as symmetric-key algorithms, public-key algorithms, hash functions, RNGs, and PUFs. This definitely makes the book stand out from rest. ... The book is suitable for unfamiliar readers to learn more about the topic as well as a comprehensive resource for more experienced readers to quickly become familiar with the recent trends in this area. It helps the reader to design efficient accelerators used in security applications as well as the development of security-aware circuits and systems. The topics covered make the book suitable for both industry and academia. Furthermore, the authors discuss real implementations of security systems suitable for both commercial products as well as academic applications. Another positive aspect is the contributions from experts on each topic. This makes the book an ultimate state-of-the-art reference. ... The presentation, style of writing, and coverage of side-channel attacks is very good. ... [This book is] an extremely valuable addition to the literature on security and privacy that certainly stands out as unique. -Dr. Tony Thomas, Indian Institute of Information Technology and Management, Kerala