Cargando…

Power Analysis Attacks Revealing the Secrets of Smart Cards /

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analys...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Mangard, Stefan (Autor), Oswald, Elisabeth (Autor), Popp, Thomas (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-38162-6
003 DE-He213
005 20220116132744.0
007 cr nn 008mamaa
008 100301s2007 xxu| s |||| 0|eng d
020 |a 9780387381626  |9 978-0-387-38162-6 
024 7 |a 10.1007/978-0-387-38162-6  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Mangard, Stefan.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Power Analysis Attacks  |h [electronic resource] :  |b Revealing the Secrets of Smart Cards /  |c by Stefan Mangard, Elisabeth Oswald, Thomas Popp. 
250 |a 1st ed. 2007. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2007. 
300 |a XXIV, 338 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Cryptographic Devices -- Power Consumption -- Statistical Characteristics of Power Traces -- Simple Power Analysis -- Differential Power Analysis -- Hiding -- Attacks on Hiding -- Masking -- Attacks on Masking -- Conclusions. 
520 |a Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, this volume provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles. By analyzing the pros and cons of the different countermeasures, Power Analysis Attacks: Revealing the Secrets of Smart Cards allows practitioners to decide how to protect smart cards. This book also provides valuable information for graduate and advanced undergraduate students, and researchers working in information security. . 
650 0 |a Data protection. 
650 0 |a Telecommunication. 
650 0 |a Computer engineering. 
650 0 |a Computer networks . 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Computer Engineering and Networks. 
650 2 4 |a Cryptology. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Oswald, Elisabeth.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Popp, Thomas.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9780387511436 
776 0 8 |i Printed edition:  |z 9781441940391 
776 0 8 |i Printed edition:  |z 9780387308579 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-0-387-38162-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)