Cargando…

Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits /

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different as...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Peeters, Eric (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer New York : Imprint: Springer, 2013.
Edición:1st ed. 2013.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4614-6783-0
003 DE-He213
005 20220114111521.0
007 cr nn 008mamaa
008 130331s2013 xxu| s |||| 0|eng d
020 |a 9781461467830  |9 978-1-4614-6783-0 
024 7 |a 10.1007/978-1-4614-6783-0  |2 doi 
050 4 |a TK7800-8360 
072 7 |a TJF  |2 bicssc 
072 7 |a TEC008000  |2 bisacsh 
072 7 |a TJF  |2 thema 
082 0 4 |a 621.381  |2 23 
100 1 |a Peeters, Eric.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Advanced DPA Theory and Practice  |h [electronic resource] :  |b Towards the Security Limits of Secure Embedded Circuits /  |c by Eric Peeters. 
250 |a 1st ed. 2013. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2013. 
300 |a XVI, 139 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a General Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources and models of emanation -- Measurement of the power consumption -- Electromagnetic Leakage -- Statistical Tools -- Higher Order Attacks -- Towards the Evaluation of an Implementation against Side-Channel Attacks -- General Conclusion and Possible Further Directions. 
520 |a Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate. 
650 0 |a Electronics. 
650 0 |a Data protection. 
650 0 |a Electronic circuits. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 1 4 |a Electronics and Microelectronics, Instrumentation. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Electronic Circuits and Systems. 
650 2 4 |a Data Structures and Information Theory. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781493900701 
776 0 8 |i Printed edition:  |z 9781461467847 
776 0 8 |i Printed edition:  |z 9781461467823 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4614-6783-0  |z Texto Completo 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
950 |a Engineering (SpringerNature-11647) 
950 |a Engineering (R0) (SpringerNature-43712)