Why Cryptography Should Not Rely on Physical Attack Complexity
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Tho...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Krämer, Juliane (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Singapore :
Springer Nature Singapore : Imprint: Springer,
2015.
|
Edición: | 1st ed. 2015. |
Colección: | T-Labs Series in Telecommunication Services,
|
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Fading and Shadowing in Wireless Systems
por: Shankar, P. Mohana
Publicado: (2012) -
Forward Error Correction Based On Algebraic-Geometric Theory
por: A. Alzubi, Jafar, et al.
Publicado: (2014) -
QC-LDPC Code-Based Cryptography
por: Baldi, Marco
Publicado: (2014) -
New Directions in Wireless Communications Research
Publicado: (2009) -
On the Achievable Rate of Stationary Fading Channels
por: Dörpinghaus, Meik
Publicado: (2011)