Advanced DPA Theory and Practice (Record no. 52752)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02785nam a22005295i 4500 |
001 - CONTROL NUMBER | |
control field | 978-1-4614-6783-0 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200420221253.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130331s2013 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781461467830 |
-- | 978-1-4614-6783-0 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.381 |
100 1# - AUTHOR NAME | |
Author | Peeters, Eric. |
245 10 - TITLE STATEMENT | |
Title | Advanced DPA Theory and Practice |
Sub Title | Towards the Security Limits of Secure Embedded Circuits / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVI, 139 p. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | General Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources and models of emanation -- Measurement of the power consumption -- Electromagnetic Leakage -- Statistical Tools -- Higher Order Attacks -- Towards the Evaluation of an Implementation against Side-Channel Attacks -- General Conclusion and Possible Further Directions. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-1-4614-6783-0 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | New York, NY : |
-- | Springer New York : |
-- | Imprint: Springer, |
-- | 2013. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Engineering. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronics. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Microelectronics. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic circuits. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Engineering. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronics and Microelectronics, Instrumentation. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Circuits and Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Structures, Cryptology and Information Theory. |
912 ## - | |
-- | ZDB-2-ENG |
No items available.