000 | 02785nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-1-4614-6783-0 | ||
003 | DE-He213 | ||
005 | 20200420221253.0 | ||
007 | cr nn 008mamaa | ||
008 | 130331s2013 xxu| s |||| 0|eng d | ||
020 |
_a9781461467830 _9978-1-4614-6783-0 |
||
024 | 7 |
_a10.1007/978-1-4614-6783-0 _2doi |
|
050 | 4 | _aTK7800-8360 | |
050 | 4 | _aTK7874-7874.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTEC008070 _2bisacsh |
|
082 | 0 | 4 |
_a621.381 _223 |
100 | 1 |
_aPeeters, Eric. _eauthor. |
|
245 | 1 | 0 |
_aAdvanced DPA Theory and Practice _h[electronic resource] : _bTowards the Security Limits of Secure Embedded Circuits / _cby Eric Peeters. |
264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2013. |
|
300 |
_aXVI, 139 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aGeneral Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources and models of emanation -- Measurement of the power consumption -- Electromagnetic Leakage -- Statistical Tools -- Higher Order Attacks -- Towards the Evaluation of an Implementation against Side-Channel Attacks -- General Conclusion and Possible Further Directions. | |
520 | _aAdvanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aElectronics. | |
650 | 0 | _aMicroelectronics. | |
650 | 0 | _aElectronic circuits. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aElectronics and Microelectronics, Instrumentation. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aCircuits and Systems. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781461467823 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-6783-0 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c52752 _d52752 |