000 02785nam a22005295i 4500
001 978-1-4614-6783-0
003 DE-He213
005 20200420221253.0
007 cr nn 008mamaa
008 130331s2013 xxu| s |||| 0|eng d
020 _a9781461467830
_9978-1-4614-6783-0
024 7 _a10.1007/978-1-4614-6783-0
_2doi
050 4 _aTK7800-8360
050 4 _aTK7874-7874.9
072 7 _aTJF
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTEC008070
_2bisacsh
082 0 4 _a621.381
_223
100 1 _aPeeters, Eric.
_eauthor.
245 1 0 _aAdvanced DPA Theory and Practice
_h[electronic resource] :
_bTowards the Security Limits of Secure Embedded Circuits /
_cby Eric Peeters.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2013.
300 _aXVI, 139 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aGeneral Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources and models of emanation -- Measurement of the power consumption -- Electromagnetic Leakage -- Statistical Tools -- Higher Order Attacks -- Towards the Evaluation of an Implementation against Side-Channel Attacks -- General Conclusion and Possible Further Directions.
520 _aAdvanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
650 0 _aEngineering.
650 0 _aComputer security.
650 0 _aData structures (Computer science).
650 0 _aElectronics.
650 0 _aMicroelectronics.
650 0 _aElectronic circuits.
650 1 4 _aEngineering.
650 2 4 _aElectronics and Microelectronics, Instrumentation.
650 2 4 _aSystems and Data Security.
650 2 4 _aCircuits and Systems.
650 2 4 _aData Structures, Cryptology and Information Theory.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461467823
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-6783-0
912 _aZDB-2-ENG
942 _cEBK
999 _c52752
_d52752