Cantitate/Preț
Produs

Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits

Autor Eric Peeters
en Limba Engleză Paperback – 20 mai 2015
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 63353 lei  6-8 săpt.
  Springer – 20 mai 2015 63353 lei  6-8 săpt.
Hardback (1) 63843 lei  6-8 săpt.
  Springer – 31 mar 2013 63843 lei  6-8 săpt.

Preț: 63353 lei

Preț vechi: 74532 lei
-15% Nou

Puncte Express: 950

Preț estimativ în valută:
12125 12625$ 10247£

Carte tipărită la comandă

Livrare economică 10-24 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781493900701
ISBN-10: 1493900706
Pagini: 156
Ilustrații: XVI, 139 p.
Dimensiuni: 155 x 235 x 8 mm
Greutate: 0.23 kg
Ediția:2013
Editura: Springer
Colecția Springer
Locul publicării:New York, NY, United States

Cuprins

General Introduction.- Side-Channel Cryptanalysis: a brief survey.- CMOS devices: sources and models of emanation.- Measurement of the power consumption.- Electromagnetic Leakage.- Statistical Tools.- Higher Order Attacks.- Towards the Evaluation of an Implementation against Side-Channel Attacks.- General Conclusion and Possible Further Directions.

Notă biografică

Eric Peeters, Ph.D is a Security Architect at Texas Instruments Inc.

Textul de pe ultima copertă

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Caracteristici

Discusses practical aspects of side-channel attacks on secure embedded device Examines different possible statistical classification tools Covers a theoretical framework that allows one to characterize both the leakage function and the adversary’s strength Includes supplementary material: sn.pub/extras