Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach
Autor Maamar Ouladj, Sylvain Guilleyen Limba Engleză Hardback – 29 iul 2021
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 381.00 lei 6-8 săpt. | |
Springer International Publishing – 30 iul 2022 | 381.00 lei 6-8 săpt. | |
Hardback (1) | 487.75 lei 6-8 săpt. | |
Springer International Publishing – 29 iul 2021 | 487.75 lei 6-8 săpt. |
Preț: 487.75 lei
Nou
Puncte Express: 732
Preț estimativ în valută:
93.35€ • 97.09$ • 78.23£
93.35€ • 97.09$ • 78.23£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030772215
ISBN-10: 3030772217
Pagini: 172
Ilustrații: X, 153 p. 33 illus., 28 illus. in color.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.42 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3030772217
Pagini: 172
Ilustrații: X, 153 p. 33 illus., 28 illus. in color.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.42 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Foundations of Side-Channel Analysis.- Side-Channel Distinguishers.- SCA Countermeasures.- Chosen Message Strategy to Improve SCA.- Generalized Spectral Approach to Speed up the Correlation Power Analysis.- Coalescence-Based Side-Channel Attacks and the Spectral Approach.
Notă biografică
Maamar Ouladj is an expert in embedded systems security. He owns a PhD degree from LAGA, Université Paris 8 Vincennes-Saint-Denis, and works currently in Algiers (Algeria).
Textul de pe ultima copertă
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis.
This useful textbook/guide tackles the analysis part, especially under situations where the targeted device is protected by random masking. The book advances in the field and provides the reader with mathematical formalizations. Furthermore, it presents all known analyses within the same notation framework, thereby allowing the reader to rapidly understand and learn contrasting approaches. The examples presented are taken from real-world datasets.
This unique text/reference will be useful as a higher-level introduction to the topic, as well as for self-study by researchers and professionals needing a concise guidebook.
Maamar Ouladj is an expert in embedded systems security, currently working in Algiers, Algeria. Sylvain Guilley is general manager and chief technical officer at Secure-IC S.A.S., currently working in Paris, France.
This useful textbook/guide tackles the analysis part, especially under situations where the targeted device is protected by random masking. The book advances in the field and provides the reader with mathematical formalizations. Furthermore, it presents all known analyses within the same notation framework, thereby allowing the reader to rapidly understand and learn contrasting approaches. The examples presented are taken from real-world datasets.
This unique text/reference will be useful as a higher-level introduction to the topic, as well as for self-study by researchers and professionals needing a concise guidebook.
Maamar Ouladj is an expert in embedded systems security, currently working in Algiers, Algeria. Sylvain Guilley is general manager and chief technical officer at Secure-IC S.A.S., currently working in Paris, France.
Caracteristici
Tackles analytical aspects, especially under situations in which the targeted device is protected by random masking Explains advances in the field and provides the reader with mathematical formalizations Presents all known analyses within the same notation framework, which allows readers to rapidly understand and learn contrasting approaches Provides examples taken from real-world datasets