Advanced DPA Theory and Practice [electronic resource] : Towards the Security Limits of Secure Embedded Circuits / by Eric Peeters.

By: Peeters, Eric [author.]Contributor(s): SpringerLink (Online service)Material type: TextTextLanguage: English Publisher: New York, NY : Springer New York : Imprint: Springer, 2013Description: XVI, 139 p. 70 illus., 20 illus. in color. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781461467830Subject(s): Engineering | Data protection | Data structures (Computer science) | Electronics | Systems engineering | Engineering | Electronics and Microelectronics, Instrumentation | Systems and Data Security | Circuits and Systems | Data Structures, Cryptology and Information TheoryAdditional physical formats: Printed edition:: No titleDDC classification: 621.381 LOC classification: TK7800-8360TK7874-7874.9Online resources: Click here to access online
Contents:
General Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources and models of emanation -- Measurement of the power consumption -- Electromagnetic Leakage -- Statistical Tools -- Higher Order Attacks -- Towards the Evaluation of an Implementation against Side-Channel Attacks -- General Conclusion and Possible Further Directions.
In: Springer eBooksSummary: Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

General Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources and models of emanation -- Measurement of the power consumption -- Electromagnetic Leakage -- Statistical Tools -- Higher Order Attacks -- Towards the Evaluation of an Implementation against Side-Channel Attacks -- General Conclusion and Possible Further Directions.

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

There are no comments on this title.

to post a comment.

Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha