๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits

โœ Scribed by Eric Peeters (auth.)


Publisher
Springer-Verlag New York
Year
2013
Tongue
English
Leaves
145
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

โœฆ Table of Contents


Front Matter....Pages i-xvi
General Introduction....Pages 1-7
Front Matter....Pages 9-9
Side-Channel Cryptanalysis: A Brief Survey....Pages 11-19
Front Matter....Pages 21-21
CMOS Devices: Sources and Models of Emanation....Pages 23-40
Measurement of the Power Consumption....Pages 41-54
Electromagnetic Leakage....Pages 55-69
Front Matter....Pages 71-71
Statistical Tools....Pages 73-96
Higher Order Attacks....Pages 97-108
Front Matter....Pages 109-109
Toward the Evaluation of an Implementation Against Side-Channel Attacks....Pages 111-128
General Conclusion and Possible Further Directions....Pages 129-132
Back Matter....Pages 133-139

โœฆ Subjects


Electronics and Microelectronics, Instrumentation; Systems and Data Security; Circuits and Systems; Data Structures, Cryptology and Information Theory


๐Ÿ“œ SIMILAR VOLUMES


Security Science: The Theory and Practic
โœ Clifton Smith, David J Brooks ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Butterworth-Heinemann ๐ŸŒ English

<p><i>Security Science</i> integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspe

Security science the theory and practice
โœ Brooks, David J.;Smith, Clifton L ๐Ÿ“‚ Library ๐Ÿ“… 2013;2012 ๐Ÿ› Elsevier Science;Elsevier, BH ๐ŸŒ English

Front Cover; Security Science: The Theory and Practice of Security; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; Preface; Chapter 1: Concept of Security; Introduction; Scientific method in support of security science; Scientific Method; Engineering Design Process; D

Practical Embedded Security: Building Se
โœ Timothy Stapko ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Newnes ๐ŸŒ English

The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented

Practical embedded security building sec
โœ Stapko, Timothy John ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Elsevier;Newnes ๐ŸŒ English

The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented

Practical embedded security: building se
โœ Timothy Stapko ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Elsevier/Newnes ๐ŸŒ English

The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented