Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Years
Access
  • 1
    UID:
    almahu_9949930968402882
    Format: X, 411 p. 90 illus. , online resource.
    Edition: 1st ed. 2025.
    ISBN: 9783031643996
    Content: This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography. It exploits the best mathematical tools for quantifying information leakage and characterizing leakage-based attacks. The two possible approaches are described in detail. This includes the optimal attack strategy that can be derived (in specific contexts) or generic bounds regarding data complexity that can be computed. The tone of this book is essentially mathematical. It aims to establish formal foundations for techniques that are otherwise used as engineering recipes in industrial laboratories or empirical intuitions for deriving security levels from practical implementations. It is a systematization of knowledge and a compilation of relevant tools relating to the practice of side-channel analysis on embedded systems. This book provides an up-to-date and improved analysis and understanding of embedded devices that conceal secrets that can be extracted by an attacker. Typical attacks involve measuring the device's power consumption or radiated electromagnetic field. As a source of noisy information, this correlates it with secrets and enabling these secrets to be retrieved. The attacker in some cases, can purchase a blank device from the same series and learn about its leakage, particularly how it relates to the secrets. This book also covers how such information can enhance hardware attacks deployed on another device. Researchers and engineers working in the field of side-channel security for embedded systems and related countermeasures as well as hardware and software engineers focused on implementing cryptographic functionalities will want to purchase this book as a reference. Advanced-level students majoring in computer science and electrical engineering will find this book valuable as a secondary textbook.
    Note: Chapter 1 Introduction -- Chapter 2 Basics and Preliminaries -- part 1 attacks -- Chapter 3 Attacks on Unprotected Devices -- Chapter 4 Attacks on Protected Devices -- part-II Evalautaion -- Chapter 5 Information-Theoretic Evaluation -- Chapter 6 Coding-Theoretic Formalization and Evaluation -- Chapter 7 Information Theoretic Bounds on the Evaluation of Attacks.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031643989
    Additional Edition: Printed edition: ISBN 9783031644009
    Additional Edition: Printed edition: ISBN 9783031644016
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almafu_9961806450502883
    Format: 1 online resource (416 pages)
    Edition: 1st ed. 2025.
    ISBN: 3-031-64399-2
    Content: This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography. It exploits the best mathematical tools for quantifying information leakage and characterizing leakage-based attacks. The two possible approaches are described in detail. This includes the optimal attack strategy that can be derived (in specific contexts) or generic bounds regarding data complexity that can be computed. The tone of this book is essentially mathematical. It aims to establish formal foundations for techniques that are otherwise used as engineering recipes in industrial laboratories or empirical intuitions for deriving security levels from practical implementations. It is a systematization of knowledge and a compilation of relevant tools relating to the practice of side-channel analysis on embedded systems. This book provides an up-to-date and improved analysis and understanding of embedded devices that conceal secrets that can be extracted by an attacker. Typical attacks involve measuring the device's power consumption or radiated electromagnetic field. As a source of noisy information, this correlates it with secrets and enabling these secrets to be retrieved. The attacker in some cases, can purchase a blank device from the same series and learn about its leakage, particularly how it relates to the secrets. This book also covers how such information can enhance hardware attacks deployed on another device. Researchers and engineers working in the field of side-channel security for embedded systems and related countermeasures as well as hardware and software engineers focused on implementing cryptographic functionalities will want to purchase this book as a reference. Advanced-level students majoring in computer science and electrical engineering will find this book valuable as a secondary textbook.
    Note: Chapter 1 Introduction -- Chapter 2 Basics and Preliminaries -- part 1 attacks -- Chapter 3 Attacks on Unprotected Devices -- Chapter 4 Attacks on Protected Devices -- part-II Evalautaion -- Chapter 5 Information-Theoretic Evaluation -- Chapter 6 Coding-Theoretic Formalization and Evaluation -- Chapter 7 Information Theoretic Bounds on the Evaluation of Attacks.
    Additional Edition: ISBN 3-031-64398-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783031164996?
Did you mean 9783031234996?
Did you mean 9783031263996?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages