Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits / Edition 1

Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits / Edition 1

by Eric Peeters
ISBN-10:
1461467829
ISBN-13:
9781461467823
Pub. Date:
03/31/2013
Publisher:
Springer New York
ISBN-10:
1461467829
ISBN-13:
9781461467823
Pub. Date:
03/31/2013
Publisher:
Springer New York
Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits / Edition 1

Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits / Edition 1

by Eric Peeters
$109.99 Current price is , Original price is $109.99. You
$109.99 
  • SHIP THIS ITEM
    Not Eligible for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Product Details

ISBN-13: 9781461467823
Publisher: Springer New York
Publication date: 03/31/2013
Edition description: 2013
Pages: 139
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

About the Author

Eric Peeters, Ph.D is a Security Architect at Texas Instruments Inc.

Table of Contents

General Introduction.- Side-Channel Cryptanalysis: a brief survey.- CMOS devices: sources and models of emanation.- Measurement of the power consumption.- Electromagnetic Leakage.- Statistical Tools.- Higher Order Attacks.- Towards the Evaluation of an Implementation against Side-Channel Attacks.- General Conclusion and Possible Further Directions.
From the B&N Reads Blog

Customer Reviews