Constructive Side-Channel Analysis and Secure Design
Springer International Publishing (Verlag)
9783319214757 (ISBN)
Side-Channel Attacks.- Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements.- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits.- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks.- Two Operands of Multipliers in Side-Channel Attack.- FPGA Countermeasures.- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs.- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware.- Timing Attacks and Countermeasures.- A Faster and More Realistic Flush+Reload Attack on AES.- Faster software for fast endomorphisms.- Toward Secure Implementation of McEliece Decryption.- Fault Attacks.- Fault Injection with a new favor: Memetic Algorithms make a difference.- Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers.- A Biased Fault Attack on the Time Redundancy Countermeasure for AES.- Countermeasures.- Faster Mask Conversion with Lookup Tables.- Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC.- Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs.- Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment.
| Erscheint lt. Verlag | 24.7.2015 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 271 p. 87 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Countermeasures • Cryptanalysis • cryptography • Elliptic Curve Cryptography • embedded systems security • fault analysis • fault attacks • FPGA • hardware security • Known ciphertext attack • Leakage resilience • Mathematical Foundations • Memetic Algorithms • Physical attacks • rsa • Security and Privacy • side-channel attacks • Smart cards • Tamper-proof • tamper-resistant designs • timing attacks |
| ISBN-13 | 9783319214757 / 9783319214757 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich