語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Side-Channel Analysis of Embedded Sy...
~
Guilley, Sylvain.
Side-Channel Analysis of Embedded Systems = An Efficient Algorithmic Approach /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Side-Channel Analysis of Embedded Systems/ by Maamar Ouladj, Sylvain Guilley.
其他題名:
An Efficient Algorithmic Approach /
作者:
Ouladj, Maamar.
其他作者:
Guilley, Sylvain.
面頁冊數:
X, 153 p. 33 illus., 28 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data Engineering. -
電子資源:
https://doi.org/10.1007/978-3-030-77222-2
ISBN:
9783030772222
Side-Channel Analysis of Embedded Systems = An Efficient Algorithmic Approach /
Ouladj, Maamar.
Side-Channel Analysis of Embedded Systems
An Efficient Algorithmic Approach /[electronic resource] :by Maamar Ouladj, Sylvain Guilley. - 1st ed. 2021. - X, 153 p. 33 illus., 28 illus. in color.online resource.
Foundations of Side-Channel Analysis -- Side-Channel Distinguishers -- SCA Countermeasures -- Chosen Message Strategy to Improve SCA -- Generalized Spectral Approach to Speed up the Correlation Power Analysis -- Coalescence-Based Side-Channel Attacks and the Spectral Approach.
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This useful textbook/guide tackles the analysis part, especially under situations where the targeted device is protected by random masking. The book advances in the field and provides the reader with mathematical formalizations. Furthermore, it presents all known analyses within the same notation framework, thereby allowing the reader to rapidly understand and learn contrasting approaches. The examples presented are taken from real-world datasets. This unique text/reference will be useful as a higher-level introduction to the topic, as well as for self-study by researchers and professionals needing a concise guidebook. Maamar Ouladj is an expert in embedded systems security, currently working in Algiers, Algeria. Sylvain Guilley is general manager and chief technical officer at Secure-IC S.A.S., currently working in Paris, France.
ISBN: 9783030772222
Standard No.: 10.1007/978-3-030-77222-2doiSubjects--Topical Terms:
1226308
Data Engineering.
LC Class. No.: QA76.9.D335
Dewey Class. No.: 005.82
Side-Channel Analysis of Embedded Systems = An Efficient Algorithmic Approach /
LDR
:02772nam a22004095i 4500
001
1050073
003
DE-He213
005
20210728074924.0
007
cr nn 008mamaa
008
220103s2021 gw | s |||| 0|eng d
020
$a
9783030772222
$9
978-3-030-77222-2
024
7
$a
10.1007/978-3-030-77222-2
$2
doi
035
$a
978-3-030-77222-2
050
4
$a
QA76.9.D335
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
100
1
$a
Ouladj, Maamar.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1354309
245
1 0
$a
Side-Channel Analysis of Embedded Systems
$h
[electronic resource] :
$b
An Efficient Algorithmic Approach /
$c
by Maamar Ouladj, Sylvain Guilley.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
X, 153 p. 33 illus., 28 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Foundations of Side-Channel Analysis -- Side-Channel Distinguishers -- SCA Countermeasures -- Chosen Message Strategy to Improve SCA -- Generalized Spectral Approach to Speed up the Correlation Power Analysis -- Coalescence-Based Side-Channel Attacks and the Spectral Approach.
520
$a
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This useful textbook/guide tackles the analysis part, especially under situations where the targeted device is protected by random masking. The book advances in the field and provides the reader with mathematical formalizations. Furthermore, it presents all known analyses within the same notation framework, thereby allowing the reader to rapidly understand and learn contrasting approaches. The examples presented are taken from real-world datasets. This unique text/reference will be useful as a higher-level introduction to the topic, as well as for self-study by researchers and professionals needing a concise guidebook. Maamar Ouladj is an expert in embedded systems security, currently working in Algiers, Algeria. Sylvain Guilley is general manager and chief technical officer at Secure-IC S.A.S., currently working in Paris, France.
650
2 4
$a
Data Engineering.
$3
1226308
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Circuits and Systems.
$3
670901
650
1 4
$a
Cryptology.
$3
1211076
650
0
$a
Engineering—Data processing.
$3
1297966
650
0
$a
Computer security.
$3
557122
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Electronic circuits.
$3
563332
650
0
$a
Data encryption (Computer science).
$3
1051084
700
1
$a
Guilley, Sylvain.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1078546
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030772215
776
0 8
$i
Printed edition:
$z
9783030772239
776
0 8
$i
Printed edition:
$z
9783030772246
856
4 0
$u
https://doi.org/10.1007/978-3-030-77222-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入