000 03313nam a22005655i 4500
001 978-0-387-38162-6
003 DE-He213
005 20161121230608.0
007 cr nn 008mamaa
008 100301s2007 xxu| s |||| 0|eng d
020 _a9780387381626
_9978-0-387-38162-6
024 7 _a10.1007/978-0-387-38162-6
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aMangard, Stefan.
_eauthor.
245 1 0 _aPower Analysis Attacks
_h[electronic resource] :
_bRevealing the Secrets of Smart Cards /
_cby Stefan Mangard, Elisabeth Oswald, Thomas Popp.
264 1 _aBoston, MA :
_bSpringer US,
_c2007.
300 _aXXIV, 338 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aCryptographic Devices -- Power Consumption -- Statistical Characteristics of Power Traces -- Simple Power Analysis -- Differential Power Analysis -- Hiding -- Attacks on Hiding -- Masking -- Attacks on Masking -- Conclusions.
520 _aPower analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, this volume provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles. By analyzing the pros and cons of the different countermeasures, Power Analysis Attacks: Revealing the Secrets of Smart Cards allows practitioners to decide how to protect smart cards. This book also provides valuable information for graduate and advanced undergraduate students, and researchers working in information security. .
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aComputer engineering.
650 0 _aElectrical engineering.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aComputer Engineering.
650 2 4 _aData Encryption.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aComputer Communication Networks.
700 1 _aOswald, Elisabeth.
_eauthor.
700 1 _aPopp, Thomas.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387308579
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-38162-6
912 _aZDB-2-SCS
950 _aComputer Science (Springer-11645)
999 _c501108
_d501108