Advanced DPA theory and practice: towards the security limits of secure embedded circuits
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY [u.a.]
Springer
2013
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHN01 FHR01 FKE01 FWS01 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781461467830 |
DOI: | 10.1007/978-1-4614-6783-0 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV041045659 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 130527s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781461467830 |c Online |9 978-1-4614-6783-0 | ||
024 | 7 | |a 10.1007/978-1-4614-6783-0 |2 doi | |
035 | |a (OCoLC)843455721 | ||
035 | |a (DE-599)BVBBV041045659 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-634 |a DE-573 |a DE-92 |a DE-Aug4 |a DE-859 |a DE-706 |a DE-863 | ||
082 | 0 | |a 621.381 | |
084 | |a ST 153 |0 (DE-625)143597: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Peeters, Eric |e Verfasser |0 (DE-588)141353945 |4 aut | |
245 | 1 | 0 | |a Advanced DPA theory and practice |b towards the security limits of secure embedded circuits |c Eric Peeters |
264 | 1 | |a New York, NY [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Electronics | |
650 | 4 | |a Systems engineering | |
650 | 4 | |a Engineering | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Seitenkanalattacke |0 (DE-588)7546808-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eingebettetes System |0 (DE-588)4396978-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Seitenkanalattacke |0 (DE-588)7546808-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4614-6782-3 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4614-6783-0 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026022992&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026022992&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026022992 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6783-0 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6783-0 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6783-0 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6783-0 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6783-0 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6783-0 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6783-0 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-6783-0 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 922623 |
---|---|
_version_ | 1806194900811644928 |
adam_text | ADVANCED DPA THEORY AND PRACTICE
/ PEETERS, ERIC
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
GENERAL INTRODUCTION
SIDE-CHANNEL CRYPTANALYSIS: A BRIEF SURVEY
CMOS DEVICES: SOURCES AND MODELS OF EMANATION
MEASUREMENT OF THE POWER CONSUMPTION
ELECTROMAGNETIC LEAKAGE
STATISTICAL TOOLS
HIGHER ORDER ATTACKS
TOWARDS THE EVALUATION OF AN IMPLEMENTATION AGAINST SIDE-CHANNEL ATTACKS
GENERAL CONCLUSION AND POSSIBLE FURTHER DIRECTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ADVANCED DPA THEORY AND PRACTICE
/ PEETERS, ERIC
: 2013
ABSTRACT / INHALTSTEXT
ADVANCED DPA THEORY AND PRACTICE PROVIDES A THOROUGH SURVEY OF NEW
PHYSICAL LEAKAGES OF EMBEDDED SYSTEMS, NAMELY THE POWER AND THE
ELECTROMAGNETIC EMANATIONS. THE BOOK PRESENTS A THOROUGH ANALYSIS ABOUT
LEAKAGE ORIGIN OF EMBEDDED SYSTEM. THIS BOOK EXAMINES THE SYSTEMATIC
APPROACH OF THE DIFFERENT ASPECTS AND ADVANCED DETAILS ABOUT
EXPERIMENTAL SETUP FOR ELECTROMAGNETIC ATTACK. THE AUTHOR DISCUSSES
ADVANCED STATISTICAL METHODS TO SUCCESSFULLY ATTACK EMBEDDED DEVICES
SUCH AS HIGH-ORDER ATTACK, TEMPLATE ATTACK IN PRINCIPAL SUBSPACES,
MACHINE LEARNING METHODS. THE BOOK INCLUDES THEORETICAL FRAMEWORK TO
DEFINE SIDE-CHANNEL BASED ON TWO METRICS: MUTUAL INFORMATION AND SUCCESS
RATE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Peeters, Eric |
author_GND | (DE-588)141353945 |
author_facet | Peeters, Eric |
author_role | aut |
author_sort | Peeters, Eric |
author_variant | e p ep |
building | Verbundindex |
bvnumber | BV041045659 |
classification_rvk | ST 153 ST 277 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)843455721 (DE-599)BVBBV041045659 |
dewey-full | 621.381 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.381 |
dewey-search | 621.381 |
dewey-sort | 3621.381 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-1-4614-6783-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03146nmm a2200625 c 4500</leader><controlfield tag="001">BV041045659</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130527s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461467830</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4614-6783-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4614-6783-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)843455721</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041045659</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-863</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.381</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 153</subfield><subfield code="0">(DE-625)143597:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Peeters, Eric</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)141353945</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced DPA theory and practice</subfield><subfield code="b">towards the security limits of secure embedded circuits</subfield><subfield code="c">Eric Peeters</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Seitenkanalattacke</subfield><subfield code="0">(DE-588)7546808-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Seitenkanalattacke</subfield><subfield code="0">(DE-588)7546808-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4614-6782-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026022992&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026022992&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026022992</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-6783-0</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041045659 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T16:14:46Z |
institution | BVB |
isbn | 9781461467830 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026022992 |
oclc_num | 843455721 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-634 DE-573 DE-92 DE-Aug4 DE-859 DE-706 DE-863 DE-BY-FWS |
owner_facet | DE-898 DE-BY-UBR DE-634 DE-573 DE-92 DE-Aug4 DE-859 DE-706 DE-863 DE-BY-FWS |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
spellingShingle | Peeters, Eric Advanced DPA theory and practice towards the security limits of secure embedded circuits Ingenieurwissenschaften Data protection Data structures (Computer science) Electronics Systems engineering Engineering Computersicherheit (DE-588)4274324-2 gnd Seitenkanalattacke (DE-588)7546808-6 gnd Eingebettetes System (DE-588)4396978-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7546808-6 (DE-588)4396978-1 |
title | Advanced DPA theory and practice towards the security limits of secure embedded circuits |
title_auth | Advanced DPA theory and practice towards the security limits of secure embedded circuits |
title_exact_search | Advanced DPA theory and practice towards the security limits of secure embedded circuits |
title_full | Advanced DPA theory and practice towards the security limits of secure embedded circuits Eric Peeters |
title_fullStr | Advanced DPA theory and practice towards the security limits of secure embedded circuits Eric Peeters |
title_full_unstemmed | Advanced DPA theory and practice towards the security limits of secure embedded circuits Eric Peeters |
title_short | Advanced DPA theory and practice |
title_sort | advanced dpa theory and practice towards the security limits of secure embedded circuits |
title_sub | towards the security limits of secure embedded circuits |
topic | Ingenieurwissenschaften Data protection Data structures (Computer science) Electronics Systems engineering Engineering Computersicherheit (DE-588)4274324-2 gnd Seitenkanalattacke (DE-588)7546808-6 gnd Eingebettetes System (DE-588)4396978-1 gnd |
topic_facet | Ingenieurwissenschaften Data protection Data structures (Computer science) Electronics Systems engineering Engineering Computersicherheit Seitenkanalattacke Eingebettetes System |
url | https://doi.org/10.1007/978-1-4614-6783-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026022992&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026022992&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT peeterseric advanceddpatheoryandpracticetowardsthesecuritylimitsofsecureembeddedcircuits |