Logo - springer
Slogan - springer

Engineering - Electronics & Electrical Engineering | Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits

Advanced DPA Theory and Practice

Towards the Security Limits of Secure Embedded Circuits

Peeters, Eric

2013, XVI, 139 p. 70 illus., 20 illus. in color.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$89.95

(net) price for USA

ISBN 978-1-4614-6783-0

digitally watermarked, no DRM

Included Format: PDF and EPUB

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$119.00

(net) price for USA

ISBN 978-1-4614-6782-3

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • Discusses practical aspects of side-channel attacks on secure embedded device
  • Examines different possible statistical classification tools
  • Covers a theoretical framework that allows one to characterize both the leakage function and the adversary’s strength
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Content Level » Research

Keywords » Electromagnetic Attack - Embedded Processing Security - High-Order Attack - Leakage Model - Mutual Information - Power Attack - Side-channel Analysis - Smart Card Security - Success Rate and Measurement Setup - Template Attack

Related subjects » Circuits & Systems - Electronics & Electrical Engineering - Security and Cryptology

Table of contents / Preface / Sample pages 

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Electronics and Microelectronics, Instrumentation.