Skip to main content

Power Analysis Attacks

Revealing the Secrets of Smart Cards

  • Book
  • © 2007

Overview

  • The first comprehensive discussion of power analysis attacks on smart cards
  • Examples and case studies illustrate the various attacks, from simple to differential power-analysis attacks
  • Detailed descriptions and comparisons of the effectiveness of different countermeasures
  • Includes background information on VLSI design, cryptography and statistics

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (11 chapters)

Keywords

About this book

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, the authors provide an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles.  By analyzing the pros and cons of the different countermeasures, this volume allows practitioners to decide how to protect smart cards.

Authors and Affiliations

  • Institute for Applied Information Processing & Communications, Graz University of Technology, Graz, Austria

    Stefan Mangard, Elisabeth Oswald, Thomas Popp

Bibliographic Information

Publish with us