02614nam 2200517Ia 450 991043805150332120200520144314.01-4614-6783-710.1007/978-1-4614-6783-0(OCoLC)836717514(MiFhGG)GVRL6VFC(CKB)2550000001043723(MiAaPQ)EBC1205354(EXLCZ)99255000000104372320130408d2013 uy 0engurun|---uuuuatxtccrAdvanced DPA theory and practice towards the security limits of secure embedded circuits /Eric Peeters1st ed. 2013.New York, NY Springerc20131 online resource (xvi, 139 pages) illustrations (some color)Gale eBooksDescription based upon print version of record.1-4939-0070-6 1-4614-6782-9 Includes bibliographical references and index.General Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources and models of emanation -- Measurement of the power consumption -- Electromagnetic Leakage -- Statistical Tools -- Higher Order Attacks -- Towards the Evaluation of an Implementation against Side-Channel Attacks -- General Conclusion and Possible Further Directions.Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.Embedded computer systemsSecurity measuresData encryption (Computer science)CryptographyEmbedded computer systemsSecurity measures.Data encryption (Computer science)Cryptography.005.8Peeters Eric1057764MiAaPQMiAaPQMiAaPQBOOK9910438051503321Advanced DPA Theory and Practice2494435UNINA