소장자료

>>
소장자료
>
000 nam5i
001 2210080935170
003 DE-He213
005 20250321105504
007 cr nn 008mamaa
008 241026s2025 sz | s |||| 0|eng d
020 a97830316439969978-3-031-64399-6
024 a10.1007/978-3-031-64399-62doi
040 a221008
050 aQA268
072 aGPJ2bicssc
072 aURY2bicssc
072 aCOM0830002bisacsh
072 aGPJ2thema
072 aURY2thema
082 a005.824223
100 aCheng, Wei.eauthor.4aut4http://id.loc.gov/vocabulary/relators/aut
245 00 aMathematical Foundations for Side-Channel Analysis of Cryptographic Systemsh[electronic resource] /cby Wei Cheng, Sylvain Guilley, Olivier Rioul.
250 a1st ed. 2025.
264 aCham :bSpringer Nature Switzerland :bImprint: Springer,c2025.
300 aX, 411 p. 90 illus.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
505 aChapter 1 Introduction -- Chapter 2 Basics and Preliminaries -- part 1 attacks -- Chapter 3 Attacks on Unprotected Devices -- Chapter 4 Attacks on Protected Devices -- part-II Evalautaion -- Chapter 5 Information-Theoretic Evaluation -- Chapter 6 Coding-Theoretic Formalization and Evaluation -- Chapter 7 Information Theoretic Bounds on the Evaluation of Attacks.
520 aThis book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography. It exploits the best mathematical tools for quantifying information leakage and characterizing leakage-based attacks. The two possible approaches are described in detail. This includes the optimal attack strategy that can be derived (in specific contexts) or generic bounds regarding data complexity that can be computed. The tone of this book is essentially mathematical. It aims to establish formal foundations for techniques that are otherwise used as engineering recipes in industrial laboratories or empirical intuitions for deriving security levels from practical implementations. It is a systematization of knowledge and a compilation of relevant tools relating to the practice of side-channel analysis on embedded systems. This book provides an up-to-date and improved analysis and understanding of embedded devices that conceal secrets that can be extracted by an attacker. Typical attacks involve measuring the device's power consumption or radiated electromagnetic field. As a source of noisy information, this correlates it with secrets and enabling these secrets to be retrieved. The attacker in some cases, can purchase a blank device from the same series and learn about its leakage, particularly how it relates to the secrets. This book also covers how such information can enhance hardware attacks deployed on another device. Researchers and engineers working in the field of side-channel security for embedded systems and related countermeasures as well as hardware and software engineers focused on implementing cryptographic functionalities will want to purchase this book as a reference. Advanced-level students majoring in computer science and electrical engineering will find this book valuable as a secondary textbook.
650 aCryptography.
650 aData encryption (Computer science).
650 aComputer security.
650 aCoding theory.
650 aInformation theory.
650 aCryptology.
650 aPrinciples and Models of Security.
650 aCoding and Information Theory.
700 aGuilley, Sylvain.eauthor.4aut4http://id.loc.gov/vocabulary/relators/aut
700 aRioul, Olivier.eauthor.4aut4http://id.loc.gov/vocabulary/relators/aut
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9783031643989
776 iPrinted edition:z9783031644009
776 iPrinted edition:z9783031644016
856 uhttps://doi.org/10.1007/978-3-031-64399-6
912 aZDB-2-SCS
912 aZDB-2-SXCS
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems[electronic resource] /by Wei Cheng, Sylvain Guilley, Olivier Rioul
종류
전자책
서명
Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems[electronic resource] /by Wei Cheng, Sylvain Guilley, Olivier Rioul
저자명
판 사항
1st ed. 2025.
형태사항
X, 411 p 90 illus online resource.
주기사항
This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography. It exploits the best mathematical tools for quantifying information leakage and characterizing leakage-based attacks. The two possible approaches are described in detail. This includes the optimal attack strategy that can be derived (in specific contexts) or generic bounds regarding data complexity that can be computed. The tone of this book is essentially mathematical. It aims to establish formal foundations for techniques that are otherwise used as engineering recipes in industrial laboratories or empirical intuitions for deriving security levels from practical implementations. It is a systematization of knowledge and a compilation of relevant tools relating to the practice of side-channel analysis on embedded systems. This book provides an up-to-date and improved analysis and understanding of embedded devices that conceal secrets that can be extracted by an attacker. Typical attacks involve measuring the device's power consumption or radiated electromagnetic field. As a source of noisy information, this correlates it with secrets and enabling these secrets to be retrieved. The attacker in some cases, can purchase a blank device from the same series and learn about its leakage, particularly how it relates to the secrets. This book also covers how such information can enhance hardware attacks deployed on another device. Researchers and engineers working in the field of side-channel security for embedded systems and related countermeasures as well as hardware and software engineers focused on implementing cryptographic functionalities will want to purchase this book as a reference. Advanced-level students majoring in computer science and electrical engineering will find this book valuable as a secondary textbook.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기