Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Side-channel analysis of embedded sy...
~
Guilley, Sylvain.
Side-channel analysis of embedded systemsan efficient algorithmic approach /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Side-channel analysis of embedded systemsby Maamar Ouladj, Sylvain Guilley.
Reminder of title:
an efficient algorithmic approach /
Author:
Ouladj, Maamar.
other author:
Guilley, Sylvain.
Published:
Cham :Springer International Publishing :2021.
Description:
x, 153 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Embedded computer systemsMathematics.
Online resource:
https://doi.org/10.1007/978-3-030-77222-2
ISBN:
9783030772222$q(electronic bk.)
Side-channel analysis of embedded systemsan efficient algorithmic approach /
Ouladj, Maamar.
Side-channel analysis of embedded systems
an efficient algorithmic approach /[electronic resource] :by Maamar Ouladj, Sylvain Guilley. - Cham :Springer International Publishing :2021. - x, 153 p. :ill., digital ;24 cm.
Foundations of Side-Channel Analysis -- Side-Channel Distinguishers -- SCA Countermeasures -- Chosen Message Strategy to Improve SCA -- Generalized Spectral Approach to Speed up the Correlation Power Analysis -- Coalescence-Based Side-Channel Attacks and the Spectral Approach.
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This useful textbook/guide tackles the analysis part, especially under situations where the targeted device is protected by random masking. The book advances in the field and provides the reader with mathematical formalizations. Furthermore, it presents all known analyses within the same notation framework, thereby allowing the reader to rapidly understand and learn contrasting approaches. The examples presented are taken from real-world datasets. This unique text/reference will be useful as a higher-level introduction to the topic, as well as for self-study by researchers and professionals needing a concise guidebook. Maamar Ouladj is an expert in embedded systems security, currently working in Algiers, Algeria. Sylvain Guilley is general manager and chief technical officer at Secure-IC S.A.S., currently working in Paris, France.
ISBN: 9783030772222$q(electronic bk.)
Standard No.: 10.1007/978-3-030-77222-2doiSubjects--Topical Terms:
901363
Embedded computer systems
--Mathematics.
LC Class. No.: TK7895.E42 / O85 2021
Dewey Class. No.: 006.22
Side-channel analysis of embedded systemsan efficient algorithmic approach /
LDR
:02402nmm a2200337 a 4500
001
605291
003
DE-He213
005
20210728074924.0
006
m d
007
cr nn 008maaau
008
211201s2021 sz s 0 eng d
020
$a
9783030772222$q(electronic bk.)
020
$a
9783030772215$q(paper)
024
7
$a
10.1007/978-3-030-77222-2
$2
doi
035
$a
978-3-030-77222-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7895.E42
$b
O85 2021
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
006.22
$2
23
090
$a
TK7895.E42
$b
O93 2021
100
1
$a
Ouladj, Maamar.
$3
901362
245
1 0
$a
Side-channel analysis of embedded systems
$h
[electronic resource] :
$b
an efficient algorithmic approach /
$c
by Maamar Ouladj, Sylvain Guilley.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
x, 153 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Foundations of Side-Channel Analysis -- Side-Channel Distinguishers -- SCA Countermeasures -- Chosen Message Strategy to Improve SCA -- Generalized Spectral Approach to Speed up the Correlation Power Analysis -- Coalescence-Based Side-Channel Attacks and the Spectral Approach.
520
$a
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This useful textbook/guide tackles the analysis part, especially under situations where the targeted device is protected by random masking. The book advances in the field and provides the reader with mathematical formalizations. Furthermore, it presents all known analyses within the same notation framework, thereby allowing the reader to rapidly understand and learn contrasting approaches. The examples presented are taken from real-world datasets. This unique text/reference will be useful as a higher-level introduction to the topic, as well as for self-study by researchers and professionals needing a concise guidebook. Maamar Ouladj is an expert in embedded systems security, currently working in Algiers, Algeria. Sylvain Guilley is general manager and chief technical officer at Secure-IC S.A.S., currently working in Paris, France.
650
0
$a
Embedded computer systems
$x
Mathematics.
$3
901363
650
1 4
$a
Cryptology.
$3
825728
650
2 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Communications Engineering, Networks.
$3
273745
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Data Engineering.
$3
839346
700
1
$a
Guilley, Sylvain.
$3
775357
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-77222-2
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000203338
電子館藏
1圖書
電子書
EB TK7895.E42 O93 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-77222-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login