Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Mathematical foundations for side-ch...
~
Cheng, Wei.
Linked to FindBook
Google Book
Amazon
博客來
Mathematical foundations for side-channel analysis of cryptographic systems
Record Type:
Electronic resources : Monograph/item
Title/Author:
Mathematical foundations for side-channel analysis of cryptographic systems/ by Wei Cheng, Sylvain Guilley, Olivier Rioul.
Author:
Cheng, Wei.
other author:
Guilley, Sylvain.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
x, 411 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1 Introduction -- Chapter 2 Basics and Preliminaries -- part 1 attacks -- Chapter 3 Attacks on Unprotected Devices -- Chapter 4 Attacks on Protected Devices -- part-II Evalautaion -- Chapter 5 Information-Theoretic Evaluation -- Chapter 6 Coding-Theoretic Formalization and Evaluation -- Chapter 7 Information Theoretic Bounds on the Evaluation of Attacks.
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science) -
Online resource:
https://doi.org/10.1007/978-3-031-64399-6
ISBN:
9783031643996
Mathematical foundations for side-channel analysis of cryptographic systems
Cheng, Wei.
Mathematical foundations for side-channel analysis of cryptographic systems
[electronic resource] /by Wei Cheng, Sylvain Guilley, Olivier Rioul. - Cham :Springer Nature Switzerland :2025. - x, 411 p. :ill., digital ;24 cm.
Chapter 1 Introduction -- Chapter 2 Basics and Preliminaries -- part 1 attacks -- Chapter 3 Attacks on Unprotected Devices -- Chapter 4 Attacks on Protected Devices -- part-II Evalautaion -- Chapter 5 Information-Theoretic Evaluation -- Chapter 6 Coding-Theoretic Formalization and Evaluation -- Chapter 7 Information Theoretic Bounds on the Evaluation of Attacks.
This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography. It exploits the best mathematical tools for quantifying information leakage and characterizing leakage-based attacks. The two possible approaches are described in detail. This includes the optimal attack strategy that can be derived (in specific contexts) or generic bounds regarding data complexity that can be computed. The tone of this book is essentially mathematical. It aims to establish formal foundations for techniques that are otherwise used as engineering recipes in industrial laboratories or empirical intuitions for deriving security levels from practical implementations. It is a systematization of knowledge and a compilation of relevant tools relating to the practice of side-channel analysis on embedded systems. This book provides an up-to-date and improved analysis and understanding of embedded devices that conceal secrets that can be extracted by an attacker. Typical attacks involve measuring the device's power consumption or radiated electromagnetic field. As a source of noisy information, this correlates it with secrets and enabling these secrets to be retrieved. The attacker in some cases, can purchase a blank device from the same series and learn about its leakage, particularly how it relates to the secrets. This book also covers how such information can enhance hardware attacks deployed on another device. Researchers and engineers working in the field of side-channel security for embedded systems and related countermeasures as well as hardware and software engineers focused on implementing cryptographic functionalities will want to purchase this book as a reference. Advanced-level students majoring in computer science and electrical engineering will find this book valuable as a secondary textbook.
ISBN: 9783031643996
Standard No.: 10.1007/978-3-031-64399-6doiSubjects--Topical Terms:
579162
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.824
Mathematical foundations for side-channel analysis of cryptographic systems
LDR
:03349nmm a2200349 a 4500
001
2407724
003
DE-He213
005
20241026125743.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031643996
$q
(electronic bk.)
020
$a
9783031643989
$q
(paper)
024
7
$a
10.1007/978-3-031-64399-6
$2
doi
035
$a
978-3-031-64399-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM083000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
C518 2025
100
1
$a
Cheng, Wei.
$3
1684497
245
1 0
$a
Mathematical foundations for side-channel analysis of cryptographic systems
$h
[electronic resource] /
$c
by Wei Cheng, Sylvain Guilley, Olivier Rioul.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
x, 411 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1 Introduction -- Chapter 2 Basics and Preliminaries -- part 1 attacks -- Chapter 3 Attacks on Unprotected Devices -- Chapter 4 Attacks on Protected Devices -- part-II Evalautaion -- Chapter 5 Information-Theoretic Evaluation -- Chapter 6 Coding-Theoretic Formalization and Evaluation -- Chapter 7 Information Theoretic Bounds on the Evaluation of Attacks.
520
$a
This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography. It exploits the best mathematical tools for quantifying information leakage and characterizing leakage-based attacks. The two possible approaches are described in detail. This includes the optimal attack strategy that can be derived (in specific contexts) or generic bounds regarding data complexity that can be computed. The tone of this book is essentially mathematical. It aims to establish formal foundations for techniques that are otherwise used as engineering recipes in industrial laboratories or empirical intuitions for deriving security levels from practical implementations. It is a systematization of knowledge and a compilation of relevant tools relating to the practice of side-channel analysis on embedded systems. This book provides an up-to-date and improved analysis and understanding of embedded devices that conceal secrets that can be extracted by an attacker. Typical attacks involve measuring the device's power consumption or radiated electromagnetic field. As a source of noisy information, this correlates it with secrets and enabling these secrets to be retrieved. The attacker in some cases, can purchase a blank device from the same series and learn about its leakage, particularly how it relates to the secrets. This book also covers how such information can enhance hardware attacks deployed on another device. Researchers and engineers working in the field of side-channel security for embedded systems and related countermeasures as well as hardware and software engineers focused on implementing cryptographic functionalities will want to purchase this book as a reference. Advanced-level students majoring in computer science and electrical engineering will find this book valuable as a secondary textbook.
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Cryptography.
$3
532586
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Principles and Models of Security.
$3
3382356
650
2 4
$a
Coding and Information Theory.
$3
891252
700
1
$a
Guilley, Sylvain.
$3
3226661
700
1
$a
Rioul, Olivier.
$3
3779735
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-64399-6
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9513222
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login