Please use this identifier to cite or link to this item: https://lib.hpu.edu.vn/handle/123456789/21365
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPeeters, Ericen_US
dc.date.accessioned2016-06-13T03:07:06Z
dc.date.available2016-06-13T03:07:06Z
dc.date.issued2013en_US
dc.identifier.isbn978-1-4614-6782-3en_US
dc.identifier.isbn978-1-4614-6783-0en_US
dc.identifier.otherHPU2160054en_US
dc.identifier.urihttps://lib.hpu.edu.vn/handle/123456789/21365-
dc.description.abstractAdvanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.en_US
dc.format.extent145 p.en_US
dc.format.mimetypeapplication/pdf-
dc.language.isoenen_US
dc.publisherSpringer-Verlag New Yorken_US
dc.subjectDPAen_US
dc.subjectEmbedded circuitsen_US
dc.subjectElectromagneticen_US
dc.subjectEmbedded systemsen_US
dc.titleAdvanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuitsen_US
dc.typeBooken_US
dc.size8.92 MBen_US
dc.departmentEnglish resourcesen_US
Appears in Collections:Technology

Files in This Item:
File Description SizeFormat 
54_Advanced_DPA_Theory_and_Practice.pdf
  Restricted Access
9.14 MBAdobe PDFThumbnail
View/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.