Mangard, Stefan
Power Analysis Attacks
1. Introduction
2. Cryptographic Devices
3. Power Consumption
4. Statistical Characteristics of Power Traces
5. Simple Power Analysis
6. Differential Power Analysis
7. Hiding
8. Attacks on Hiding
9. Masking
10. Attacks on Masking
11. Conclusions
Keywords: Computer Science, Systems and Data Security, Data Encryption, Data Structures, Cryptology and Information Theory, Computer Communication Networks, Electronic and Computer Engineering, Electronics and Microelectronics, Instrumentation
- Author(s)
- Mangard, Stefan
- Oswald, Elisabeth
- Popp, Thomas
- Publisher
- Springer
- Publication year
- 2007
- Language
- en
- Edition
- 1
- Page amount
- 360 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9780387381626