×







We sell 100% Genuine & New Books only!

Power Analysis Attacks Revealing the Secrets of Smart Cards at Meripustak

Power Analysis Attacks Revealing the Secrets of Smart Cards by Stefan Mangard, Elisabeth Oswald, Thomas Popp , Springer

Books from same Author: Stefan Mangard, Elisabeth Oswald, Thomas Popp

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Price: ₹ 30250.00/- [ 7.00% off ]

    Seller Price: ₹ 28132.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Stefan Mangard, Elisabeth Oswald, Thomas Popp
    PublisherSpringer
    ISBN9780387308579
    Pages338
    BindingHardback
    LanguageEnglish
    Publish YearMarch 2007

    Description

    Springer Power Analysis Attacks Revealing the Secrets of Smart Cards by Stefan Mangard, Elisabeth Oswald, Thomas Popp

    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance._x000D__x000D__x000D__x000D__x000D__x000D_Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, the authors provide an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles. By analyzing the pros and cons of the different countermeasures, this volume allows practitioners to decide how to protect smart cards._x000D_ Table of contents : - _x000D_ Cryptographic Devices.- Power Consumption.- Statistical Characteristics of Power Traces.- Simple Power Analysis.- Differential Power Analysis.- Hiding.- Attacks on Hiding.- Masking.- Attacks on Masking.- Conclusions._x000D_



    Book Successfully Added To Your Cart