SFr. 142.00
€ 153.36
BTC 0.0024
LTC 1.899
ETH 0.0484


bestellen

Artikel-Nr. 2754146


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:


Herausgeber: 
  • Willi Meier
  • Bimal Kumar Roy
  • Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 3 Artikel!


    Übersicht

    Auf mobile öffnen
     
    Lieferstatus:   Auf Bestellung (Lieferzeit unbekannt)
    Veröffentlichung:  Juni 2004  
    Genre:  EDV / Informatik 
     
    Algorithm Analysis and Problem Complexity / Algorithms / Algorithms & data structures / C / Coding and Information Theory / Coding theory / Coding theory & cryptology / computer science / Computer science—Mathematics / Cryptology / Data encryption / Data encryption (Computer science) / Discrete Mathematics / Discrete Mathematics in Computer Science / Information theory / Maths for computer scientists
    ISBN:  9783540221715 
    EAN-Code: 
    9783540221715 
    Verlag:  Springer Nature EN 
    Einband:  Kartoniert  
    Sprache:  English  
    Serie:  #3017 - Lecture Notes in Computer Science  
    Dimensionen:  H 235 mm / B 155 mm / D  
    Gewicht:  1540 gr 
    Seiten:  492 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    2.1 Di?erential Power Analysis Di?erential Power Analysis (DPA) was introduced by Kocher, Ja?e and Jun in 1998 [13] and published in 1999 [14]. The basic idea is to make use of potential correlations between the data handled by the micro-controller and the electric consumption measured values. Since these correlations are often very low, s- tistical methods must be applied to deduce su?cient information from them. Theprinciple ofDPAattacksconsistsincomparingconsumptionvalues m- suredonthe real physical device (for instance a GSM chip or a smart card)with values computed in an hypothetical model of this device (the hypotheses being made among others on the nature of the implementation, and chie?y on a part of the secret key). By comparing these two sets of values, the attacker tries to recover all or part of the secret key. The initial target of DPA attacks was limited to symmetric algorithms. V- nerability of DES ¿ ?rst shown by Kocher, Ja?e and Jun [13, 14]¿wasfurther studied by Goubin and Patarin [11, 12], Messerges, Dabbish, Sloan [16]and Akkar, B¿ evan, Dischamp, Moyart [2]. Applications of these attacks were also largely taken into account during the AES selection process, notably by Biham, Shamir [4], Chari, Jutla, Rao, Rohatgi [5] and Daemen, Rijmen [8].

      
     Empfehlungen... 
     Fast Software Encryption: 14th International Works - (Buch)
     Fast Software Encryption: 23rd International Confe - (Buch)
     Fast Software Encryption: 10th International Works - (Buch)
     Fast Software Encryption: 4th International Worksh - (Buch)
     Fast Software Encryption: 12th International Works - (Buch)
     Fast Software Encryption: 9th International Worksh - (Buch)
     Fast Software Encryption: 6th International Worksh - (Buch)
     Fast Software Encryption: 22nd International Works - (Buch)
     Fast Software Encryption: Cambridge Security Works - (Buch)
     Fast Software Encryption: 5th International Worksh - (Buch)
     Weitersuchen in   DVD/FILME   CDS   GAMES   BÜCHERN   



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Datenschutzerklärung | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2024
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2024