找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Why Cryptography Should Not Rely on Physical Attack Complexity; Juliane Kr?mer Book 2015 Springer Science+Business Media Singapore 2015 As

[復(fù)制鏈接]
查看: 17002|回復(fù): 34
樓主
發(fā)表于 2025-3-21 18:33:04 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity
編輯Juliane Kr?mer
視頻videohttp://file.papertrans.cn/1029/1028119/1028119.mp4
概述Presents two practical physical attacks, the complexity of which has been overestimated and the implied security threats of which have been underestimated.Demonstrates that the assessment of physical
叢書名稱T-Labs Series in Telecommunication Services
圖書封面Titlebook: Why Cryptography Should Not Rely on Physical Attack Complexity;  Juliane Kr?mer Book 2015 Springer Science+Business Media Singapore 2015 As
描述.This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. .First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either..Based on these two attacks, the book demonstrates that the assessment of physica
出版日期Book 2015
關(guān)鍵詞Asymmetric cryptographic algorithms; DPEA; Higher-order fault attacks; Pairing computations; Pairing-bas
版次1
doihttps://doi.org/10.1007/978-981-287-787-1
isbn_softcover978-981-10-1299-0
isbn_ebook978-981-287-787-1Series ISSN 2192-2810 Series E-ISSN 2192-2829
issn_series 2192-2810
copyrightSpringer Science+Business Media Singapore 2015
The information of publication is updating

書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity影響因子(影響力)




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity影響因子(影響力)學(xué)科排名




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity網(wǎng)絡(luò)公開度




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity被引頻次




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity被引頻次學(xué)科排名




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity年度引用




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity年度引用學(xué)科排名




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity讀者反饋




書目名稱Why Cryptography Should Not Rely on Physical Attack Complexity讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 20:56:51 | 只看該作者
Why Cryptography Should Not Rely on Physical Attack Complexity978-981-287-787-1Series ISSN 2192-2810 Series E-ISSN 2192-2829
板凳
發(fā)表于 2025-3-22 01:11:52 | 只看該作者
T-Labs Series in Telecommunication Serviceshttp://image.papertrans.cn/w/image/1028119.jpg
地板
發(fā)表于 2025-3-22 07:17:28 | 只看該作者
5#
發(fā)表于 2025-3-22 10:46:27 | 只看該作者
6#
發(fā)表于 2025-3-22 14:20:31 | 只看該作者
7#
發(fā)表于 2025-3-22 21:02:05 | 只看該作者
Book 2015algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally no
8#
發(fā)表于 2025-3-22 23:57:15 | 只看該作者
9#
發(fā)表于 2025-3-23 05:00:42 | 只看該作者
10#
發(fā)表于 2025-3-23 06:21:50 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-6 07:31
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
缙云县| 吉木乃县| 衡水市| 稻城县| 开江县| 军事| 韶关市| 合作市| 泊头市| 通化县| 台东县| 顺义区| 江达县| 尼勒克县| 永仁县| 华蓥市| 苏尼特左旗| 梓潼县| 拉孜县| 濮阳市| 长乐市| 康乐县| 开鲁县| 耒阳市| 黔西| 东乌珠穆沁旗| 五河县| 府谷县| 依安县| 美姑县| 潞西市| 玛纳斯县| 宁晋县| 固镇县| 邳州市| 六安市| 卫辉市| 海丰县| 津南区| 六枝特区| 合水县|