Why Cryptography Should Not Rely on Physical Attack Complexity

Available
0
StarStarStarStarStar
0Reviews

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfull...

Read more
E-book
pdf
Price
89.50 £

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfull...

Read more
Follow the Author

Options

  • Formats: pdf
  • ISBN: 9789812877871
  • Publication Date: 5 Sept 2015
  • Publisher: Springer Nature Singapore
  • Drm Setting: DRM