EUR 116,44
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : New.
Edité par Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2014
ISBN 10 : 3642436773 ISBN 13 : 9783642436772
Langue: anglais
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
EUR 118,79
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 120,88
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. 372.
EUR 126,61
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. 372.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 115,57
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Edité par Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2014
ISBN 10 : 3642436773 ISBN 13 : 9783642436772
Langue: anglais
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
EUR 130,10
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : New. This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments. Editor(s): Joye, Marc; Tunstall, Michael. Series: Information Security and Cryptography. Num Pages: 372 pages, biography. BIC Classification: THR; UK; UMB. Category: (P) Professional & Vocational. Dimension: 235 x 155 x 20. Weight in Grams: 569. . 2014. Paperback. . . . .
Edité par Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2014
ISBN 10 : 3642436773 ISBN 13 : 9783642436772
Langue: anglais
Vendeur : Kennys Bookstore, Olney, MD, Etats-Unis
EUR 161,71
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : New. This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments. Editor(s): Joye, Marc; Tunstall, Michael. Series: Information Security and Cryptography. Num Pages: 372 pages, biography. BIC Classification: THR; UK; UMB. Category: (P) Professional & Vocational. Dimension: 235 x 155 x 20. Weight in Grams: 569. . 2014. Paperback. . . . . Books ship from the US and Ireland.
Edité par Springer Berlin Heidelberg, Springer Berlin Heidelberg Jun 2012, 2012
ISBN 10 : 3642296556 ISBN 13 : 9783642296550
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 106,99
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierBuch. Etat : Neu. Neuware -In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 372 pp. Englisch.
Edité par Springer Berlin Heidelberg, 2014
ISBN 10 : 3642436773 ISBN 13 : 9783642436772
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 106,99
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
Edité par Springer Berlin Heidelberg, 2012
ISBN 10 : 3642296556 ISBN 13 : 9783642296550
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 106,99
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
EUR 162,19
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Like New. Like New. book.
EUR 193,56
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
EUR 171,66
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Like New. Like New. book.
Edité par Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2014
ISBN 10 : 3642436773 ISBN 13 : 9783642436772
Langue: anglais
Vendeur : AussieBookSeller, Truganina, VIC, Australie
EUR 191,29
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Vendeur : Brook Bookstore On Demand, Napoli, NA, Italie
EUR 86,24
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : new. Questo è un articolo print on demand.
Vendeur : Brook Bookstore On Demand, Napoli, NA, Italie
EUR 86,24
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : new. Questo è un articolo print on demand.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 125,65
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. Print on Demand pp. 372 133 Illus. (35 Col.).
Edité par Springer Berlin Heidelberg Jul 2014, 2014
ISBN 10 : 3642436773 ISBN 13 : 9783642436772
Langue: anglais
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 106,99
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering. 372 pp. Englisch.
Edité par Springer Berlin Heidelberg Jun 2012, 2012
ISBN 10 : 3642296556 ISBN 13 : 9783642296550
Langue: anglais
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 106,99
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierBuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering. 372 pp. Englisch.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 131,69
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. Print on Demand pp. 372.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 126,96
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. PRINT ON DEMAND pp. 372.
Edité par Springer Berlin Heidelberg, 2014
ISBN 10 : 3642436773 ISBN 13 : 9783642436772
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 92,27
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. First comprehensive treatment of this topic covering theory, practice and countermeasuresWill help establish fault defence as standard practiceAuthors are among the leading academic and industrial researchers in this fieldDr. Marc J.
Edité par Springer Berlin Heidelberg, 2012
ISBN 10 : 3642296556 ISBN 13 : 9783642296550
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 92,27
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierGebunden. Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. First comprehensive treatment of this topic covering theory, practice and countermeasuresWill help establish fault defence as standard practiceAuthors are among the leading academic and industrial researchers in this fieldDr. Marc J.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 133,90
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. PRINT ON DEMAND pp. 372.
Edité par Springer Berlin Heidelberg, Springer Berlin Heidelberg Jul 2014, 2014
ISBN 10 : 3642436773 ISBN 13 : 9783642436772
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 106,99
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks.Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board.This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 372 pp. Englisch.