Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Why Cryptography Should Not Rely on Physical Attack Complexity

Best Price (Coupon Required):
Buy Why Cryptography Should Not Rely on Physical Attack Complexity for $76.50 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $84.99 - $84.99
BEST PRICE

Single Product Purchase

$76.50
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$84.99 $84.99

10% OFF
This deals requires coupon
$76.50
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9789812877864
Condition
New
Product Description

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Borders and Mobility in Turkey

Borders and Mobility in Turkey

$59.99
Scanning Tunneling Microscopy II

Scanning Tunneling Microscopy II

$54.99
The Global Trump

The Global Trump

$89.00
Variety in Coordination Modes of Ligands in Metal Complexes

Variety in Coordination Modes of Ligands in Metal Complexes

$39.99
Cellular Automata Transforms

Cellular Automata Transforms

$169.99
Gynecologic Oncology

Gynecologic Oncology

$329.99
Successful Career Strategy

Successful Career Strategy

$44.99
This Poison Heart

This Poison Heart

$8.24
Advances in Bioethanol

Advances in Bioethanol

$54.99
The Quantum-Like Revolution

The Quantum-Like Revolution

$139.99
Capital Requirements, Disclosure, and Supervision in the European Insurance Industry

Capital Requirements, Disclosure, and Supervision in the European Insurance Industry

$54.99
Computer Engineering and Technology

Computer Engineering and Technology

$54.99
Handbuch Filmgenre

Handbuch Filmgenre

$159.99
Narrow Gap Semiconductors 2007

Narrow Gap Semiconductors 2007

$169.99
Lungenkarzinom

Lungenkarzinom

$59.99
Phanerozoic Stromatolites II

Phanerozoic Stromatolites II

$39.99
Greek Banking

Greek Banking

$39.99
National Geographic Kids Readers: Weird Sea Creatures

National Geographic Kids Readers: Weird Sea Creatures

$3.71
Highlights of Nitrogen Fixation Research

Highlights of Nitrogen Fixation Research

$169.99
Foundations of Augmented Cognition: Neuroergonomics and Operational Neuroscience

Foundations of Augmented Cognition: Neuroergonomics and Operational Neuroscience

$54.99
Cultural Dimensions of Indias Look-Act East Policy

Cultural Dimensions of Indias Look-Act East Policy

$139.99
The Soils of Greece

The Soils of Greece

$129.99
An Introduction to Mssbauer Spectroscopy

An Introduction to Mssbauer Spectroscopy

$39.99
Automated Deduction  CADE 29

Automated Deduction CADE 29

$49.99
Thyroid Eye Disease

Thyroid Eye Disease

$84.99
Keith Lehrer

Keith Lehrer

$109.99
Das Forschungsprojekt

Das Forschungsprojekt

$29.99
Fear, Weakness and Power in the Post-Soviet South Caucasus

Fear, Weakness and Power in the Post-Soviet South Caucasus

$54.99
Computermathematik

Computermathematik

$49.99
Capital Markets and Investment Decision Making

Capital Markets and Investment Decision Making

$139.99
Autocracy

Autocracy

$109.99
The Art Treasure Hunt: I Spy with My Little Eye

The Art Treasure Hunt: I Spy with My Little Eye

$18.05
Automation of Cytogenetics

Automation of Cytogenetics

$109.99
Gastric Cancer

Gastric Cancer

$109.99
Food and Livelihood Securities in Changing Climate of the Himalaya

Food and Livelihood Securities in Changing Climate of the Himalaya

$109.00
Abwassertechnologie

Abwassertechnologie

$54.99
Schistosomiasis

Schistosomiasis

$169.99
Surface Geochemistry in Petroleum Exploration

Surface Geochemistry in Petroleum Exploration

$249.99
Guide to Assembly Language Programming in Linux

Guide to Assembly Language Programming in Linux

$159.99
Kommunikative Fhrungsethik

Kommunikative Fhrungsethik

$44.99
previous
next