Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Why Cryptography Should Not Rely on Physical Attack Complexity

Best Price (Coupon Required):
Buy Why Cryptography Should Not Rely on Physical Attack Complexity for $76.50 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $84.99 - $84.99
BEST PRICE

Single Product Purchase

$76.50
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$84.99 $84.99

10% OFF
This deals requires coupon
$76.50
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9789812877864
Condition
New
Product Description

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Non-Fourier Heat Conduction

Non-Fourier Heat Conduction

$129.00
Routing and Quality-of-Service in Broadband LEO Satellite Networks

Routing and Quality-of-Service in Broadband LEO Satellite Networks

$129.00
SAP S/4HANA Financial Accounting Configuration

SAP S/4HANA Financial Accounting Configuration

$64.99
Die Krankheiten des Auges

Die Krankheiten des Auges

$59.99
Understanding Doulas and Childbirth

Understanding Doulas and Childbirth

$19.99
Social Exclusion

Social Exclusion

$84.99
Interkosmos

Interkosmos

$49.99
Handbook of Face Recognition

Handbook of Face Recognition

$84.99
Planning London for the Post-War Era 1945-1960

Planning London for the Post-War Era 1945-1960

$109.99
Let's-Read-and-Find-Out Science: What's It Like to Be a Fish?

Let's-Read-and-Find-Out Science: What's It Like to Be a Fish?

$6.71
Rechtsextremismus und Fremdenfeindlichkeit

Rechtsextremismus und Fremdenfeindlichkeit

$44.99
The Globalization of Multinational Enterprise Activity and Economic Development

The Globalization of Multinational Enterprise Activity and Economic Development

$109.99
Essential Java for AP CompSci

Essential Java for AP CompSci

$54.99
Mistake of Law

Mistake of Law

$54.99
Commutative Algebra: Constructive Methods

Commutative Algebra: Constructive Methods

$219.99
Explicit Nonlinear Model Predictive Control

Explicit Nonlinear Model Predictive Control

$109.99
Maple V

Maple V

$54.99
Masterkurs Parallele und Verteilte Systeme

Masterkurs Parallele und Verteilte Systeme

$44.99
Qualitt im Theater

Qualitt im Theater

$59.99
Risk Assessment Methods

Risk Assessment Methods

$169.99
Diverse Leaders and Heroes Grades 3-5

Diverse Leaders and Heroes Grades 3-5

$79.00
Mobility of Health Professionals

Mobility of Health Professionals

$54.99
Quantum Many-Body Physics

Quantum Many-Body Physics

$64.99
Chasing Masculinity

Chasing Masculinity

$32.99
English for Writing Research Papers

English for Writing Research Papers

$37.99
Semirings, Automata, Languages

Semirings, Automata, Languages

$109.99
Geldanlage und Steuer 2002

Geldanlage und Steuer 2002

$49.99
Whole Person Care

Whole Person Care

$64.99
Enabling Mobile Networks

Enabling Mobile Networks

$109.00
Lucas I Love You All Ways by Marianne Richmond

Lucas I Love You All Ways by Marianne Richmond

$8.99
The Practice of NMR Spectroscopy

The Practice of NMR Spectroscopy

$54.99
GIS Processing of Geocoded Satellite Data

GIS Processing of Geocoded Satellite Data

$169.99
Supply Chain Management

Supply Chain Management

$44.99
Biofuel Production Using Anaerobic Digestion

Biofuel Production Using Anaerobic Digestion

$89.99
Pro JavaScript RIA Techniques

Pro JavaScript RIA Techniques

$44.99
Schule und digitale Kommunikationskultur

Schule und digitale Kommunikationskultur

$84.99
Computer Vision  ECCV 2024

Computer Vision ECCV 2024

$64.99
Lagerhaltung und Konjunkturverlauf in der Textilwirtschaft

Lagerhaltung und Konjunkturverlauf in der Textilwirtschaft

$59.99
Ellipsometry of Functional Organic Surfaces and Films

Ellipsometry of Functional Organic Surfaces and Films

$179.99
Computer und menschliches Verhalten

Computer und menschliches Verhalten

$49.99
previous
next