Fault Tolerant Architectures for Cryptography and Hardware Security

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fa...

Celý popis

Uložené v:
Podrobná bibliografia
Médium: Elektronický zdroj E-kniha
Jazyk:English
Vydavateľské údaje: Singapore : Springer Singapore , 2018.
Vydanie:1st ed. 2018.
Edícia:Computer Architecture and Design Methodologies,
Predmet:
ISBN:9789811013874
ISSN:2367-3478
On-line prístup: Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!

MARC

LEADER 00000nam a22000005i 4500
003 SK-BrCVT
005 20220618115858.0
007 cr nn 008mamaa
008 180329s2018 si | s |||| 0|eng d
020 |a 9789811013874 
024 7 |a 10.1007/978-981-10-1387-4  |2 doi 
035 |a CVTIDW09280 
040 |a Springer-Nature  |b eng  |c CVTISR  |e AACR2 
041 |a eng 
245 1 0 |a Fault Tolerant Architectures for Cryptography and Hardware Security  |h [electronic resource] /  |c edited by SIKHAR PATRANABIS, Debdeep Mukhopadhyay. 
250 |a 1st ed. 2018. 
260 1 |a Singapore :  |b Springer Singapore ,  |c 2018. 
300 |a XII, 240 p. 75 illus., 39 illus. in color.  |b online resource. 
490 1 |a Computer Architecture and Design Methodologies,  |x 2367-3478 
500 |a Engineering  
505 0 |a Introduction to Fault Analysis -- Classical Fault Analysis -- Recent Trends and Advances in Fault Analysis -- Automation of Fault Analysis -- Countermeasures and Fault Tolerant Architectures -- Practical Perspectives of Fault Tolerant Design. 
516 |a text file PDF 
520 |a This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results. 
650 0 |a Electronic circuits. 
650 0 |a Data encryption (Computer science). 
650 0 |a System safety. 
856 4 0 |u http://hanproxy.cvtisr.sk/han/cvti-ebook-springer-eisbn-978-981-10-1387-4  |y Vzdialený prístup pre registrovaných používateľov 
910 |b ZE06560 
919 |a 978-981-10-1387-4 
974 |a andrea.lebedova  |f Elektronické zdroje 
992 |a SUD 
999 |c 274032  |d 274032