• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

This product is currently not available for purchase.

RELATED PRODUCTS

SECURE HARDWARE DESIGN. Edition No. 1 - Product Image

SECURE HARDWARE DESIGN. Edition No. 1

  • ID: 1897930
  • April 2010
  • 152 Pages
  • VDM Publishing House

The services and security benefits provided by cryptographic algorithms are indispensable for modern electronic infrastructure. To provide benefit to a larger system, however, the algorithms themselves must be implemented securely. Devices implementing cryptographic algorithms can leak secret information to any observer through side channels limiting their security. Powerful attacks have been developed with conscientiously exploit the side information to completely compromise the security of an implementation within minutes. This thesis investigates the sources of vulnerabilities and proposed counter measures against attacks which use power consumption and behavior in the presence of faults of a device as the target for an attack. The proposed counter measures for the power and fault attacks are based on the non linear error-detecting codes known as robust codes and a synchronous gate level circuit structures.

Roberto, Paul.
Roberto Paul, B.S, M.S.: Doctorate in Philosophy from Universidade of Rio De Janeiro.

Note: Product cover images may vary from those shown

Our Clients

Our clients' logos