• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

This product is currently not available for purchase.



  • ID: 1897930
  • April 2010
  • 152 Pages
  • VDM Publishing House

The services and security benefits provided by cryptographic algorithms are indispensable for modern electronic infrastructure. To provide benefit to a larger system, however, the algorithms themselves must be implemented securely. Devices implementing cryptographic algorithms can leak secret information to any observer through side channels limiting their security. Powerful attacks have been developed with conscientiously exploit the side information to completely compromise the security of an implementation within minutes. This thesis investigates the sources of vulnerabilities and proposed counter measures against attacks which use power consumption and behavior in the presence of faults of a device as the target for an attack. The proposed counter measures for the power and fault attacks are based on the non linear error-detecting codes known as robust codes and a synchronous gate level circuit structures.

Note: Product cover images may vary from those shown

Roberto, Paul.
Roberto Paul, B.S, M.S.: Doctorate in Philosophy from Universidade of Rio De Janeiro.

Note: Product cover images may vary from those shown
Note: Product cover images may vary from those shown

Our Clients

AB Sciex Eli Lilly and Company B. Braun Melsungen AG Astellas Pharma, Inc. Hologic Corporation Merck & Co., Inc.