Cargando…
Why cryptography should not rely on physical attack complexity
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Tho...
Autor principal: | Krämer, Juliane |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2015
|
Materias: | |
Acceso en línea: | https://dx.doi.org/10.1007/978-981-287-787-1 http://cds.cern.ch/record/2112720 |
Ejemplares similares
-
Public Key Cryptography: applications and attacks
por: Batten, L.
Publicado: (2013) -
QC-LDPC code-based cryptography
por: Baldi, Marco
Publicado: (2014) -
Timing channels in cryptography: a micro-architectural perspective
por: Rebeiro, Chester, et al.
Publicado: (2015) -
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET
por: Shukla, Mukul, et al.
Publicado: (2021) -
Public key cryptography : applications and attacks /
por: Batten, Lynn Margaret
Publicado: (2012)