Understanding Analog Side Channels Using Cryptography Algorithms (Record no. 185618)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04787nam a22005895i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-38579-7 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423130142.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230930s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783031385797 |
-- | 978-3-031-38579-7 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-031-38579-7 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Zajić, Alenka. |
Relator term | author. |
Relator code | aut |
-- | http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT | |
Title | Understanding Analog Side Channels Using Cryptography Algorithms |
Medium | [electronic resource] / |
Statement of responsibility, etc | by Alenka Zajić, Milos Prvulovic. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2023. |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XVI, 467 p. 293 illus., 245 illus. in color. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Preface -- I Introduction -- Ii What Is An Analog Side Channel? -- Iii Analog Side Channels -- Iv Unintentionally Modulated Side Channels -- V Relationship Between Modulated Side Channels And Program Activity -- Vi Parameters That Affect Analog Side Channels -- Vii Modeling Analog Side Channels as Communication Systems -- Viii Using Analog Side-Channels For Malware Detection -- Ix Using Analog Side Channels For Program Profiling -- X Using Analog Side Channels For Hardware Event Profiling -- Xi Using Analog Side Channels for Hardware/Software Attestation -- Xii Using Analog Side Channels For Hardware Identification -- Xiii Using Analog Side Channels To Attack Cryptographic Implementations -- Xiv Using Analog Side Channels For Hardware Trojan Detection. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection. Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program’s algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood. This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic circuits. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Telecommunication. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic Circuits and Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Communications Engineering, Networks. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Prvulovic, Milos. |
Relator term | author. |
Relator code | aut |
-- | http://id.loc.gov/vocabulary/relators/aut |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031385780 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031385803 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031385810 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-031-38579-7">https://doi.org/10.1007/978-3-031-38579-7</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.