Добро пожаловать в клуб

Показать / Спрятать  Домой  Новости Статьи Файлы Форум Web ссылки F.A.Q. Логобург    Показать / Спрятать

Главное меню
ДомойНовостиСтатьиПостановка звуковФайлыДефектологияКнижный мирФорумСловарьРассылкаКаталог ссылокРейтинг пользователейЧаВо(FAQ)КонкурсWeb магазинКарта сайта

Поздравляем нового Логобуржца алике со вступлением в клуб!



Side Channel Attack Prevention   Akram Hossain,A. K. M. Zaidi Satter and Shibli Shahriar

Side Channel Attack Prevention

104 страниц. 2012 год.
LAP Lambert Academic Publishing
This thesis describes implementation of an Advanced Encryption Standard (AES) Smart Card, a highly tamper resistant to Side Channel Attacks. Smart Cards are gaining popularity in applications that require high security and store sensitive information. Modern smart Cards, highly capable of complicated cryptography, provide a high assurance of tamper resistance and thus commonly used in payment application. However, advanced Smart Cards can not protect attackers from being defrauded by different side channel attacks (DSCA). Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to side channel Attacks (SCAs) The development of such attacks describes how to perform different kinds of side channel Attack on an AES implementation by using simulated power traces. Working in a simulated environment brings relevant advantages,e.g., eventual weakness to Differential power Attack(DPA) may be detected at device designing phase,so that satisfactory countermeasures can be...
- Генерация страницы: 0.04 секунд -