Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This book provides a thorough overview of side-channel analysis (SCA), paying particular attention to its applications in various cryptographic algorithms and their implementations. The book is divided into three parts, the first of which presents state-of-the-art cryptographic targets, general principles and the framework of SCA. The second part examines in detail four types of classical SCA methods, namely timing analysis, power/EM analysis, cache analysis, and differential fault analysis (DFA). In turn, the last part introduces three advanced SCA methodologies, e.g. side-channel cube analysis, algebraic side-channel analysis and analytical side-channel analysis. Given its coverage of interdisciplinary topics, the book will be of interest to researchers and professionals in the areas of information security, cryptography, computer architecture and electrical engineering.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This book provides a thorough overview of side-channel analysis (SCA), paying particular attention to its applications in various cryptographic algorithms and their implementations. The book is divided into three parts, the first of which presents state-of-the-art cryptographic targets, general principles and the framework of SCA. The second part examines in detail four types of classical SCA methods, namely timing analysis, power/EM analysis, cache analysis, and differential fault analysis (DFA). In turn, the last part introduces three advanced SCA methodologies, e.g. side-channel cube analysis, algebraic side-channel analysis and analytical side-channel analysis. Given its coverage of interdisciplinary topics, the book will be of interest to researchers and professionals in the areas of information security, cryptography, computer architecture and electrical engineering.