It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 01959cam 2200457 a 4500
001 9920861060001661
005 20150423132047.0
008 060403s2007 nyua b 001 0 eng
010 $a 2007923565
015 $aGBA679965$2bnb
016 7 $a013557260$2Uk
020 $a9780387308579 (hbk.)
020 $a0387308571 (hbk.)
020 $a9780387381626 (e-ISBN)
020 $a0387381627 (e-ISBN)
029 1 $aYDXCP$b2272093
035 $a(CSdNU)u300621-01national_inst
035 $a(OCoLC)123768791
035 $a(OCoLC)123768791
035 $a(OCoLC)123768791
040 $aUKM$cUKM$dDLC$dIXA$dBAKER$dYDXCP$dOrLoB-B
042 $aukblsr
049 $aCNUM
050 00 $aTK7895.S62$bM36 2007
082 04 $a005.8$222
100 1 $aMangard, Stefan.
245 10 $aPower analysis attacks :$brevealing the secrets of smart cards /$cby Stefan Mangard, Elisabeth Oswald, Thomas Popp.
260 $aNew York, N.Y. :$bSpringer,$cc2007.
300 $axxiii, 337 p. :$bill. ;$c24 cm.
440 0 $aAdvances in information security ;$vv. 31
504 $aIncludes bibliographical references and index.
505 0 $a1. Introduction -- 2. Cryptographic devices -- 3. Power consumption -- 4. Statistical characteristics of power traces -- 5. Simple power analysis -- 6. Differential power analysis -- 7. Hiding -- 8. Attacks on hiding -- 9. Masking -- 10. Attacks on masking -- 11. Conclusions -- App. A. DPA article by Kocher et al -- App. B. The advanced encryption standard.
650 0 $aSmart cards$xSecurity measures.
700 1 $aOswald, Elisabeth.
700 1 $aPopp, Thomas,$d1978-
938 $aBaker & Taylor$bBKTY$c89.95$d89.95$i0387308571$n0006661211$sactive
938 $aYBP Library Services$bYANK$n2272093
947 $fSOET-TEC$hCIRCSTACKS$p$77.36$q1
949 $aTK 7895.S62 M36 2007$i31786102179840
994 $a92$bCNU
999 $aTK 7895 .S62 M36 2007$wLC$c1$i31786102179840$lCIRCSTACKS$mNULS$rY$sY $tBOOK$u7/3/2007