£76.14

Springer Why Cryptography Should Not Rely on Physical Attack Complexity (T-Labs Series in Telecommunication Services)

Price data last checked 8 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 83 days • 83 data points (No recent data available)

Historical
Generating forecast...
£76.14 £75.63 £75.74 £75.85 £75.97 £76.08 £76.19 23 January 2026 12 February 2026 05 March 2026 25 March 2026 15 April 2026

Price Distribution

Price distribution over 83 days • 1 price levels

Days at Price
83 days 0 21 42 62 83 £76 Days at Price

Price Analysis

Most common price: £76 (83 days, 100.0%)

Price range: £76 - £76

Price levels: 1 different prices over 83 days

Description

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Product Specifications

Format
hardcover
Domain
Amazon UK
Release Date
23 September 2015
Listed Since
09 July 2015

Barcode

No barcode data available

Similar Products You Might Like

Physical and Data-Link Security Techniques for Future Communication Systems: 358 (Lecture Notes in Electrical Engineering, 358)
98% match

Physical and Data-Link Security Techniques for Future Communication Systems: 358 (Lecture Notes in Electrical Engineering, 358)

Springer

£107.61 15 Apr 2026
Physical-Layer Security and Quantum Key Distribution
98% match

Physical-Layer Security and Quantum Key Distribution

Springer

£49.20 05 Apr 2026
Optical Cryptosystems (Advances in Optics, Photonics and Optoelectronics) (IOP Series in Advances in Optics, Photonics and Optoelectronics)
98% match

Optical Cryptosystems (Advances in Optics, Photonics and Optoelectronics) (IOP Series in Advances in Optics, Photonics and Optoelectronics)

IOP Publishing Ltd

£99.00 15 Apr 2026
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings: 3156 (Lecture Notes in Computer Science, 3156)
98% match

Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings: 3156 (Lecture Notes in Computer Science, 3156)

Springer

£44.79 14 Apr 2026
Partially Homomorphic Encryption
98% match

Partially Homomorphic Encryption

Springer

£97.13 13 Apr 2026
Data-driven Block Ciphers for Fast Telecommunication Systems
98% match

Data-driven Block Ciphers for Fast Telecommunication Systems

CRC Press

£67.34 14 Apr 2026
Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)
98% match

Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)

Springer

£107.73 12 Apr 2026
Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, ... (Lecture Notes in Computer Science, 12827)
98% match

Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, ... (Lecture Notes in Computer Science, 12827)

Springer

£91.60 10 Apr 2026
Algorithmic Information Theory: Mathematics of Digital Information Processing (Signals and Communication Technology)
98% match

Algorithmic Information Theory: Mathematics of Digital Information Processing (Signals and Communication Technology)

Springer

£107.73 14 Apr 2026
Applied Cryptography: Protocols, Algorithms and Source Code in C
97% match

Applied Cryptography: Protocols, Algorithms and Source Code in C

Wiley

£39.37 13 Apr 2026
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation
97% match

Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation

Springer

£91.15 04 Apr 2026
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
97% match

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

Springer

£39.90 20 Apr 2026
Cryptographic Security Architecture: Design and Verification
97% match

Cryptographic Security Architecture: Design and Verification

Springer

£82.38 04 Apr 2026
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, ... (Lecture Notes in Computer Science, 14081)
97% match

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, ... (Lecture Notes in Computer Science, 14081)

Springer

£92.35 18 Apr 2026
Disappearing Cryptography: Information Hiding: Steganography & Watermarking: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)
97% match

Disappearing Cryptography: Information Hiding: Steganography & Watermarking: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)

Morgan Kaufmann

£45.19 14 Apr 2026
Fault Analysis in Cryptography (Information Security and Cryptography)
97% match

Fault Analysis in Cryptography (Information Security and Cryptography)

Springer

£75.28 06 Apr 2026
Advances in Cryptology – EUROCRYPT ’95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May ... 921 (Lecture Notes in Computer Science, 921)
97% match

Advances in Cryptology – EUROCRYPT ’95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May ... 921 (Lecture Notes in Computer Science, 921)

Springer

£44.91 18 Apr 2026
Physical-Layer Security: From Information Theory to Security Engineering
97% match

Physical-Layer Security: From Information Theory to Security Engineering

Cambridge University Press

£63.25 20 Apr 2026
Towards Hardware-Intrinsic Security: Foundations and Practice: 0 (Information Security and Cryptography)
97% match

Towards Hardware-Intrinsic Security: Foundations and Practice: 0 (Information Security and Cryptography)

Springer

£88.95 18 Apr 2026
Proceedings of the Global AI Congress 2019: 1112 (Advances in Intelligent Systems and Computing, 1112)
97% match

Proceedings of the Global AI Congress 2019: 1112 (Advances in Intelligent Systems and Computing, 1112)

Springer

£108.11 27 Mar 2026
Hadamard Matrix Analysis and Synthesis: With Applications to Communications and Signal/Image Processing: 383 (The Springer International Series in Engineering and Computer Science, 383)
97% match

Hadamard Matrix Analysis and Synthesis: With Applications to Communications and Signal/Image Processing: 383 (The Springer International Series in Engineering and Computer Science, 383)

Springer

£120.62 18 Apr 2026
Protocols for Authentication and Key Establishment (Information Security and Cryptography)
97% match

Protocols for Authentication and Key Establishment (Information Security and Cryptography)

Springer

£86.38 05 Apr 2026
Big Data Concepts, Theories, and Applications
97% match

Big Data Concepts, Theories, and Applications

Springer

£118.00 13 Mar 2026
ADVANCES IN CODING THEORY AND CRYPTOGRAPHY: 3 (Series On Coding Theory And Cryptology)
97% match

ADVANCES IN CODING THEORY AND CRYPTOGRAPHY: 3 (Series On Coding Theory And Cryptology)

World Scientific Publishing Company

£62.88 30 Mar 2026