Attributes | Values |
---|
rdf:type
| |
Description
| - Článek se zabývá modelováním určitých bezpečnostních aspektů hardwarových implementací kryptografických mechanismů. Tyto implementace se nazývají zařízení odolná proti útoku a jsou to typicky čipové karty nebo kryptografické koprocesory. Návrh těchto zařízení obvykle neobsahuje protiopatření proti tak zvaným bočním efektům, které provází činnost těchto zařízení. Boční efekty způsobují únik citlivé informace z kryptografického zařízení. Závažnost tohoto úniku závisí na původu bočního efektu a na schopnossti útočníka unikající informaci analyzovat. <br> (cs)
- This paper deals with modelling the certain security aspects of hardware implementations of cryptographic mechanisms. These implementations are called tamper-proof devices and they are typically smart cards or cryptographic coprocess. The design of most available tamper-proof devices does not deal with various forms of side effects of cryptographic algorithms execution. A side-channel is the term commonly used for places where such undesirable information appears. The volume and usefulness of informatioon we are able to extract depends on the form of the side-channel. However, number of scientific papers proves that it is possible to effectively analyse information from side-channels and use the results for compromise of tamper-proof devices.
- This paper deals with modelling the certain security aspects of hardware implementations of cryptographic mechanisms. These implementations are called tamper-proof devices and they are typically smart cards or cryptographic coprocess. The design of most available tamper-proof devices does not deal with various forms of side effects of cryptographic algorithms execution. A side-channel is the term commonly used for places where such undesirable information appears. The volume and usefulness of informatioon we are able to extract depends on the form of the side-channel. However, number of scientific papers proves that it is possible to effectively analyse information from side-channels and use the results for compromise of tamper-proof devices. (en)
|
Title
| - Modelling of Tamper-Proof Devices
- Modelling of Tamper-Proof Devices (en)
- Modelování zařízení odolných proti útokům (cs)
|
skos:prefLabel
| - Modelling of Tamper-Proof Devices
- Modelling of Tamper-Proof Devices (en)
- Modelování zařízení odolných proti útokům (cs)
|
skos:notation
| - RIV/00216305:26230/04:PU49093!RIV/2005/GA0/262305/N
|
http://linked.open.../vavai/riv/strany
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26230/04:PU49093
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - tamper-proof hardware, cryptographic attacks, cryptography, heterogeneous modelling, HELEF (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of 38th International Conference MOSIS'04
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Hrubý, Martin
- Peringer, Petr
- Rábová, Zdeňka
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |