"Tento \u010Dl\u00E1nek je zam\u011B\u0159en p\u0159edev\u0161\u00EDm na popis vybran\u00FDch metod a koncept\u016F pou\u017Eiteln\u00FDch pro pasivn\u00ED \u00FAtok typu v\u00FDkonov\u00E1 anal\u00FDza (Power Analysis). Jde o metodu analyzuj\u00EDc\u00ED data z\u00EDskan\u00E1 experimentov\u00E1n\u00EDm a m\u011B\u0159en\u00EDm charakteristik proudu odeb\u00EDran\u00E9ho kryptografick\u00FDmmodulem. Pou\u017Eit\u00E9 metody jsou podobn\u00E9 jako v p\u0159\u00EDpad\u011B simula\u010Dn\u00EDch experiment\u016F s t\u00EDm rozd\u00EDlem, \u017Ee m\u00EDsto simula\u010Dn\u00EDho modelu pou\u017E\u00EDv\u00E1me re\u00E1ln\u00FD kryptografick\u00FD modul a jeho v\u00FDstupy z\u00EDsk\u00E1me m\u011B\u0159en\u00EDm." . "Anal\u00FDza simula\u010Dn\u00EDch dat z\u00EDskan\u00FDch z kryptografick\u00E9ho modulu"@cs . "Han\u00E1\u010Dek, Petr" . . . "RIV/00216305:26230/04:PU49249" . "Analysis of simulation data from cryptographic module"@en . "R\u00E1bov\u00E1, Zde\u0148ka" . "Analysis of simulation data from cryptographic module"@en . . "Tento \u010Dl\u00E1nek je zam\u011B\u0159en p\u0159edev\u0161\u00EDm na popis vybran\u00FDch metod a koncept\u016F pou\u017Eiteln\u00FDch pro pasivn\u00ED \u00FAtok typu v\u00FDkonov\u00E1 anal\u00FDza (Power Analysis). Jde o metodu analyzuj\u00EDc\u00ED data z\u00EDskan\u00E1 experimentov\u00E1n\u00EDm a m\u011B\u0159en\u00EDm charakteristik proudu odeb\u00EDran\u00E9ho kryptografick\u00FDmmodulem. Pou\u017Eit\u00E9 metody jsou podobn\u00E9 jako v p\u0159\u00EDpad\u011B simula\u010Dn\u00EDch experiment\u016F s t\u00EDm rozd\u00EDlem, \u017Ee m\u00EDsto simula\u010Dn\u00EDho modelu pou\u017E\u00EDv\u00E1me re\u00E1ln\u00FD kryptografick\u00FD modul a jeho v\u00FDstupy z\u00EDsk\u00E1me m\u011B\u0159en\u00EDm."@cs . "66-71" . . "Proceedings of ASIS 2004" . "P(GA102/04/0871), Z(MSM 262200012)" . . . . . "Sv. Host\u00FDn" . "Peringer, Petr" . "The article deals with analysis of side-channel data acquired from cryptographic hardware, e.g. single-chip cryptographic modules or smartcards. We present a brief overview of methods suitable for power analysis of cryptographic devices. The goal is to evaluate some security properties of cryptographic hardware. The controlled experiments with cryptographic module or its simulation model provide data used for multi-paradigm analysis. We use statistical methods, various heuristics, and other methods. If we can use the analysis to get sensitive information from cryptographic module, then the module is not secure."@en . "[3CD11944BD96]" . . . "RIV/00216305:26230/04:PU49249!RIV06-GA0-26230___" . "cryptographic modules, security models"@en . . "Anal\u00FDza simula\u010Dn\u00EDch dat z\u00EDskan\u00FDch z kryptografick\u00E9ho modulu" . . "26230" . "3"^^ . . . "MARQ" . . "3"^^ . "6"^^ . "Anal\u00FDza simula\u010Dn\u00EDch dat z\u00EDskan\u00FDch z kryptografick\u00E9ho modulu" . "2004-09-22+02:00"^^ . "Anal\u00FDza simula\u010Dn\u00EDch dat z\u00EDskan\u00FDch z kryptografick\u00E9ho modulu"@cs . . . "Ostrava" . . "554544" . . "80-86840-03" .