Security Research Courses
TheIACR via YouTube A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encryption Schemes
TheIACR via YouTube Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
TheIACR via YouTube Curious Case of Rowhammer - Flipping Secret Exponent Bits Using Timing Analysis
TheIACR via YouTube Related-Key Attacks Against Full Hummingbird-2
TheIACR via YouTube I Can Be Apple and So Can You
YouTube Securing the Internet of Things - IoT Through Security Research and Vulnerability Analysis
YouTube Bootstrapping a Security Research Project
YouTube My Cousin Viinny - Ethics and Experience in Security Research
YouTube Bootstrapping a Security Research Project
YouTube