YoVDO

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms - Best Paper CHES 2023

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Hardware Security Courses Side Channel Attacks Courses Embedded Systems Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch the award-winning presentation from CHES 2023 on "Threshold Implementations in Software: Micro-architectural Leakages in Algorithms" by John Gaspoz and Siemen Dhooghe. Explore key concepts like SED attacks, masking, transition leakage, glitch leakage, and bitwise interaction leakage. Gain insights into implementation details, metrics, and the significance of this research in cryptographic hardware and embedded systems security. Engage with the Q&A session to deepen your understanding of this cutting-edge work in micro-architectural leakages.

Syllabus

Introduction
What areSED attacks
Masking
Motivation
Transition Leakage
Glitch Leakage
Bitwise Interaction leakage
Kack
Sbox
Implementation Details
Spoiler Alert
Metrics
Summary
Questions


Taught by

TheIACR

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Cryptography and Information Theory
University of Colorado System via Coursera
Introduction to Software Side Channels and Mitigations
Graz University of Technology via edX
Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX