Physical Attacks, Leakage and Countermeasures
Offered By: TheIACR via YouTube
Course Description
Overview
Explore cutting-edge research on physical attacks, leakage, and countermeasures in cryptography through this conference session featuring six presentations. Delve into topics such as secure software masking on superscalar processors, fault-injection attacks against post-quantum cryptography candidates, and analysis of countermeasures against combined side-channel and fault attacks. Learn about efficient leakage-resilient MACs, cipher-level resistance against differential fault attacks, and dynamic random probing expansion techniques. Gain insights from expert speakers as they discuss their findings, methodologies, and implications for improving cryptographic security against various physical threats.
Syllabus
Introduction
Presentation
Audience questions
Paper review
Extra review
Attack surface
Example
Conclusion
Conclusions
Integrity
Results
Proof
Question
Discussion
Abdulrahman Talev
Masking Schemes
Expansion Strategy
Dynamic Expansion
Improvements
Summary
Taught by
TheIACR
Related Courses
Requirements Specifications: Goals and Conflict AnalysisUniversity of Colorado System via Coursera Threat and Vulnerability Management for CompTIA CySA+
Pluralsight Network Security Monitoring (NSM) with Security Onion
Pluralsight Security Event Triage: Operationalizing Security Analysis
Pluralsight Complete Guide to Elasticsearch
Udemy