YoVDO

Leakage Resilience and Masking Verification in Cryptography

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Hardware Security Courses Side Channel Attacks Courses Embedded Systems Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cutting-edge techniques in cryptographic hardware and embedded systems security during this session from CHES 2022, focusing on leakage resilience and masking verification. Delve into advanced topics that address vulnerabilities in cryptographic implementations and learn about state-of-the-art methods for enhancing the security of embedded systems against side-channel attacks. Gain insights from leading experts in the field as they present their latest research findings and discuss practical applications of leakage resilience and masking verification techniques.

Syllabus

Session on Leakage Resilience and Masking Verification


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera