YoVDO

Tornado- Automatic Generation of Probing-Secure Masked Bitsliced Implementations

Offered By: TheIACR via YouTube

Tags

Cryptography Courses System Security Courses

Course Description

Overview

Explore a cutting-edge paper on cryptographic implementation security presented at Eurocrypt 2020. Delve into the Tornado framework for automatically generating probing-secure masked bitsliced implementations. Learn about Satan attacks, masking techniques, and the Tornado pipeline. Understand the verification process and performance implications of this innovative approach to enhancing cryptographic security against side-channel attacks.

Syllabus

Introduction
Satan Attacks
Overview
Masking
Automatic Generation
Tornado Pipeline
Verification
Performance
Summary


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera