Tornado- Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a cutting-edge paper on cryptographic implementation security presented at Eurocrypt 2020. Delve into the Tornado framework for automatically generating probing-secure masked bitsliced implementations. Learn about Satan attacks, masking techniques, and the Tornado pipeline. Understand the verification process and performance implications of this innovative approach to enhancing cryptographic security against side-channel attacks.
Syllabus
Introduction
Satan Attacks
Overview
Masking
Automatic Generation
Tornado Pipeline
Verification
Performance
Summary
Taught by
TheIACR
Related Courses
Enterprise System Management and SecurityUniversity of Colorado System via Coursera Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam PHP: Complete Login and Registration System with PHP & MYSQL
Udemy Learn Ethical Hacking From Scratch 2024
Udemy Serie Windows Server Update Services (WSUS)
Udemy