YoVDO

Tornado- Automatic Generation of Probing-Secure Masked Bitsliced Implementations

Offered By: TheIACR via YouTube

Tags

Cryptography Courses System Security Courses

Course Description

Overview

Explore a cutting-edge paper on cryptographic implementation security presented at Eurocrypt 2020. Delve into the Tornado framework for automatically generating probing-secure masked bitsliced implementations. Learn about Satan attacks, masking techniques, and the Tornado pipeline. Understand the verification process and performance implications of this innovative approach to enhancing cryptographic security against side-channel attacks.

Syllabus

Introduction
Satan Attacks
Overview
Masking
Automatic Generation
Tornado Pipeline
Verification
Performance
Summary


Taught by

TheIACR

Related Courses

Enterprise System Management and Security
University of Colorado System via Coursera
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
PHP: Complete Login and Registration System with PHP & MYSQL
Udemy
Learn Ethical Hacking From Scratch 2024
Udemy
Serie Windows Server Update Services (WSUS)
Udemy