YoVDO

Workshop on Attacks in Crypto 2020 Sessions I and II

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Side Channel Attacks Courses Cache Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cutting-edge research in cryptographic attacks through this conference session featuring four expert talks. Delve into lattice and side-channel attacks with Daniel Moghimi's presentation on TPM-FAIL, examining timing and lattice attacks on Trusted Platform Modules, followed by Diego F. Aranha Akira Takahashi's discussion on LadderLeak. Transition to real-world Pseudorandom Number Generators (PRNGs) as Shaanan Cohney reveals cache attacks on CTR_DRBG in "Pseudorandom Black Swans." Conclude with Jiska Classen's insights on Bluetooth randomness in "Firmware Insider." Gain valuable knowledge about vulnerabilities in cryptographic implementations and the importance of robust security measures in hardware and software systems.

Syllabus

Workshop on Attacks in Crypto 2020 Sessions I and II


Taught by

TheIACR

Related Courses

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
TheIACR via YouTube
When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins
Black Hat via YouTube
Dragonblood - Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
IEEE via YouTube
NetCAT - Practical Cache Attacks from the Network
IEEE via YouTube
The 9 Lives of Bleichenbacher's CAT - New Cache Attacks on TLS Implementations
IEEE via YouTube