Completed
Encryption in hardware modules
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Introduction to Side-Channel Power Analysis - SCA, DPA
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What does encryption do for us?
- 3 Encryption Parlance
- 4 Encryption Types
- 5 Where does encryption come from?
- 6 Designing encryption implementations.
- 7 Encryption in hardware modules
- 8 Back to Basics
- 9 Capacitors?
- 10 Data Busses...
- 11 Summary So Far
- 12 Pre-Charge
- 13 Running the attack
- 14 Model of Encryption Device
- 15 Correlation Power Analysis
- 16 Applying to AES
- 17 Examples of typical vulnerable devices.