Completed
Consequence (for theoretical analysis)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Towards an Open Approach to Secure Cryptographic Implementations
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Transparency (as a measure of maturity)
- 3 Acknowledgments & cautionary note
- 4 AES Rijndael: y = AES (x)
- 5 Leakage function definition
- 6 Basic facts (0)
- 7 Consequence (for theoretical analysis)
- 8 Basic facts (1)
- 9 Summarizing (taxonomy of attacks)
- 10 Outline
- 11 Noise (hardware) is not enough
- 12 Masking (= noise amplification)
- 13 Masking (abstract view)
- 14 Masking (concrete view)
- 15 Masking (reduction)
- 16 Statistical intuition (2 shares)
- 17 Case study: ARM Cortex M4 [JS17]
- 18 Authenticated Encryption (AEAD)
- 19 Ciphertext Integrity with Leakage
- 20 Chosen Ciphertext Security
- 21 CCA Security with Leakage [GPPS18]
- 22 The challenge leakage controversy (0)
- 23 An motivating example
- 24 Seed: a leakage-resilient MAC
- 25 First tweak: LR tag verification
- 26 Engineering approach to CCAL security
- 27 A CCAML2 encryption scheme
- 28 Security reductions (simplified)
- 29 Example of full-fledged scheme
- 30 A theory to guide practice?
- 31 Open problems
- 32 Evaluation challenge