Explore cutting-edge research on physical attacks, leakage, and countermeasures in cryptography through this conference session featuring six presentations. Delve into topics such as secure software masking on superscalar processors, fault-injection attacks against post-quantum cryptography candidates, and analysis of countermeasures against combined side-channel and fault attacks. Learn about efficient leakage-resilient MACs, cipher-level resistance against differential fault attacks, and dynamic random probing expansion techniques. Gain insights from expert speakers as they discuss their findings, methodologies, and implications for improving cryptographic security against various physical threats.
Overview
Syllabus
Introduction
Presentation
Audience questions
Paper review
Extra review
Attack surface
Example
Conclusion
Conclusions
Integrity
Results
Proof
Question
Discussion
Abdulrahman Talev
Masking Schemes
Expansion Strategy
Dynamic Expansion
Improvements
Summary
Taught by
TheIACR