Linked e-resources
Details
Table of Contents
AES datapaths on FPGAs: a state of the art analysis
Fault attacks, injection techniques and tools for simulation
Recent developments in side-channel analysis on elliptic curve cryptography implementations
Practical session: differential power analysis for beginners
Fault and power analysis attack protection techniques for standardized public key cryptosystems
Scan design: basics, advancements and vulnerabilities
Manufacturing testing & security countermeasures
Malware threats and solutions for trustworthy mobile systems design
Ring oscillators and hardware Trojan detection
Notions on silicon physically unclonable functions
Implementation of delay-based PUFs on Altera FPGAs
Implementation and analysis of ring oscillator circuits on Xilinx FPGAs.
Fault attacks, injection techniques and tools for simulation
Recent developments in side-channel analysis on elliptic curve cryptography implementations
Practical session: differential power analysis for beginners
Fault and power analysis attack protection techniques for standardized public key cryptosystems
Scan design: basics, advancements and vulnerabilities
Manufacturing testing & security countermeasures
Malware threats and solutions for trustworthy mobile systems design
Ring oscillators and hardware Trojan detection
Notions on silicon physically unclonable functions
Implementation of delay-based PUFs on Altera FPGAs
Implementation and analysis of ring oscillator circuits on Xilinx FPGAs.