Главная
Study mode:
on
1
Introduction
2
What areSED attacks
3
Masking
4
Motivation
5
Transition Leakage
6
Glitch Leakage
7
Bitwise Interaction leakage
8
Kack
9
Sbox
10
Implementation Details
11
Spoiler Alert
12
Metrics
13
Summary
14
Questions
Description:
Watch the award-winning presentation from CHES 2023 on "Threshold Implementations in Software: Micro-architectural Leakages in Algorithms" by John Gaspoz and Siemen Dhooghe. Explore key concepts like SED attacks, masking, transition leakage, glitch leakage, and bitwise interaction leakage. Gain insights into implementation details, metrics, and the significance of this research in cryptographic hardware and embedded systems security. Engage with the Q&A session to deepen your understanding of this cutting-edge work in micro-architectural leakages.

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms - Best Paper CHES 2023

TheIACR
Add to list
0:00 / 0:00