Главная
Study mode:
on
1
Introduction
2
Presentation
3
Audience questions
4
Paper review
5
Extra review
6
Attack surface
7
Example
8
Conclusion
9
Conclusions
10
Integrity
11
Results
12
Proof
13
Question
14
Discussion
15
Abdulrahman Talev
16
Masking Schemes
17
Expansion Strategy
18
Dynamic Expansion
19
Improvements
20
Summary
Description:
Explore cutting-edge research on physical attacks, leakage, and countermeasures in cryptography through this conference session featuring six presentations. Delve into topics such as secure software masking on superscalar processors, fault-injection attacks against post-quantum cryptography candidates, and analysis of countermeasures against combined side-channel and fault attacks. Learn about efficient leakage-resilient MACs, cipher-level resistance against differential fault attacks, and dynamic random probing expansion techniques. Gain insights from expert speakers as they discuss their findings, methodologies, and implications for improving cryptographic security against various physical threats.

Physical Attacks, Leakage and Countermeasures

TheIACR
Add to list