Towards an Open Approach to Secure Cryptographic Implementations

Towards an Open Approach to Secure Cryptographic Implementations

TheIACR via YouTube Direct link

Intro

1 of 32

1 of 32

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Towards an Open Approach to Secure Cryptographic Implementations

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Transparency (as a measure of maturity)
  3. 3 Acknowledgments & cautionary note
  4. 4 AES Rijndael: y = AES (x)
  5. 5 Leakage function definition
  6. 6 Basic facts (0)
  7. 7 Consequence (for theoretical analysis)
  8. 8 Basic facts (1)
  9. 9 Summarizing (taxonomy of attacks)
  10. 10 Outline
  11. 11 Noise (hardware) is not enough
  12. 12 Masking (= noise amplification)
  13. 13 Masking (abstract view)
  14. 14 Masking (concrete view)
  15. 15 Masking (reduction)
  16. 16 Statistical intuition (2 shares)
  17. 17 Case study: ARM Cortex M4 [JS17]
  18. 18 Authenticated Encryption (AEAD)
  19. 19 Ciphertext Integrity with Leakage
  20. 20 Chosen Ciphertext Security
  21. 21 CCA Security with Leakage [GPPS18]
  22. 22 The challenge leakage controversy (0)
  23. 23 An motivating example
  24. 24 Seed: a leakage-resilient MAC
  25. 25 First tweak: LR tag verification
  26. 26 Engineering approach to CCAL security
  27. 27 A CCAML2 encryption scheme
  28. 28 Security reductions (simplified)
  29. 29 Example of full-fledged scheme
  30. 30 A theory to guide practice?
  31. 31 Open problems
  32. 32 Evaluation challenge

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.