mhrd logo inflibnet logo ugc logo

Module Details

Course : Hardware Security

Subject : Computer science

No. of Modules : 60

Level : UG

Source : SwayamPrabha;Channel-13

Back

Sr. No. Title Creator/Author E-Text Video URL Metadata
1 Microarchitectural attacks: part ii branch prediction attacks(contd) Prof. Debdeep Mukhopadhyay - - Click Here
2 Microarchitectural attacks: part iii row hammer attacks(contd) Prof. Debdeep Mukhopadhyay - - Click Here
3 Microarchitectural attacks: part iii row hammer attacks Prof. Debdeep Mukhopadhyay - - Click Here
4 Microarchitectural attacks: part i cache timing attacks on block ciphers(contd) Prof. Debdeep Mukhopadhyay - - Click Here
5 Microarchitectural attacks: part i cache timing attacks on block ciphers Prof. Debdeep Mukhopadhyay - - Click Here
6 Microarchitectural attacks: part ii branch prediction attacks Prof. Debdeep Mukhopadhyay - - Click Here
7 Infective countermeasures for dfa(contd) Prof. Debdeep Mukhopadhyay - - Click Here
8 Infective countermeasures for dfa(contd) Prof. Debdeep Mukhopadhyay - - Click Here
9 Infective countermeasures for dfa Prof. Debdeep Mukhopadhyay - - Click Here
10 Redundaney based fault countermeasures and differential faut intensity attacks(cont...) Prof. Debdeep Mukhopadhyay - - Click Here
11 Redundaney based fault intensity Prof. Debdeep Mukhopadhyay - - Click Here
12 Multi-byte and key scheduling based fault analysis of aes(contd) Prof. Debdeep Mukhopadhyay - - Click Here
13 Multi-byte and key scheduling based fault analysis of aes Prof. Debdeep Mukhopadhyay - - Click Here
14 Power analysis countermeasures(contd) Prof. Debdeep Mukhopadhyay - - Click Here
15 Fault analysis of cryptosystems Prof. Debdeep Mukhopadhyay - - Click Here
16 Improved dfa of aes Prof. Debdeep Mukhopadhyay - - Click Here
17 Power analysis countermeasures(contd) Prof. Debdeep Mukhopadhyay - - Click Here
18 Power analysis countermeasures Prof. Debdeep Mukhopadhyay - - Click Here
19 Power analysis(part-xviii) Prof. Debdeep Mukhopadhyay - - Click Here
20 Power analysis(part-xvii) Prof. Debdeep Mukhopadhyay - - Click Here
21 Power analysis(part-xvi) Prof. Debdeep Mukhopadhyay - - Click Here
22 Power analysis(part-xv) Prof. Debdeep Mukhopadhyay - - Click Here
23 Power analysis(part-xiii) Prof. Debdeep Mukhopadhyay - - Click Here
24 Power analysis(part-xiv) Prof. Debdeep Mukhopadhyay - - Click Here
25 Power analysis(part-xii) Prof. Debdeep Mukhopadhyay - - Click Here
26 Power analysis(part-xi) Prof. Debdeep Mukhopadhyay - - Click Here
27 Power analysis(part-x) Prof. Debdeep Mukhopadhyay - - Click Here
28 Power analysis(part-ix) Prof. Debdeep Mukhopadhyay - - Click Here
29 Power analysis(part-viii) Prof. Debdeep Mukhopadhyay - - Click Here
30 Power analysis(part-vii) Prof. Debdeep Mukhopadhyay - - Click Here
31 Power analysis(part-vi) Prof. Debdeep Mukhopadhyay - - Click Here
32 Power analysis(part-iii) Prof. Debdeep Mukhopadhyay - - Click Here
33 Power analysis(part-iv) Prof. Debdeep Mukhopadhyay - - Click Here
34 Power analysis(part-v) Prof. Debdeep Mukhopadhyay - - Click Here
35 Hardware for elliptic curve cryptography(part-iv) Prof. Debdeep Mukhopadhyay - - Click Here
36 Hardware for elliptic curve cryptography(part-v) Prof. Debdeep Mukhopadhyay - - Click Here
37 Introduction to side channel analysis Prof. Debdeep Mukhopadhyay - - Click Here
38 Power analysis(part-ii) Prof. Debdeep Mukhopadhyay - - Click Here
39 Power analysis(part-i) Prof. Debdeep Mukhopadhyay - - Click Here
40 Hardware for elliptic curve cryptography(part-iii) Prof. Debdeep Mukhopadhyay - - Click Here
41 Hardware for elliptic curve cryptography(part-ii) Prof. Debdeep Mukhopadhyay - - Click Here
42 Hardware for elliptic curve cryptography(part-i) Prof. Debdeep Mukhopadhyay - - Click Here
43 Compact aes s-box in normal basis(part-ii) Prof. Debdeep Mukhopadhyay - - Click Here
44 Compact aes s-box in normal basis(part-i) Prof. Debdeep Mukhopadhyay - - Click Here
45 Compact aes s-box(part-ii) Prof. Debdeep Mukhopadhyay - - Click Here
46 Hardware implementation of advanced encryption(contd) Prof. Debdeep Mukhopadhyay - - Click Here
47 Compact aes-box Prof. Debdeep Mukhopadhyay - - Click Here
48 Hardware implementation of advanced encryption Prof. Debdeep Mukhopadhyay - - Click Here
49 Hardware implementation of advanced encryption Prof. Debdeep Mukhopadhyay - - Click Here
50 Background on cryptography, cryptanalysis and advanced encryption standard(aes) Prof. Jitendra Kumar - - Click Here
51 Advanced encryption standard(aes) and side channel analysis Prof. Jitendra Kumar - - Click Here
52 Field isomorphisms(contd) Prof. Debdeep Mukhopadhyay - - Click Here
53 Field isomorphisms Prof. Jitendra Kumar - - Click Here
54 Hardware architecture for finite field inverse Prof. Jitendra Kumar - - Click Here
55 Finite field architectures-1(contd) Prof. Debdeep Mukhopadhyay - - Click Here
56 Hardware design for finite field inverse Prof. Jitendra Kumar - - Click Here
57 Finite field architectures-1 Prof. Debdeep Mukhopadhyay - - Click Here
58 Algorithm to hardware Prof. Debdeep Mukhopadhyay - - Click Here
59 Introduction to hardware security(part-2) Prof. Debdeep Mukhopadhyay - - Click Here
60 Introduction to hardware security(part-1) Prof. Debdeep Mukhopadhyay - - Click Here