Lecture 1 - Introduction to Hardware Security - Part 1
Lecture 2 - Introduction to Hardware Security - Part 2
Lecture 3 - Algorithm to Hardware
Lecture 4 - Finite Field Architectures - 1
Lecture 5 - Finite Field Architectures - 1 (Continued...)
Lecture 6 - Hardware Design for Finite Field Inverse
Lecture 7 - Hardware Architecture for Finite Field Inverse
Lecture 8 - Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES)
Lecture 9 - Advanced Encryption Standard (AES) andSide Channel Analysis
Lecture 10 - Field Isomorphisms
Lecture 11 - Field Isomorphisms (Continued...)
Lecture 12 - Hardware Implementation of Advanced Encryption
Lecture 13 - Hardware Implementation of Advanced Encryption
Lecture 14 - Hardware Implementation of Advanced Encryption (Continued...)
Lecture 15 - Compact AES-Box
Lecture 16 - Compact AES S-Box - Part II
Lecture 17 - Compact AES S-Box in Normal Basis - Part I
Lecture 18 - Compact AES S-Box in Normal Basis - Part II
Lecture 19 - Hardware for Elliptic Curve Cryptography - Part I
Lecture 20 - Hardware for Elliptic Curve Cryptography - Part II
Lecture 21 - Hardware for Elliptic Curve Cryptography - Part III
Lecture 22 - Hardware for Elliptic Curve Cryptography - Part IV
Lecture 23 - Hardware for Elliptic Curve Cryptography - Part V
Lecture 24 - Introduction to Side Channel Analysis
Lecture 25 - Power Analysis - Part I
Lecture 26 - Power Analysis - Part II
Lecture 27 - Power Analysis - Part III
Lecture 28 - Power Analysis - Part IV
Lecture 29 - Power Analysis - Part V
Lecture 30 - Power Analysis - Part VI
Lecture 31 - Power Analysis - Part VII
Lecture 32 - Power Analysis - Part VIII
Lecture 33 - Power Analysis - Part IX
Lecture 34 - Power Analysis - Part X
Lecture 35 - Power Analysis - Part XI
Lecture 36 - Power Analysis - Part XII
Lecture 37 - Power Analysis - Part XIII
Lecture 38 - Power Analysis - Part XIV
Lecture 39 - Power Analysis - Part XV
Lecture 40 - Power Analysis - Part XVI
Lecture 41 - Power Analysis - Part XVII
Lecture 42 - Power Analysis - Part XVIII
Lecture 43 - Power Analysis Countermeasures
Lecture 44 - Power Analysis Countermeasures (Continued...)
Lecture 45 - Power Analysis Countermeasures (Continued...)
Lecture 46 - Fault Analysis of Cryptosystems
Lecture 47 - Improved DFA of AES
Lecture 48 - Multi-Byte and key Scheduling Based Fault Analysis of AES
Lecture 49 - Multi-Byte and key Scheduling Based Fault Analysis of AES (Continued...)
Lecture 50 - Redundaney Based Fault Intensity
Lecture 51 - Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Continued...)
Lecture 52 - Infective Countermeasures for DFA
Lecture 53 - Infective Countermeasures for DFA (Continued...)
Lecture 54 - Infective Countermeasures for DFA (Continued...)
Lecture 55 - Microarchitectural attacks: Part I cache Timing attacks on Block ciphers
Lecture 56 - Microarchitectural attacks: Part I cache Timing attacks on Block ciphers (Continued...)
Lecture 57 - Microarchitectural attacks: Part II Branch Prediction Attacks
Lecture 58 - Microarchitectural attacks: Part II Branch Prediction Attacks (Continued...)
Lecture 59 - Microarchitectural attacks: Part III Row Hammer Attacks
Lecture 60 - Microarchitectural attacks: Part III Row Hammer Attacks (Continued...)