Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Lecture 01: Introduction to Hardware Security (Part-1) | Download |
2 | Lecture 02: Introduction to Hardware Security (Part-2) | Download |
3 | Lecture 03: Algorithm to Hardware | Download |
4 | Lecture 04: Finite Field Architectures-1 | Download |
5 | Lecture 05:Finite Field Architectures-1 (Contd.) | Download |
6 | Lecture 06:Hardware Design for Finite Field Inverse | Download |
7 | Lecture 07: Hardware Architecture for Finite Field Inverse | Download |
8 | Lecture 08: Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES) | Download |
9 | Lecture 09: Advanced Encryption Standard (AES) andSide Channel Analysis | Download |
10 | Lecture 10: Field Isomorphisms | Download |
11 | Lecture 11: Field Isomorphisms (Contd.) | Download |
12 | Lecture 12: : Hardware Implementation of Advanced Encryption | Download |
13 | Lecture 13:Hardware Implementation of Advanced Encryption | Download |
14 | Lecture 14:Hardware Implementation of Advanced Encryption (Contd.) | Download |
15 | Lecture 15: Compact AES-Box | Download |
16 | Lecture 16 : Compact AES S-Box (Part – II) | Download |
17 | Lecture 17 : Compact AES S-Box in Normal Basis (Part – I) | Download |
18 | Lecture 18 : Compact AES S-Box in Normal Basis (Part – II) | Download |
19 | Lecture 19 : Hardware for Elliptic Curve Cryptography (Part - I) | Download |
20 | Lecture 20 : Hardware for Elliptic Curve Cryptography (Part - II) | Download |
21 | Lecture 21 : Hardware for Elliptic Curve Cryptography (Part - III) | Download |
22 | Lecture 22 : Hardware for Elliptic Curve Cryptography (Part - IV) | Download |
23 | Lecture 23 : Hardware for Elliptic Curve Cryptography (Part - V) | Download |
24 | Lecture 24 : Introduction to Side Channel Analysis | Download |
25 | Lecture 25 : Power Analysis (Part – I) | Download |
26 | Lecture 26 | Download |
27 | Lecture 27 | Download |
28 | Lecture 28 | Download |
29 | Lecture 29 | Download |
30 | Lecture 30 | Download |
31 | Lecture 31: Power Analysis (Part – VII) | Download |
32 | Lecture 32: Power Analysis (Part – VIII) | Download |
33 | Lecture 33: Power Analysis (Part – IX) | Download |
34 | Lecture 34: Power Analysis (Part – X) | Download |
35 | Lecture 35: Power Analysis (Part – XI) | Download |
36 | Lecture 36: | Download |
37 | Lecture 37: | Download |
38 | Lecture 38: | Download |
39 | Lecture 39: | Download |
40 | Lecture 40: | Download |
41 | Lecture 41: Power Analysis (Part – XVII) | Download |
42 | Lecture 42: Power Analysis (Part – XVIII) | Download |
43 | Lecture 43: Power Analysis Countermeasures | Download |
44 | Lecture 44: Power Analysis Countermeasures (Contd.) | Download |
45 | Lecture 45: Power Analysis Countermeasures (Contd.) | Download |
46 | Lecture 46 : Fault Analysis of Cryptosystems | Download |
47 | Lecture 47 : Improved DFA of AES | Download |
48 | Lecture 48 : Multi-Byte and key Scheduling Based Fault Analysis of AES | Download |
49 | Lecture 49 : Multi-Byte and key Scheduling Based Fault Analysis of AES(Contd.) | Download |
50 | Lecture 50 : Redundaney Based Fault Intensity | Download |
51 | Lecture 51 : Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Contd.) | Download |
52 | Lecture 52 : Infective Countermeasures for DFA | Download |
53 | Lecture 53 : Infective Countermeasures for DFA (Contd.) | Download |
54 | Lecture 54 : Infective Countermeasures for DFA (Contd.) | Download |
55 | Lecture 55 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphers | Download |
56 | Lecture 56 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphers(Contd.) | Download |
57 | Lecture 57 : Microarchitectural attacks: Part II Branch Prediction Attacks | Download |
58 | Lecture 58 : Microarchitectural attacks: Part II Branch Prediction Attacks(Contd.) | Download |
59 | Lecture 59 : Microarchitectural attacks: Part III Row Hammer Attacks | Download |
60 | Lecture 60 : Microarchitectural attacks: Part III Row Hammer Attacks(Contd.) | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Lecture 01: Introduction to Hardware Security (Part-1) | Download To be verified |
2 | Lecture 02: Introduction to Hardware Security (Part-2) | Download To be verified |
3 | Lecture 03: Algorithm to Hardware | Download To be verified |
4 | Lecture 04: Finite Field Architectures-1 | Download To be verified |
5 | Lecture 05:Finite Field Architectures-1 (Contd.) | Download To be verified |
6 | Lecture 06:Hardware Design for Finite Field Inverse | Download To be verified |
7 | Lecture 07: Hardware Architecture for Finite Field Inverse | Download To be verified |
8 | Lecture 08: Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES) | Download To be verified |
9 | Lecture 09: Advanced Encryption Standard (AES) andSide Channel Analysis | Download To be verified |
10 | Lecture 10: Field Isomorphisms | Download To be verified |
11 | Lecture 11: Field Isomorphisms (Contd.) | Download To be verified |
12 | Lecture 12: : Hardware Implementation of Advanced Encryption | Download To be verified |
13 | Lecture 13:Hardware Implementation of Advanced Encryption | Download To be verified |
14 | Lecture 14:Hardware Implementation of Advanced Encryption (Contd.) | Download To be verified |
15 | Lecture 15: Compact AES-Box | Download To be verified |
16 | Lecture 16 : Compact AES S-Box (Part – II) | Download To be verified |
17 | Lecture 17 : Compact AES S-Box in Normal Basis (Part – I) | Download To be verified |
18 | Lecture 18 : Compact AES S-Box in Normal Basis (Part – II) | Download To be verified |
19 | Lecture 19 : Hardware for Elliptic Curve Cryptography (Part - I) | Download To be verified |
20 | Lecture 20 : Hardware for Elliptic Curve Cryptography (Part - II) | Download To be verified |
21 | Lecture 21 : Hardware for Elliptic Curve Cryptography (Part - III) | Download To be verified |
22 | Lecture 22 : Hardware for Elliptic Curve Cryptography (Part - IV) | Download To be verified |
23 | Lecture 23 : Hardware for Elliptic Curve Cryptography (Part - V) | Download To be verified |
24 | Lecture 24 : Introduction to Side Channel Analysis | Download To be verified |
25 | Lecture 25 : Power Analysis (Part – I) | Download To be verified |
26 | Lecture 26 | Download To be verified |
27 | Lecture 27 | Download To be verified |
28 | Lecture 28 | Download To be verified |
29 | Lecture 29 | Download To be verified |
30 | Lecture 30 | Download To be verified |
31 | Lecture 31: Power Analysis (Part – VII) | Download To be verified |
32 | Lecture 32: Power Analysis (Part – VIII) | Download To be verified |
33 | Lecture 33: Power Analysis (Part – IX) | Download To be verified |
34 | Lecture 34: Power Analysis (Part – X) | Download To be verified |
35 | Lecture 35: Power Analysis (Part – XI) | Download To be verified |
36 | Lecture 36: | Download To be verified |
37 | Lecture 37: | Download To be verified |
38 | Lecture 38: | Download To be verified |
39 | Lecture 39: | Download To be verified |
40 | Lecture 40: | Download To be verified |
41 | Lecture 41: Power Analysis (Part – XVII) | Download To be verified |
42 | Lecture 42: Power Analysis (Part – XVIII) | Download To be verified |
43 | Lecture 43: Power Analysis Countermeasures | Download To be verified |
44 | Lecture 44: Power Analysis Countermeasures (Contd.) | Download To be verified |
45 | Lecture 45: Power Analysis Countermeasures (Contd.) | Download To be verified |
46 | Lecture 46 : Fault Analysis of Cryptosystems | Download To be verified |
47 | Lecture 47 : Improved DFA of AES | Download To be verified |
48 | Lecture 48 : Multi-Byte and key Scheduling Based Fault Analysis of AES | Download To be verified |
49 | Lecture 49 : Multi-Byte and key Scheduling Based Fault Analysis of AES(Contd.) | Download To be verified |
50 | Lecture 50 : Redundaney Based Fault Intensity | Download To be verified |
51 | Lecture 51 : Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Contd.) | Download To be verified |
52 | Lecture 52 : Infective Countermeasures for DFA | Download To be verified |
53 | Lecture 53 : Infective Countermeasures for DFA (Contd.) | Download To be verified |
54 | Lecture 54 : Infective Countermeasures for DFA (Contd.) | Download To be verified |
55 | Lecture 55 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphers | Download To be verified |
56 | Lecture 56 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphers(Contd.) | Download To be verified |
57 | Lecture 57 : Microarchitectural attacks: Part II Branch Prediction Attacks | Download To be verified |
58 | Lecture 58 : Microarchitectural attacks: Part II Branch Prediction Attacks(Contd.) | Download To be verified |
59 | Lecture 59 : Microarchitectural attacks: Part III Row Hammer Attacks | Download To be verified |
60 | Lecture 60 : Microarchitectural attacks: Part III Row Hammer Attacks(Contd.) | Download To be verified |
Sl.No | Language | Book link |
---|---|---|
1 | English | Not Available |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |