This course has already ended.

Cryptographic Implementation

Cryptographic Libraries

API Design for Cryptographic Libraries

Implementation Challenges

Length Side Channels

Timing Side Channels

Error Side Channels

Attacks Arising from Shared Resources

Implementation Weaknesses

Attacks Arising from Composition

Hardware Side Channels

Fault Attacks

Defences

Random Bit Generation

Posting submission...