Cryptographic Implementation
Cryptographic Libraries
API Design for Cryptographic Libraries
Implementation Challenges
Length Side Channels
Timing Side Channels
Error Side Channels
Attacks Arising from Shared Resources
Implementation Weaknesses
Attacks Arising from Composition
Hardware Side Channels
Fault Attacks
Defences
Random Bit Generation