NPTEL : NOC:Hardware Security (Computer Science and Engineering)

Co-ordinators : Dr. Debdeep Mukhopadhyay


Lecture 1 - Introduction to Hardware Security - Part 1

Lecture 2 - Introduction to Hardware Security - Part 2

Lecture 3 - Algorithm to Hardware

Lecture 4 - Finite Field Architectures - 1

Lecture 5 - Finite Field Architectures - 1 (Continued...)

Lecture 6 - Hardware Design for Finite Field Inverse

Lecture 7 - Hardware Architecture for Finite Field Inverse

Lecture 8 - Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES)

Lecture 9 - Advanced Encryption Standard (AES) andSide Channel Analysis

Lecture 10 - Field Isomorphisms

Lecture 11 - Field Isomorphisms (Continued...)

Lecture 12 - Hardware Implementation of Advanced Encryption

Lecture 13 - Hardware Implementation of Advanced Encryption

Lecture 14 - Hardware Implementation of Advanced Encryption (Continued...)

Lecture 15 - Compact AES-Box

Lecture 16 - Compact AES S-Box - Part II

Lecture 17 - Compact AES S-Box in Normal Basis - Part I

Lecture 18 - Compact AES S-Box in Normal Basis - Part II

Lecture 19 - Hardware for Elliptic Curve Cryptography - Part I

Lecture 20 - Hardware for Elliptic Curve Cryptography - Part II

Lecture 21 - Hardware for Elliptic Curve Cryptography - Part III

Lecture 22 - Hardware for Elliptic Curve Cryptography - Part IV

Lecture 23 - Hardware for Elliptic Curve Cryptography - Part V

Lecture 24 - Introduction to Side Channel Analysis

Lecture 25 - Power Analysis - Part I

Lecture 26 - Power Analysis - Part II

Lecture 27 - Power Analysis - Part III

Lecture 28 - Power Analysis - Part IV

Lecture 29 - Power Analysis - Part V

Lecture 30 - Power Analysis - Part VI

Lecture 31 - Power Analysis - Part VII

Lecture 32 - Power Analysis - Part VIII

Lecture 33 - Power Analysis - Part IX

Lecture 34 - Power Analysis - Part X

Lecture 35 - Power Analysis - Part XI

Lecture 36 - Power Analysis - Part XII

Lecture 37 - Power Analysis - Part XIII

Lecture 38 - Power Analysis - Part XIV

Lecture 39 - Power Analysis - Part XV

Lecture 40 - Power Analysis - Part XVI

Lecture 41 - Power Analysis - Part XVII

Lecture 42 - Power Analysis - Part XVIII

Lecture 43 - Power Analysis Countermeasures

Lecture 44 - Power Analysis Countermeasures (Continued...)

Lecture 45 - Power Analysis Countermeasures (Continued...)

Lecture 46 - Fault Analysis of Cryptosystems

Lecture 47 - Improved DFA of AES

Lecture 48 - Multi-Byte and key Scheduling Based Fault Analysis of AES

Lecture 49 - Multi-Byte and key Scheduling Based Fault Analysis of AES (Continued...)

Lecture 50 - Redundaney Based Fault Intensity

Lecture 51 - Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Continued...)

Lecture 52 - Infective Countermeasures for DFA

Lecture 53 - Infective Countermeasures for DFA (Continued...)

Lecture 54 - Infective Countermeasures for DFA (Continued...)

Lecture 55 - Microarchitectural attacks: Part I cache Timing attacks on Block ciphers

Lecture 56 - Microarchitectural attacks: Part I cache Timing attacks on Block ciphers (Continued...)

Lecture 57 - Microarchitectural attacks: Part II Branch Prediction Attacks

Lecture 58 - Microarchitectural attacks: Part II Branch Prediction Attacks (Continued...)

Lecture 59 - Microarchitectural attacks: Part III Row Hammer Attacks

Lecture 60 - Microarchitectural attacks: Part III Row Hammer Attacks (Continued...)