NOC:Hardware Security (USB)

₹950.00
In stock



Media Storage Type : 32 GB USB Stick

NPTEL Subject Matter Expert : Dr. Debdeep Mukhopadhyay

NPTEL Co-ordinating Institute : IIT Kharagpur

NPTEL Lecture Count : 60

NPTEL Course Size : 15 GB

NPTEL PDF Text Transcription : Available and Included

NPTEL Subtitle Transcription : Available and Included (SRT)


Lecture Titles:

Lecture 1 - Introduction to Hardware Security - Part 1
Lecture 2 - Introduction to Hardware Security - Part 2
Lecture 3 - Algorithm to Hardware
Lecture 4 - Finite Field Architectures - 1
Lecture 5 - Finite Field Architectures - 1 (Continued...)
Lecture 6 - Hardware Design for Finite Field Inverse
Lecture 7 - Hardware Architecture for Finite Field Inverse
Lecture 8 - Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES)
Lecture 9 - Advanced Encryption Standard (AES) andSide Channel Analysis
Lecture 10 - Field Isomorphisms
Lecture 11 - Field Isomorphisms (Continued...)
Lecture 12 - Hardware Implementation of Advanced Encryption
Lecture 13 - Hardware Implementation of Advanced Encryption
Lecture 14 - Hardware Implementation of Advanced Encryption (Continued...)
Lecture 15 - Compact AES-Box
Lecture 16 - Compact AES S-Box - Part II
Lecture 17 - Compact AES S-Box in Normal Basis - Part I
Lecture 18 - Compact AES S-Box in Normal Basis - Part II
Lecture 19 - Hardware for Elliptic Curve Cryptography - Part I
Lecture 20 - Hardware for Elliptic Curve Cryptography - Part II
Lecture 21 - Hardware for Elliptic Curve Cryptography - Part III
Lecture 22 - Hardware for Elliptic Curve Cryptography - Part IV
Lecture 23 - Hardware for Elliptic Curve Cryptography - Part V
Lecture 24 - Introduction to Side Channel Analysis
Lecture 25 - Power Analysis - Part I
Lecture 26
Lecture 27
Lecture 28
Lecture 29
Lecture 30
Lecture 31 - Power Analysis - Part VII
Lecture 32 - Power Analysis - Part VIII
Lecture 33 - Power Analysis - Part IX
Lecture 34 - Power Analysis - Part X
Lecture 35 - Power Analysis - Part XI
Lecture 36
Lecture 37
Lecture 38
Lecture 39
Lecture 40
Lecture 41 - Power Analysis - Part XVII
Lecture 42 - Power Analysis - Part XVIII
Lecture 43 - Power Analysis Countermeasures
Lecture 44 - Power Analysis Countermeasures (Continued...)
Lecture 45 - Power Analysis Countermeasures (Continued...)
Lecture 46 - Fault Analysis of Cryptosystems
Lecture 47 - Improved DFA of AES
Lecture 48 - Multi-Byte and key Scheduling Based Fault Analysis of AES
Lecture 49 - Multi-Byte and key Scheduling Based Fault Analysis of AES (Continued...)
Lecture 50 - Redundaney Based Fault Intensity
Lecture 51 - Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Continued...)
Lecture 52 - Infective Countermeasures for DFA
Lecture 53 - Infective Countermeasures for DFA (Continued...)
Lecture 54 - Infective Countermeasures for DFA (Continued...)
Lecture 55 - Microarchitectural attacks: Part I cache Timing attacks on Block ciphers
Lecture 56 - Microarchitectural attacks: Part I cache Timing attacks on Block ciphers (Continued...)
Lecture 57 - Microarchitectural attacks: Part II Branch Prediction Attacks
Lecture 58 - Microarchitectural attacks: Part II Branch Prediction Attacks (Continued...)
Lecture 59 - Microarchitectural attacks: Part III Row Hammer Attacks
Lecture 60 - Microarchitectural attacks: Part III Row Hammer Attacks (Continued...)

Write Your Own Review
You're reviewing:NOC:Hardware Security (USB)