Secure Implementation Methods

  • Wednesday, February 29, 2012 | 1:00 PM – 1:50 PM | Room: Room 300
View all Sessions

Security is a complex thing to achieve. One has to use secure algorithms, but at the same time, one has to implement the algorithm such that no security breaches will be introduced in the implementation. In this session, two techniques for offering secure implementation of cryptographic primitives (one in software and one in hardware) are described.

Topic 1: Practical realization and elimination of an ECC-related software bug attack
Topic 2: A First-Order Leak-Free Masking Countermeasure

Participants

This document was retrieved from http://www.rsaconference.com/events/us12/agenda/sessions/810/secure-implementation-methods on Mon, 01 Sep 2014 19:32:25 -0400.
© 2014 EMC Corporation. All rights reserved.