Secure Implementation Methods
Security is a complex thing to achieve. One has to use secure algorithms, but at the same time, one has to implement the algorithm such that no security breaches will be introduced in the implementation. In this session, two techniques for offering secure implementation of cryptographic primitives (one in software and one in hardware) are described.
Topic 1: Practical realization and elimination of an ECC-related software bug attack
Topic 2: A First-Order Leak-Free Masking Countermeasure