Secure Implementation Methods

  • Wednesday, February 29, 2012 | 1:00 PM – 1:50 PM | Room: Room 300

View all Sessions

Security is a complex thing to achieve. One has to use secure algorithms, but at the same time, one has to implement the algorithm such that no security breaches will be introduced in the implementation. In this session, two techniques for offering secure implementation of cryptographic primitives (one in software and one in hardware) are described.

Topic 1: Practical realization and elimination of an ECC-related software bug attack
Topic 2: A First-Order Leak-Free Masking Countermeasure


This document was retrieved from on Thu, 23 May 2019 03:51:35 -0400.