Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cryptographic Side-Channels on Embedded Devices

NDC Conferences via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the critical security vulnerabilities that arise when cryptographic algorithms are implemented on embedded devices in this comprehensive conference talk. Delve into the concept of side-channel attacks, where seemingly secure cryptographic implementations leak sensitive information through timing variations, power consumption patterns, and electromagnetic emissions that correlate with secret key material. Learn how adversaries can exploit these unintended information leaks to gradually extract secrets and compromise supposedly secure cryptographic schemes. Examine specific attack methodologies targeting mainstream cryptographic algorithms including AES, RSA, and ECDSA, understanding how theoretical security can break down in real-world implementations. Discover practical countermeasures and implementation techniques used to protect against side-channel leakage when deploying cryptography on resource-constrained embedded systems. Gain insights into the intersection of theoretical cryptography and practical security considerations, essential for developers working with secure embedded systems and IoT devices.

Syllabus

Cryptographic Side-Channels on Embedded Devices - Tjerand Silde - NDC TechTown 2025

Taught by

NDC Conferences

Reviews

Start your review of Cryptographic Side-Channels on Embedded Devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.