Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced cryptographic security vulnerabilities through this conference session from Crypto 2025, chaired by Eran Tromer. Delve into the sophisticated methods attackers use to extract sensitive information from cryptographic implementations by analyzing physical characteristics such as power consumption, electromagnetic emissions, timing variations, and acoustic signatures. Learn how these attacks bypass traditional cryptographic protections by exploiting unintended information leakage from hardware and software implementations. Examine real-world case studies, attack methodologies, and defensive countermeasures that security researchers and practitioners employ to protect against these threats. Gain insights into the latest research developments in side-channel analysis, including both passive and active attack techniques, and understand the implications for modern cryptographic system design and implementation security.