This schedule is subject to change. Please check back frequently.
Week | Tentative Topics | Instructor | Assignments & Quiz Announcements |
Required Readings and Videos |
Lecture Recordings | Remarks |
---|---|---|---|---|---|---|
Week 1 | Introduction to Hardware Security |
DM |
-- |
Video Lectures
|
- | -- |
Week 2 |
Introduction to Hardware Security Introduction to Verilog Demo: ISE and Vivado Toolflow |
DM |
-- |
Video Lectures
|
- | -- |
Week 3 |
Algorithm to Hardware Finite Field Architectures |
DM |
-- | Video Lectures
|
- | -- |
Week 4 |
Finite Field Architectures Hardware Design for Finite Inverse |
DM |
-- | Video Lectures
|
- | -- |
Week 5 |
Hardware Architecture for Finite Inverse |
DM |
-- | Video Lectures
|
- | -- |
Week 6 |
Background Cryptography, Cryptanalysis and Advanced Encryption Standard (AES) Advance Encryption Standard(AES) and Side Channel Analysis Field Isomorphisms |
DM |
-- | Video Lectures
|
- | -- |
Week 7 |
Field Isomorphism (Cont.) Hardware Implementation of Advanced Encryption Standard |
DM |
-- | Video Lectures
|
- | -- |
Week 8 |
Hardware Implementation of Advanced Encryption Standard Introduction to Side Channel Analysis |
DM |
-- | Video Lectures
|
- | -- |
Week 9 |
Power Analysis |
DM |
-- | Video Lectures
|
- | -- |
Week 10 |
Power Analysis 3 Power Attack Demo Fault Analysis of Cryptosystems |
DM |
-- | Video Lectures
|
- | -- |
Week 11 |
Power Side-Channel Attacks using Deep Learning |
DM |
-- | Video Lectures -- | - | -- |
Week 12 |
Power Side-Channel Attacks using Deep Learning Logic Locking |
DM |
-- | Video Lectures -- | - | -- |
Week 13 |
Power Attack Countermeasures |
DM |
-- | Video Lectures
|
- | -- |
Week 14 |
Threshold Implementation |
DM |
-- | Video Lectures
|
- | -- |