Software Signing and Models in Automotive

preview_player
Показать описание
This is the third of series of my videos on automotive cyber security. Part 3 focuses on software signing and software signing models.
Рекомендации по теме
Комментарии
Автор

thank you so much for this presentation …really helpful ...waiting for more such sessions

warrior
Автор

Nice and informative video Suki! Consider making a video on Secure Boot as a continuation of this one.

shivaprakash
Автор

too informative!! could you please share me with the presentation file? thank you very much. And, what will be the case for Sign the SW in absence of HSM?

dongachirag
Автор

Are you sure that to encrypt the digest we use the private key ? And for decryption, are you sure that we use the public key to decrypt ? because typically using RSA, this is now how it's supposed to be implemented. We use the receiver's private key to encrypt, and the receiver uses his private key to decrypt.

nicolasfischer
join shbcf.ru