Introduction - Hardware Security

preview_player
Показать описание
Link to this course:
Introduction - Hardware Security
Cybersecurity Specialization
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
Montgomery Modular Multiplication, Side-Channel Attack, Hardware Design, Cryptographic Hardware
Well presented course that could use a bit of tweaking in terms of the quizzes, but altogether a well composed learning experience.,Amazing short duration but more informative course. Simple to complex problems in Hardware security is elaborated very clearly
To learn hardware security, we first need to learn how hardware is designed. This week's lectures give an overview of the basics on digital logic design, which is a semester-long course for freshmen and sophomores in most schools. By no means we can cover all the materials. What we provide here is the minimal set that you need to understand about digital design for you to move on to learn hardware security.
Introduction - Hardware Security
Copyright Disclaimer under Section 107 of the copyright act 1976, allowance is made for fair use for purposes such as criticism, comment, news reporting, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favour of fair use.
Рекомендации по теме