Riscure Side Channel Webinar, Post-Quantum Cryptography, November 2024
Join our special webinar to discuss the latest developments in device security.
Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation
As quantum computing advances, the security of traditional cryptographic algorithms like RSA and ECC is increasingly at risk. While quantum computers capable of breaking these algorithms are not ...
Professionalizing Fault Injection
Hobbyists and hackers are typically not well-funded, but often have excellent technical capabilities and a lot of time. Fault Injection can be a tedious task given the perceived need of ...
In this webinar we will discuss how hardware developers can benefit from advanced Pre-Silicon testing that can predict security vulnerabilities during the design stage.
Inspector Pre-Silicon SCA: Revolutionizing Side Channel Analysis with Advanced Detection
Discover the benefits of pre-silicon side channel analysis and learn how to apply Inspector Pre-Silicon for advanced detection.
Exploring genomic sequence alignment for improving side-channel analysis
This paper explores a novel approach to improving Side-Channel Analysis (SCA) alignment, drawing inspiration from molecular biology and employing Multiple Sequence Alignment techniques to align ...
The Threat of Security Vulnerabilities in Today’s Connected Automotive World
Testing and verifying security robustness throughout all stages of development, starting from the design phase, is the only cost-effective way to successfully address growing security and ...
Glitching the Keepkey Crypto Wallet
In this session, we will be glitching the KeepKey Crypto Wallet to illustrate a cyber-attack, meticulously examining the attack's intricacies and the extent of damage an exploitative hacker can cause.
Deep Learning in Side Channel Analysis
Learn about Riscure’s latest developments in Deep Learning for Side Channel Analysis.
Don’t Let Your Software Be Derailed by a Hardware Attack
In this presentation, we will thoroughly explore the most up-to-date mitigation patterns for fault injection. Additionally, we will emphasize the significance of reinforcing code during the ...
Failure Analysis for SCA Thermal Laser Stimulation
In this 12-minute presentation, Our Principal Researcher, Dennis Vermoen will share details about this method, the results that we have achieved, and the specific products needed to build a ...
20 Ways Past Secure Boot
This discussion covers the mechanisms behind Secure Boot, its potential vulnerabilities, and various methods attackers may use to compromise it.