Modules / Lectures
Module NameDownload
noc19_cs24_Assignment1noc19_cs24_Assignment1
noc19_cs24_Assignment10noc19_cs24_Assignment10
noc19_cs24_Assignment11noc19_cs24_Assignment11
noc19_cs24_Assignment12noc19_cs24_Assignment12
noc19_cs24_Assignment2noc19_cs24_Assignment2
noc19_cs24_Assignment3noc19_cs24_Assignment3
noc19_cs24_Assignment4noc19_cs24_Assignment4
noc19_cs24_Assignment5noc19_cs24_Assignment5
noc19_cs24_Assignment6noc19_cs24_Assignment6
noc19_cs24_Assignment7noc19_cs24_Assignment7
noc19_cs24_Assignment8noc19_cs24_Assignment8
noc19_cs24_Assignment9noc19_cs24_Assignment9


Sl.No Chapter Name MP4 Download
1Lecture 01: Introduction to Hardware Security (Part-1)Download
2Lecture 02: Introduction to Hardware Security (Part-2)Download
3Lecture 03: Algorithm to HardwareDownload
4Lecture 04: Finite Field Architectures-1Download
5Lecture 05:Finite Field Architectures-1 (Contd.)Download
6Lecture 06:Hardware Design for Finite Field InverseDownload
7Lecture 07: Hardware Architecture for Finite Field InverseDownload
8Lecture 08: Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES)Download
9Lecture 09: Advanced Encryption Standard (AES) andSide Channel AnalysisDownload
10Lecture 10: Field IsomorphismsDownload
11Lecture 11: Field Isomorphisms (Contd.)Download
12Lecture 12: : Hardware Implementation of Advanced EncryptionDownload
13Lecture 13:Hardware Implementation of Advanced Encryption Download
14Lecture 14:Hardware Implementation of Advanced Encryption (Contd.)Download
15Lecture 15: Compact AES-BoxDownload
16Lecture 16 : Compact AES S-Box (Part – II)Download
17Lecture 17 : Compact AES S-Box in Normal Basis (Part – I)Download
18Lecture 18 : Compact AES S-Box in Normal Basis (Part – II)Download
19Lecture 19 : Hardware for Elliptic Curve Cryptography (Part - I)Download
20Lecture 20 : Hardware for Elliptic Curve Cryptography (Part - II)Download
21Lecture 21 : Hardware for Elliptic Curve Cryptography (Part - III)Download
22Lecture 22 : Hardware for Elliptic Curve Cryptography (Part - IV)Download
23Lecture 23 : Hardware for Elliptic Curve Cryptography (Part - V)Download
24Lecture 24 : Introduction to Side Channel AnalysisDownload
25Lecture 25 : Power Analysis (Part – I)Download
26Lecture 26Download
27Lecture 27Download
28Lecture 28Download
29Lecture 29 Download
30Lecture 30Download
31Lecture 31: Power Analysis (Part – VII)Download
32Lecture 32: Power Analysis (Part – VIII)Download
33Lecture 33: Power Analysis (Part – IX)Download
34Lecture 34: Power Analysis (Part – X)Download
35Lecture 35: Power Analysis (Part – XI)Download
36Lecture 36: Download
37Lecture 37:Download
38Lecture 38: Download
39Lecture 39: Download
40Lecture 40:Download
41Lecture 41: Power Analysis (Part – XVII)Download
42Lecture 42: Power Analysis (Part – XVIII)Download
43Lecture 43: Power Analysis CountermeasuresDownload
44Lecture 44: Power Analysis Countermeasures (Contd.)Download
45Lecture 45: Power Analysis Countermeasures (Contd.)Download
46Lecture 46 : Fault Analysis of CryptosystemsDownload
47Lecture 47 : Improved DFA of AESDownload
48Lecture 48 : Multi-Byte and key Scheduling Based Fault Analysis of AESDownload
49Lecture 49 : Multi-Byte and key Scheduling Based Fault Analysis of AES(Contd.)Download
50Lecture 50 : Redundaney Based Fault IntensityDownload
51Lecture 51 : Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Contd.)Download
52Lecture 52 : Infective Countermeasures for DFADownload
53Lecture 53 : Infective Countermeasures for DFA (Contd.)Download
54Lecture 54 : Infective Countermeasures for DFA (Contd.)Download
55Lecture 55 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphersDownload
56Lecture 56 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphers(Contd.)Download
57Lecture 57 : Microarchitectural attacks: Part II Branch Prediction AttacksDownload
58Lecture 58 : Microarchitectural attacks: Part II Branch Prediction Attacks(Contd.)Download
59Lecture 59 : Microarchitectural attacks: Part III Row Hammer AttacksDownload
60Lecture 60 : Microarchitectural attacks: Part III Row Hammer Attacks(Contd.)Download

Sl.No Chapter Name English
1Lecture 01: Introduction to Hardware Security (Part-1)Download
To be verified
2Lecture 02: Introduction to Hardware Security (Part-2)Download
To be verified
3Lecture 03: Algorithm to HardwareDownload
To be verified
4Lecture 04: Finite Field Architectures-1Download
To be verified
5Lecture 05:Finite Field Architectures-1 (Contd.)Download
To be verified
6Lecture 06:Hardware Design for Finite Field InverseDownload
To be verified
7Lecture 07: Hardware Architecture for Finite Field InverseDownload
To be verified
8Lecture 08: Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES)Download
To be verified
9Lecture 09: Advanced Encryption Standard (AES) andSide Channel AnalysisDownload
To be verified
10Lecture 10: Field IsomorphismsDownload
To be verified
11Lecture 11: Field Isomorphisms (Contd.)Download
To be verified
12Lecture 12: : Hardware Implementation of Advanced EncryptionDownload
To be verified
13Lecture 13:Hardware Implementation of Advanced Encryption Download
To be verified
14Lecture 14:Hardware Implementation of Advanced Encryption (Contd.)Download
To be verified
15Lecture 15: Compact AES-BoxDownload
To be verified
16Lecture 16 : Compact AES S-Box (Part – II)Download
To be verified
17Lecture 17 : Compact AES S-Box in Normal Basis (Part – I)Download
To be verified
18Lecture 18 : Compact AES S-Box in Normal Basis (Part – II)Download
To be verified
19Lecture 19 : Hardware for Elliptic Curve Cryptography (Part - I)Download
To be verified
20Lecture 20 : Hardware for Elliptic Curve Cryptography (Part - II)Download
To be verified
21Lecture 21 : Hardware for Elliptic Curve Cryptography (Part - III)Download
To be verified
22Lecture 22 : Hardware for Elliptic Curve Cryptography (Part - IV)Download
To be verified
23Lecture 23 : Hardware for Elliptic Curve Cryptography (Part - V)Download
To be verified
24Lecture 24 : Introduction to Side Channel AnalysisDownload
To be verified
25Lecture 25 : Power Analysis (Part – I)Download
To be verified
26Lecture 26Download
To be verified
27Lecture 27Download
To be verified
28Lecture 28Download
To be verified
29Lecture 29 Download
To be verified
30Lecture 30Download
To be verified
31Lecture 31: Power Analysis (Part – VII)Download
To be verified
32Lecture 32: Power Analysis (Part – VIII)Download
To be verified
33Lecture 33: Power Analysis (Part – IX)Download
To be verified
34Lecture 34: Power Analysis (Part – X)Download
To be verified
35Lecture 35: Power Analysis (Part – XI)Download
To be verified
36Lecture 36: Download
To be verified
37Lecture 37:Download
To be verified
38Lecture 38: Download
To be verified
39Lecture 39: Download
To be verified
40Lecture 40:Download
To be verified
41Lecture 41: Power Analysis (Part – XVII)Download
To be verified
42Lecture 42: Power Analysis (Part – XVIII)Download
To be verified
43Lecture 43: Power Analysis CountermeasuresDownload
To be verified
44Lecture 44: Power Analysis Countermeasures (Contd.)Download
To be verified
45Lecture 45: Power Analysis Countermeasures (Contd.)Download
To be verified
46Lecture 46 : Fault Analysis of CryptosystemsDownload
To be verified
47Lecture 47 : Improved DFA of AESDownload
To be verified
48Lecture 48 : Multi-Byte and key Scheduling Based Fault Analysis of AESDownload
To be verified
49Lecture 49 : Multi-Byte and key Scheduling Based Fault Analysis of AES(Contd.)Download
To be verified
50Lecture 50 : Redundaney Based Fault IntensityDownload
To be verified
51Lecture 51 : Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Contd.)Download
To be verified
52Lecture 52 : Infective Countermeasures for DFADownload
To be verified
53Lecture 53 : Infective Countermeasures for DFA (Contd.)Download
To be verified
54Lecture 54 : Infective Countermeasures for DFA (Contd.)Download
To be verified
55Lecture 55 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphersDownload
To be verified
56Lecture 56 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphers(Contd.)Download
To be verified
57Lecture 57 : Microarchitectural attacks: Part II Branch Prediction AttacksDownload
To be verified
58Lecture 58 : Microarchitectural attacks: Part II Branch Prediction Attacks(Contd.)Download
To be verified
59Lecture 59 : Microarchitectural attacks: Part III Row Hammer AttacksDownload
To be verified
60Lecture 60 : Microarchitectural attacks: Part III Row Hammer Attacks(Contd.)Download
To be verified


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available