Modules / Lectures
Module NameDownload
noc19_cs24_Assignment1noc19_cs24_Assignment1
noc19_cs24_Assignment10noc19_cs24_Assignment10
noc19_cs24_Assignment11noc19_cs24_Assignment11
noc19_cs24_Assignment12noc19_cs24_Assignment12
noc19_cs24_Assignment2noc19_cs24_Assignment2
noc19_cs24_Assignment3noc19_cs24_Assignment3
noc19_cs24_Assignment4noc19_cs24_Assignment4
noc19_cs24_Assignment5noc19_cs24_Assignment5
noc19_cs24_Assignment6noc19_cs24_Assignment6
noc19_cs24_Assignment7noc19_cs24_Assignment7
noc19_cs24_Assignment8noc19_cs24_Assignment8
noc19_cs24_Assignment9noc19_cs24_Assignment9

Sl.No Chapter Name English
1Lecture 01: Introduction to Hardware Security (Part-1)PDF unavailable
2Lecture 02: Introduction to Hardware Security (Part-2)PDF unavailable
3Lecture 03: Algorithm to HardwarePDF unavailable
4Lecture 04: Finite Field Architectures-1PDF unavailable
5Lecture 05:Finite Field Architectures-1 (Contd.)PDF unavailable
6Lecture 06:Hardware Design for Finite Field InversePDF unavailable
7Lecture 07: Hardware Architecture for Finite Field InversePDF unavailable
8Lecture 08: Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES)PDF unavailable
9Lecture 09: Advanced Encryption Standard (AES) andSide Channel AnalysisPDF unavailable
10Lecture 10: Field IsomorphismsPDF unavailable
11Lecture 11: Field Isomorphisms (Contd.)PDF unavailable
12Lecture 12: : Hardware Implementation of Advanced EncryptionPDF unavailable
13Lecture 13:Hardware Implementation of Advanced Encryption PDF unavailable
14Lecture 14:Hardware Implementation of Advanced Encryption (Contd.)PDF unavailable
15Lecture 15: Compact AES-BoxPDF unavailable
16Lecture 16 : Compact AES S-Box (Part – II)PDF unavailable
17Lecture 17 : Compact AES S-Box in Normal Basis (Part – I)PDF unavailable
18Lecture 18 : Compact AES S-Box in Normal Basis (Part – II)PDF unavailable
19Lecture 19 : Hardware for Elliptic Curve Cryptography (Part - I)PDF unavailable
20Lecture 20 : Hardware for Elliptic Curve Cryptography (Part - II)PDF unavailable
21Lecture 21 : Hardware for Elliptic Curve Cryptography (Part - III)PDF unavailable
22Lecture 22 : Hardware for Elliptic Curve Cryptography (Part - IV)PDF unavailable
23Lecture 23 : Hardware for Elliptic Curve Cryptography (Part - V)PDF unavailable
24Lecture 24 : Introduction to Side Channel AnalysisPDF unavailable
25Lecture 25 : Power Analysis (Part – I)PDF unavailable
26Lecture 26PDF unavailable
27Lecture 27PDF unavailable
28Lecture 28PDF unavailable
29Lecture 29 PDF unavailable
30Lecture 30PDF unavailable
31Lecture 31: Power Analysis (Part – VII)PDF unavailable
32Lecture 32: Power Analysis (Part – VIII)PDF unavailable
33Lecture 33: Power Analysis (Part – IX)PDF unavailable
34Lecture 34: Power Analysis (Part – X)PDF unavailable
35Lecture 35: Power Analysis (Part – XI)PDF unavailable
36Lecture 36: PDF unavailable
37Lecture 37:PDF unavailable
38Lecture 38: PDF unavailable
39Lecture 39: PDF unavailable
40Lecture 40:PDF unavailable
41Lecture 41: Power Analysis (Part – XVII)PDF unavailable
42Lecture 42: Power Analysis (Part – XVIII)PDF unavailable
43Lecture 43: Power Analysis CountermeasuresPDF unavailable
44Lecture 44: Power Analysis Countermeasures (Contd.)PDF unavailable
45Lecture 45: Power Analysis Countermeasures (Contd.)PDF unavailable
46Lecture 46 : Fault Analysis of CryptosystemsPDF unavailable
47Lecture 47 : Improved DFA of AESPDF unavailable
48Lecture 48 : Multi-Byte and key Scheduling Based Fault Analysis of AESPDF unavailable
49Lecture 49 : Multi-Byte and key Scheduling Based Fault Analysis of AES(Contd.)PDF unavailable
50Lecture 50 : Redundaney Based Fault IntensityPDF unavailable
51Lecture 51 : Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Contd.)PDF unavailable
52Lecture 52 : Infective Countermeasures for DFAPDF unavailable
53Lecture 53 : Infective Countermeasures for DFA (Contd.)PDF unavailable
54Lecture 54 : Infective Countermeasures for DFA (Contd.)PDF unavailable
55Lecture 55 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphersPDF unavailable
56Lecture 56 : Microarchitectural attacks: Part I cache Timing attacks on Block ciphers(Contd.)PDF unavailable
57Lecture 57 : Microarchitectural attacks: Part II Branch Prediction AttacksPDF unavailable
58Lecture 58 : Microarchitectural attacks: Part II Branch Prediction Attacks(Contd.)PDF unavailable
59Lecture 59 : Microarchitectural attacks: Part III Row Hammer AttacksPDF unavailable
60Lecture 60 : Microarchitectural attacks: Part III Row Hammer Attacks(Contd.)PDF unavailable


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available