Misc
This page features a collection of introductory slides covering a range of technical topics. I'm not an expert on all of these topics, this is mostly my own understanding. Therefore, I encourage you to cross-check those information with experts in each subfield.
Post-Quantum Cryptography
-
Introduction to Hash-based signature schemes: Introduction to LMS, XMSS, Sphincs+ and the most critical point of attention you should have to assess the security implementation of such mechanisms.
-
Introduction to Lattice-based cryptographic scheme: Introduction to Kyber, Dilithium and the most critical point of attention you should have to assess the security implementation of such mechanisms.
-
Security analysis of FrodoKEM: Analysis of the following FrodoKEM implementation.
Security of AI
- Introduction to cryptanalytical-based model extraction attacks: Introduction to the state-of-the-art methods, the practical limitation and the benefits of using physical attakcs.
Deep-Learning-based Side-Channel Attacks
- Introduction to the application of generative model in DLSCA: Introduction to the conditional variational autoencoder, the link with the stochastic attacks and the optimal dimensionality reduction.