Estonian Winter Schools in Computer Science
Eesti arvutiteaduse talvekoolid
We will cover methods, systems and constructions that attempt to prrotect cryptosystems against leakage of keys. Such exposure of keys may be one of the most serious threats to deployed cryptosystems in practice and methods are needed to take care of such potential attacks. Regular systems are seriously damaged by the exposure of their keys and in order to cope with such exposure or limit their global damage, new design methodologies are needed.
Modified Aug 16, 2007 10:28