Read our cookies policy and privacy statement for more information.
×Fullerton, California
Secure hardware design and implementation at multiple levels of abstraction, cryptographic hardware primitives, cryptographic modules, trusted platforms, reverse engineering of cryptographic modules using passive attacks, active attacks, and cryptanalytic techniques, countermeasures against reverse engineering
Units: 3.0