- Introduction lecture (Stream cipher, Block cipher, etc. pp.)
- Read DPA Whitepaper (Lecture 2, Slide 3)
- Go trough exercises and extract further information
- Part 1: Shamir's countermeasure (Lecture 2, Slide 21ff)
- Read Cache-timing Attack on AES paper (Lecture 2, Slide 36)
- Part 1: Lecture 3 slides 35ff: PIN generation/verification & Decimalization attack
- x86 black slides in lecture 5/6/7 slides 75ff. -> own part, add stuff from exercises