summaryrefslogtreecommitdiff
path: root/blog/hsm-basics/index.html
diff options
context:
space:
mode:
Diffstat (limited to 'blog/hsm-basics/index.html')
-rw-r--r--blog/hsm-basics/index.html5
1 files changed, 1 insertions, 4 deletions
diff --git a/blog/hsm-basics/index.html b/blog/hsm-basics/index.html
index 738fa5d..054ac42 100644
--- a/blog/hsm-basics/index.html
+++ b/blog/hsm-basics/index.html
@@ -39,8 +39,6 @@
<div class="document">
-<div class="section" id="hardware-security-modules-and-security-research-and-cryptography">
-<h2>Hardware Security Modules and Security Research and Cryptography</h2>
<p>On May 17 2019 I gave a short presentation on the fundamentals of hardware security modules at the weekly seminar of
Prof. Mori's security research working group at Waseda University. The motivation for this was that outside of low-level
hardware security people and people working in the financial industry HSMs are not thought about that often. In
@@ -48,7 +46,6 @@ particular most network or systems security people would not consider them an op
really interesting to think about what could be done with an HSM in conjunction with modern cryptography (instead of
just plain old RSA-OAEP and AES-CBC).</p>
<p><a class="reference external" href="mori_semi_hsm_talk_web.pdf">Click here to download a PDF with the slides for this talk.</a></p>
-</div>
<div class="section" id="ideas-for-research-in-hsms">
<h2>Ideas for research in HSMs</h2>
<p>Preparing for this talk brought me back to some research ideas I've been working on for a while now. Since I'm not sure
@@ -227,7 +224,7 @@ while not providing better sensitivity.</p>
</div>
</div>
</main><footer>
- Copyright © 2023 Jan Sebastian Götte
+ Copyright © 2025 Jan Sebastian Götte
/ <a href="/about/">About</a>
/ <a href="/imprint/">Imprint</a>
</footer>