CSE/CEN 598 Hardware Security & Trust

Spring 2026


Lecture Notes

Lecture notes will be posted in advance to lectures so you can print and bring them to class:

  • L-01: Hardware Security Introduction [pdf] [notes-pdf]
  • L-02: Classic and Modern Encryption Algorithms [pdf] [notes-pdf]
  • L-03: Public Key Infrastructure [pdf] [notes-pdf]
  • L-04: Information, Covert, & Side Channels [pdf] [notes-pdf]
  • L-05: Hardware Root-of-Trust Design [pdf] [notes-pdf]
  • L-06-P1: Trusted Digital System Design - Verilog Fundamentals I [pdf] [notes-pdf]
  • L-06-P2: Trusted Digital System Design - Verilog Fundamentals II [pdf] [notes-pdf]
  • L-06: Physical Unclonable Functions [pdf] [notes-pdf]
  • L-07: Oblivious RAM (ORAM) & Rowhammer [pdf] [notes-pdf]
  • L-08: Hardware Trojans [pdf] [notes-pdf]
  • L-09: Anti-Tamper [pdf] [notes-pdf]
  • L-10: Secure Computation Approaches: MPC [pdf] [notes-pdf]
  • L-11: Secure Computation Approaches: Homomorphic Encryption [pdf] [notes-pdf]
  • L-12: Secure Computation Approaches: Quantum-Resistant Designs [pdf] [notes-pdf]
  • L-13: Secure Computation Approaches: Trusted Execution Environment (TEE) [pdf] [notes-pdf]

These lecture notes are presented to ensure timely dissemination of the course material. Some of the slides may contain copyrighted materials.