Security division Icon

Security

Education & Training

Our security experts provide technical tutorials, hands-on workshops, and training seminars with facilitated discussion. Clients use our training to understand security-critical challenges and help project teams transition to new security problems. Training sessions are typically 1-4 working days and can be delivered at your office or at our San Francisco office.

Contact

Who should attend:

  • Developers and architects of hardware and software security products
  • Evaluators and technical writers of requirements for tamper resistant products
  • Technologists designing and testing tamper resistant systems for mobile devices, financial systems, pay television, mass transit, secure ID, secure storage media, entertainment and government/defense applications
Price
Standard Attendee $495
Government Employee $295
DPA Workstation Customer $295
DPA Workstation Customer with a Support Contract Complimentary
DPA Countermeasures Licensee Complimentary
2-Day Workshop Standard Attendee Rate General – $795,

Government employees and contractors – $495

Scholarships: A limited number of scholarships are available to graduate and recent post-graduate students. Complimentary

 

Payment is due before the training. Seating is limited and priority is given to licensees and existing customers. Registration will close when capacity is met. Rambus further reserves the right to cancel the training if less than 3 people have registered for that date. In that case we will refund the money or propose to you a rescheduled training.

Sample Agendas
One-day sample agenda 2016
Two-day sample agenda 2016

Recommended Reading
Cryptography Concepts and Background

Additional Information
Nearby hotels in San Francisco
Transportation to San Francisco office

Inventions

DPA Countermeasures

security-icon

DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software,

Related Markets & Applications

Aerospace & Defense
IoT
Mobile Edge