Education & Training

Security experts from Cryptography Research provide technical tutorials, hands-on workshops, and training seminars with facilitated discussion. Clients use our training to understand security-critical challenges and help project teams transition to new security problems. Training sessions are typically 1-4 working days and can be delivered at your office or at our San Francisco headquarters.

Upcoming Workshops

Date City Content Duration
Feb 4, 2015 San Francisco, CA Side-Channel AnalysisParticipants will perform hands-on exercises including using SPA (simple power analysis) to interpret power traces and recover secrets. Live attacks will be performed on mobile phones and the SASEBO FPGA platform using the DPA (differential power analysis) Workstation™.

Our security experts will examine practical design approaches to counter power-analysis threats and the state of associated U.S. and international security evaluation certifications.


Who Should Attend

Cryptography Workshop Application

Apply to Attend



Are you a...*

Would you like to receive Cryptography Research email updates?


Form View Counter
  • Developers and architects of hardware and software security products
  • Evaluators and technical writers of requirements for tamper resistant products
  • Technologists designing and testing tamper resistant systems for mobile devices, financial systems, pay television, mass transit, secure ID, secure storage media, entertainment and government/defense applications


Standard Attendee $495
Government Employee $295
DPA Workstation Customer $295
DPA Workstation Customer with a Support Contract Complimentary
DPA Countermeasures Licensee Complimentary
2-Day Workshop Standard Attendee Rate $795, Government and Customer Discounts available
ScholarshipsA limited number of scholarships are available to graduate and recent post-graduate students. If you would like to be considered, email a background statement describing areas of expertise, security interests, and familiarity with side channel analysis to Complimentary

Seating is limited and priority is given to licensees and existing customers. Registration will close when capacity is met.

Sample Agendas

1-Day Workshop Agenda

Recommended Reading

Cryptography Concepts and Background


If you have any questions, please email