1. Introduction
  2. Random Number Generators (RNG) & True RNG
  3. Evaluation Criteria for Physical RNG
  4. Arithmetic for Hardware Cryptography
  5. Instruction Set Extension for Cryptographic Applications
  6. FPGA and ASIC Implementations
  7. Side Channel Attacks
  8. Microarchitectural Attacks and Counter Measures
  9. Each topic is covered in one two-hour meeting for a total of 16 hours.