YoVDO

Authenticated Encryption in the Face of Protocol and Side Channel Leakage

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Authenticated Encryption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore authenticated encryption in the context of protocol and side channel leakage in this 25-minute conference talk presented at Asiacrypt 2017. Delve into the research paper by Guy Barwell, Daniel P. Martin, Elisabeth Oswald, and Martijn Stam, which examines the challenges and potential solutions in cryptographic systems. Learn about behavior assumptions, standard security notions, and restrictions in authenticated encryption. Discover the three types of goals in this field and understand the concepts of fictions, loops, and internal variables. Gain insights into SVTPRF, leakage, PRF Split, and backside leakage as the presenters discuss their findings and implications for cryptographic security.

Syllabus

Intro
Title
The Good News
Three Questions
Outline
Behavior assumptions
Standard security notion
Restrictions
Three Types of Goals
No Main Extension
Schemes
Fictions
Loops
Internal variables
What helps to look at
SVT
PRF
Leakage
PRF Split
Backside Leakage


Taught by

TheIACR

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube