YoVDO

BLS Signatures, Hashing to Curves, and More - Dispatches from the IETF

Offered By: TheIACR via YouTube

Tags

Cryptography Courses

Course Description

Overview

Explore advanced cryptography standardization at the IETF in this 27-minute conference talk from ACS'19. Dive into the process of writing an RFC with the Crypto Forum Research Group and gain insights from ongoing work on BLS signatures and hash-to-curve standardization efforts. Learn about invalid curve attacks, polite crypto, the official IETF process, RFC editing, patents, pairing-friendly curves, and aggregated signatures. Discover the challenges of rogue key attacks and gain a comprehensive understanding of cutting-edge cryptographic developments.

Syllabus

Intro
Invalid Curve Attack
Polite Crypto
The IETF
The official process
Standardizing
RFC Editor
Patents
Pairing friendly curves
Hashing to curves
BLS signature
Aggregated signatures
Rogue key attack
Recap


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera