BLS Signatures, Hashing to Curves, and More - Dispatches from the IETF
Offered By: TheIACR via YouTube
Course Description
Overview
Explore advanced cryptography standardization at the IETF in this 27-minute conference talk from ACS'19. Dive into the process of writing an RFC with the Crypto Forum Research Group and gain insights from ongoing work on BLS signatures and hash-to-curve standardization efforts. Learn about invalid curve attacks, polite crypto, the official IETF process, RFC editing, patents, pairing-friendly curves, and aggregated signatures. Discover the challenges of rogue key attacks and gain a comprehensive understanding of cutting-edge cryptographic developments.
Syllabus
Intro
Invalid Curve Attack
Polite Crypto
The IETF
The official process
Standardizing
RFC Editor
Patents
Pairing friendly curves
Hashing to curves
BLS signature
Aggregated signatures
Rogue key attack
Recap
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera