Boosting Authenticated Encryption Robustness With Minimal Modifications
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a comprehensive analysis of authenticated encryption robustness in this 24-minute conference talk presented at Crypto 2017. Delve into the deployment of GCM, learn about exploiting already deployed algorithms, and understand the research motivation behind enhancing encryption security. Examine NonSmiths Resistance and Security, investigate potential attacks, and gain insights into Nonce Misuse Resilience. Conclude by exploring the concept of Unverified Plain Text, providing a thorough overview of cutting-edge developments in cryptographic security.
Syllabus
Intro
Deployment of GCM
Exploiting already deployed algorithms
Research Motivation
NonSmiths Resistance
NonSmiths Security
Attacks
Nonce Misuse Resilience
Unverified Plain Text
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera