YoVDO

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Collision Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cryptographic analysis presented at FSE 2013 focusing on collision attacks against the SHA-3 hash function. Delve into the research conducted by Itai Dinur, Orr Dunkelman, and Adi Shamir, which examines vulnerabilities in up to 5 rounds of SHA-3 using generalized internal differentials. Gain insights into advanced cryptanalysis techniques and their implications for the security of modern hash functions.

Syllabus

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera