YoVDO

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Collision Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cryptographic analysis presented at FSE 2013 focusing on collision attacks against the SHA-3 hash function. Delve into the research conducted by Itai Dinur, Orr Dunkelman, and Adi Shamir, which examines vulnerabilities in up to 5 rounds of SHA-3 using generalized internal differentials. Gain insights into advanced cryptanalysis techniques and their implications for the security of modern hash functions.

Syllabus

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials


Taught by

TheIACR

Related Courses

On the Practical - In-Security of 64-bit Block Ciphers - Collision Attacks on HTTP over TLS and OpenVPN
Association for Computing Machinery (ACM) via YouTube
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS
Black Hat via YouTube
How We Created the First SHA-1 Collision and What it Means for Hash Security
Black Hat via YouTube
Machine Learning and Side-Channel Analysis - Part 2
TheIACR via YouTube
Hash Function Cryptanalysis - Session 14
TheIACR via YouTube