YoVDO

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Collision Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cryptographic analysis presented at FSE 2013 focusing on collision attacks against the SHA-3 hash function. Delve into the research conducted by Itai Dinur, Orr Dunkelman, and Adi Shamir, which examines vulnerabilities in up to 5 rounds of SHA-3 using generalized internal differentials. Gain insights into advanced cryptanalysis techniques and their implications for the security of modern hash functions.

Syllabus

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials


Taught by

TheIACR

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube