YoVDO

Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of second preimage attacks on hash combiners in this 21-minute conference talk presented at Crypto 2017. Delve into the research conducted by Zhenzhen Bao, Lei Wang, Jian Guo, and Dawu Gu as they revisit the concept of functional graphs and provide updates on cryptographic security. Gain insights into the latest developments in hash function security and the potential vulnerabilities of hash combiners. Examine the implications of these findings for cryptographic protocols and learn about the cutting-edge techniques used in analyzing hash function security.

Syllabus

Functional Graph Revisited Updates on Second Preimage Attacks on Hash Combiners


Taught by

TheIACR

Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight