YoVDO

Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of second preimage attacks on hash combiners in this 21-minute conference talk presented at Crypto 2017. Delve into the research conducted by Zhenzhen Bao, Lei Wang, Jian Guo, and Dawu Gu as they revisit the concept of functional graphs and provide updates on cryptographic security. Gain insights into the latest developments in hash function security and the potential vulnerabilities of hash combiners. Examine the implications of these findings for cryptographic protocols and learn about the cutting-edge techniques used in analyzing hash function security.

Syllabus

Functional Graph Revisited Updates on Second Preimage Attacks on Hash Combiners


Taught by

TheIACR

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network