Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a comprehensive analysis of second preimage attacks on hash combiners in this 21-minute conference talk presented at Crypto 2017. Delve into the research conducted by Zhenzhen Bao, Lei Wang, Jian Guo, and Dawu Gu as they revisit the concept of functional graphs and provide updates on cryptographic security. Gain insights into the latest developments in hash function security and the potential vulnerabilities of hash combiners. Examine the implications of these findings for cryptographic protocols and learn about the cutting-edge techniques used in analyzing hash function security.
Syllabus
Functional Graph Revisited Updates on Second Preimage Attacks on Hash Combiners
Taught by
TheIACR
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight