YoVDO

Lattice-Based Merkle for Post-Quantum Epoch - DefCamp - 2018

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cryptography Courses Quantum Computing Courses

Course Description

Overview

Explore a conference talk from DefCamp 2018 focusing on lattice-based Merkle trees for post-quantum cryptography. Delve into private and public-key encryption, quantum computing threats, and various signature schemes including Lamport-Diffie and Winternitz. Learn about key generation, document signing, signature verification, and PRNG integration. Understand efficiency problems and potential vulnerabilities in PRNGs. Gain insights into cutting-edge cryptographic techniques designed to withstand quantum computing attacks, presented by experts at one of Central and Eastern Europe's premier information security conferences.

Syllabus

Intro
Private Key Encryption
Public-key encryption
Quantum computers
LAMPORT-DIFFIE ONE-TIME SIGNATURE SCHEME (KEY GENERATION)
DOCUMENT SIGNATURE
WINTERNITZ ONE TIME SIGNATURE SCHEME. KEY GENERATION
SIGNATURE GENERATION
SIGNATURE VERIFICATION
PRNG INTEGRATION
Breaking PRNG
Efficiency problems
THANK YOU! QUESTIONS?


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube