YoVDO

Leftover Hash Lemma, Revisited

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Key Derivation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of the Leftover Hash Lemma (LHL) and its limitations in this Crypto 2011 conference talk. Delve into innovative approaches to overcome the drawbacks of large entropy loss and large seed length in LHL-based extractors. Discover how entropy loss can be reduced for deriving secret keys in various cryptographic applications, and examine the security implications of this reduction. Investigate the soundness of the expand-then-extract approach, which combines pseudorandom generators with randomness extractors. Learn about the conditions under which this approach is secure and its potential applications in practical scenarios. Gain insights into the latest advancements in randomness extraction techniques and their impact on cryptographic key derivation functions.

Syllabus

Leftover Hash Lemma, Revisited (Crypto 2011)


Taught by

TheIACR

Related Courses

Raccoon Attack - Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
TheIACR via YouTube
Applied Cryptography and Trust - Hashing
Bill Buchanan OBE via YouTube
Golang and Cryptography - Part 1
Bill Buchanan OBE via YouTube
I Am AD FS and So Can You - Attacking Active Directory Federated Services
WEareTROOPERS via YouTube
Secure Channels - Building Real World Crypto Systems
BruCON Security Conference via YouTube