YoVDO

Malicious Cryptography: Beyond Adhering to Specifications in Secure Systems - ICBS 2024

Offered By: BIMSA via YouTube

Tags

Cryptography Courses Ransomware Courses Complexity Theory Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of "Malicious Cryptography" in this comprehensive lecture by Moti Yung at ICBS2024. Delve into how cryptographic systems can be redirected and repurposed beyond their initial specifications, sometimes contradicting their intended use. Examine case studies including the breaking of fielded Escrow Encryptions and the prediction of Ransomware with its countermeasures. Investigate systematic treatments of repurposed cryptographic systems, covering topics such as Kleptography, Post Snowden Cryptography, and Anamorphic Encryption. Gain insights into the challenges of careless cryptography use and design, as well as the limitations imposed by adversarial bodies in the "Crypto Wars". Learn how these concepts have evolved over the past three decades and their implications for modern cryptographic systems.

Syllabus

Moti Yung: Malicious Cryptography: beyond adhering to specifications in secure systems #ICBS2024


Taught by

BIMSA

Related Courses

The Next Generation of Infrastructure
Delft University of Technology via edX
The Beauty and Joy of Computing - AP® CS Principles Part 2
University of California, Berkeley via edX
Advanced Data Structures in Java
University of California, San Diego via Coursera
Theory of Computation
Indian Institute of Technology Kanpur via Swayam
离散数学
Shanghai Jiao Tong University via Coursera