Online Authenticated Encryption and its Nonce Reuse Misuse Resistance
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the intricacies of online authenticated encryption and its nonce reuse misuse resistance in this informative 27-minute video. Delve into the fundamental concepts and advanced techniques used to ensure secure data transmission and storage. Learn about the importance of nonce (number used once) in cryptographic operations and understand the potential vulnerabilities that can arise from nonce reuse. Discover how misuse-resistant authenticated encryption schemes are designed to mitigate risks associated with nonce reuse, providing an additional layer of security in real-world applications. Gain valuable insights into the latest developments in cryptographic protocols and their practical implementations for safeguarding sensitive information in online environments.
Syllabus
Online Authenticated Encryption and its Nonce Reuse Misuse Resistance
Taught by
TheIACR
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network