YoVDO

Parallel Hashing via List Recoverability

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Data Security Courses Hashing Algorithms Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of parallel hashing through the lens of list recoverability in this 20-minute conference talk. Delve into the Merkle Tree Construction and the Maurer-Tessaro Scheme before examining the main results of parallel domain extension schemes. Investigate the requirements on C through attack analysis, and learn about error correction codes and list recoverable codes. Conclude by discussing applications beyond collision resistance and considering open questions in the field.

Syllabus

Intro
The Merkle Tree Construction Merkle 87
The Maurer-Tessaro Scheme [MT 07]
Overview of the Main Result
Parallel Domain Extension Scheme
Requirements on C - via Attacks
Error Correction Codes
List Recoverable Codes
Beyond Collision Resistance
Open Questions


Taught by

TheIACR

Related Courses

Managing Devices using Enterprise Mobility Suite
Microsoft via edX
Firebase Essentials For Android
Google via Udacity
Research Data Management and Sharing
The University of North Carolina at Chapel Hill via Coursera
SAP HANA CLOUD PLATFORM の重要事項
SAP Learning
Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms