YoVDO

Parallel Hashing via List Recoverability

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Data Security Courses Hashing Algorithms Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of parallel hashing through the lens of list recoverability in this 20-minute conference talk. Delve into the Merkle Tree Construction and the Maurer-Tessaro Scheme before examining the main results of parallel domain extension schemes. Investigate the requirements on C through attack analysis, and learn about error correction codes and list recoverable codes. Conclude by discussing applications beyond collision resistance and considering open questions in the field.

Syllabus

Intro
The Merkle Tree Construction Merkle 87
The Maurer-Tessaro Scheme [MT 07]
Overview of the Main Result
Parallel Domain Extension Scheme
Requirements on C - via Attacks
Error Correction Codes
List Recoverable Codes
Beyond Collision Resistance
Open Questions


Taught by

TheIACR

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube