YoVDO

Post-Quantum Crypto - Part I

Offered By: TheIACR via YouTube

Tags

Post-Quantum Cryptography Courses Computer Science Courses Cybersecurity Courses Cryptography Courses

Course Description

Overview

Explore the world of post-quantum cryptography in this comprehensive lecture, focusing on the first part of a series. Delve into topics such as masking techniques, the Kyber encryption scheme, and its security features. Learn about attacking and defending masked polynomials, as well as fault attacks on lattice schemes. Gain insights into the analysis of table-based arithmetic to boolean masking. Conclude with a Q&A session to reinforce your understanding of these cutting-edge cryptographic concepts.

Syllabus

Intro
Presentation
Masking Kyber
Secure Kyber
Attacking and defending masked polynomials
Fault attacks on lattice schemes
Analysis of tablebased arithmetic to boolean masking
QA


Taught by

TheIACR

Related Courses

Probabilistic Graphical Models 1: Representation
Stanford University via Coursera
Computer Security
Stanford University via Coursera
Intro to Computer Science
University of Virginia via Udacity
Introduction to Logic
Stanford University via Coursera
Internet History, Technology, and Security
University of Michigan via Coursera