YoVDO

Post-Quantum Crypto - Part I

Offered By: TheIACR via YouTube

Tags

Post-Quantum Cryptography Courses Computer Science Courses Cybersecurity Courses Cryptography Courses

Course Description

Overview

Explore the world of post-quantum cryptography in this comprehensive lecture, focusing on the first part of a series. Delve into topics such as masking techniques, the Kyber encryption scheme, and its security features. Learn about attacking and defending masked polynomials, as well as fault attacks on lattice schemes. Gain insights into the analysis of table-based arithmetic to boolean masking. Conclude with a Q&A session to reinforce your understanding of these cutting-edge cryptographic concepts.

Syllabus

Intro
Presentation
Masking Kyber
Secure Kyber
Attacking and defending masked polynomials
Fault attacks on lattice schemes
Analysis of tablebased arithmetic to boolean masking
QA


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera