YoVDO

Post-Quantum Crypto - Part I

Offered By: TheIACR via YouTube

Tags

Post-Quantum Cryptography Courses Computer Science Courses Cybersecurity Courses Cryptography Courses

Course Description

Overview

Explore the world of post-quantum cryptography in this comprehensive lecture, focusing on the first part of a series. Delve into topics such as masking techniques, the Kyber encryption scheme, and its security features. Learn about attacking and defending masked polynomials, as well as fault attacks on lattice schemes. Gain insights into the analysis of table-based arithmetic to boolean masking. Conclude with a Q&A session to reinforce your understanding of these cutting-edge cryptographic concepts.

Syllabus

Intro
Presentation
Masking Kyber
Secure Kyber
Attacking and defending masked polynomials
Fault attacks on lattice schemes
Analysis of tablebased arithmetic to boolean masking
QA


Taught by

TheIACR

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network