Related-Key Attacks Against Full Hummingbird-2
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a comprehensive analysis of related-key attacks against the full Hummingbird-2 cryptographic algorithm in this 24-minute talk presented by Markku-Juhani Olavi Saarinen at FSE 2013. Delve into the vulnerabilities of this lightweight encryption scheme and gain insights into potential security risks. Examine the methodology used to identify weaknesses and understand the implications for implementing Hummingbird-2 in secure systems.
Syllabus
Related-Key Attacks Against Full Hummingbird-2
Taught by
TheIACR
Related Courses
Assembly Language Adventures (1): Counting with two digitsUdemy Assembly Language Adventures: Complete Course
Udemy OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)
Cybrary Analyzing Wi-Fi Wardriving Data with Google Colab
SecurityFWD via YouTube Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube