Related-Key Attacks Against Full Hummingbird-2
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a comprehensive analysis of related-key attacks against the full Hummingbird-2 cryptographic algorithm in this 24-minute talk presented by Markku-Juhani Olavi Saarinen at FSE 2013. Delve into the vulnerabilities of this lightweight encryption scheme and gain insights into potential security risks. Examine the methodology used to identify weaknesses and understand the implications for implementing Hummingbird-2 in secure systems.
Syllabus
Related-Key Attacks Against Full Hummingbird-2
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera