Isogeny-Based Cryptography
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the cutting-edge field of isogeny-based cryptography in this comprehensive lecture. Delve into the crypto universe and cryptomania while examining main contributions and results in post-quantum primitives. Discover the core ideas, pros, and cons of isogeny-based systems, and learn about optimizations, radical isogenies, and root extraction techniques. Investigate isogeny pseudorandom functions, efficient signatures, and Sigma protocols. Gain insights into open questions and future directions in this rapidly evolving area of cryptography.
Syllabus
Introduction
Crypto universe
Cryptomania
Main Contribution
Main Results
PostQuantum Primitives
Open Questions
The Idea
Pros Cons
Result
Motivation
Optimizations
Radical Isogenes
Root Extraction
Conclusion
Isogeny pseudorandom functions
Efficient signatures
Sigma
Taught by
TheIACR
Related Courses
Security Engineering: Automation for CompTIA SecurityXPluralsight On the Security of Proofs of Sequential Work in a Post-Quantum World
Paul G. Allen School via YouTube Post-Quantum Isogeny Cryptography
media.ccc.de via YouTube A Cartoon-Based Introduction to Post-Quantum Cryptography
Electronic Frontiers Forums at DragonCon via YouTube A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
IEEE via YouTube