Say It Ain’t So - An Implementation of Deniable Encryption
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the concept of deniable encryption in this 19-minute Black Hat conference talk. Delve into the main idea, motivation, and various applications of this technology. Learn about existing solutions, from simple to more sophisticated approaches, and understand the core technology behind set and string reconciliation. Examine an implementation example and gain insights into the potential impact of deniable encryption on digital privacy and security.
Syllabus
black hat
Why listen ... to me?
Main Idea
Motivation
Other applications
Our Solution
What's out there?
Simple solution
Smarter solutions
Core Technology
Core Tech - Set Reconciliation
Core Tech - String Reconciliation
Implementation - Example
Conclusion
References
Taught by
Black Hat
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera