YoVDO

Separate Separations of CPA and Circular Security for Any Cycle Length

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Security Research Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of circular insecurity in cryptographic systems through this 21-minute conference talk. Delve into the paper "Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE" by Navid Alamati and Chris Peikert, presented at Crypto 2016. Examine the concepts of CPA and circular security separations for various cycle lengths. Gain insights into applications, price operations, and constructions related to cycle clusters. Learn about the cycle tester framework, including ring-based implementations and K1 separation techniques. Understand the implications of leader mode in cryptographic protocols and how it relates to circular security vulnerabilities.

Syllabus

Introduction
Applications
Price Operations
Constructions
Cycle Cluster
Review
Construction
Cycle Tester
Ringbased Cycle Tester
K1 Separation
Cycle Test Framework
Leader Mode


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera