YoVDO

Symmetric Designs and Leakage-Resilience in Cryptography - Session 194

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Password Hashing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of symmetric designs and leakage-resilience in cryptography through this 56-minute conference talk. Delve into topics such as round functions, key scheduling, and the importance of middle layers in cryptographic designs. Examine password hashing techniques and the compactness of hashing modes. Investigate leakage resilience, including various leakage models and dense leakage scenarios. Learn about the simulation paradigm and its role in cryptographic security. Gain insights into the "Mother of All Leakages" concept and its implications for cryptographic systems. Engage with question and answer sessions throughout the talk to deepen your understanding of these critical aspects of modern cryptography.

Syllabus

Intro
Motivation
Mode
Round Function
Key Schedule
Questions
Mind the Middle Layer
Question
Password hashing
Compactness of hashing modes
Leakage resilience
PvP
Conclusion
Question Answer
The Mother of All Leakages
Leakage
Leakage Models
Dense Leakage
Simulation Paradigm
Recap


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera