Symmetric Designs and Leakage-Resilience in Cryptography - Session 194
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the intricacies of symmetric designs and leakage-resilience in cryptography through this 56-minute conference talk. Delve into topics such as round functions, key scheduling, and the importance of middle layers in cryptographic designs. Examine password hashing techniques and the compactness of hashing modes. Investigate leakage resilience, including various leakage models and dense leakage scenarios. Learn about the simulation paradigm and its role in cryptographic security. Gain insights into the "Mother of All Leakages" concept and its implications for cryptographic systems. Engage with question and answer sessions throughout the talk to deepen your understanding of these critical aspects of modern cryptography.
Syllabus
Intro
Motivation
Mode
Round Function
Key Schedule
Questions
Mind the Middle Layer
Question
Password hashing
Compactness of hashing modes
Leakage resilience
PvP
Conclusion
Question Answer
The Mother of All Leakages
Leakage
Leakage Models
Dense Leakage
Simulation Paradigm
Recap
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera