Cryptanalysis of Authenticated Encryption Schemes
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the intricacies of cryptanalysis in authenticated encryption schemes through this comprehensive 53-minute session. Delve into the techniques and methodologies used to analyze and potentially break encryption systems that provide both confidentiality and authenticity. Gain insights into the vulnerabilities and strengths of various authenticated encryption algorithms, and understand the importance of robust cryptographic design in securing sensitive information. Learn about the latest advancements in cryptanalytic attacks and their implications for modern cybersecurity practices.
Syllabus
session-28: Cryptanalysis of authenticated encryption schemes
Taught by
TheIACR
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network