YoVDO

Provable Security and Attack Models in Cryptography - Session 8

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Encryption Courses Provable Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore provable security and attack models in this comprehensive lecture from TheIACR. Delve into key concepts such as sum of events, mansu, key alternating ciphers, permutation-based PRFs, encrypted terminals, and encryption. Examine bad events, good transcript reliability, and detectability games. Investigate research directions, state resets, and state reset games. Learn about asymmetric ASAs and short message encryption. Gain valuable insights through audience questions and engage with the speaker's two main goals for the presentation.

Syllabus

Intro
Sum of eventmansu
Key alternating ciphers
Permutationbased PRF
Permutationbased encrypted terminal
Permutationbased encryption
Bad event
Good transcript reliability
Audience question
Two goals
Detectability game
Research directions
State resets
State reset game
Summary
Asymmetric ASAs
Short message encryption
Audience questions
Talk


Taught by

TheIACR

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera