YoVDO

Provable Security and Attack Models in Cryptography - Session 8

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Encryption Courses Provable Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore provable security and attack models in this comprehensive lecture from TheIACR. Delve into key concepts such as sum of events, mansu, key alternating ciphers, permutation-based PRFs, encrypted terminals, and encryption. Examine bad events, good transcript reliability, and detectability games. Investigate research directions, state resets, and state reset games. Learn about asymmetric ASAs and short message encryption. Gain valuable insights through audience questions and engage with the speaker's two main goals for the presentation.

Syllabus

Intro
Sum of eventmansu
Key alternating ciphers
Permutationbased PRF
Permutationbased encrypted terminal
Permutationbased encryption
Bad event
Good transcript reliability
Audience question
Two goals
Detectability game
Research directions
State resets
State reset game
Summary
Asymmetric ASAs
Short message encryption
Audience questions
Talk


Taught by

TheIACR

Related Courses

Provable Security
media.ccc.de via YouTube
Another Look at Provable Security
TheIACR via YouTube
On the Provable Security of -EC-DSA Signatures
Association for Computing Machinery (ACM) via YouTube
How Secure and Quick is QUIC? Provable Security and Performance Analyses
IEEE via YouTube
Jonathan Katz - Introduction to Cryptography Part 1 of 3 - IPAM at UCLA
Institute for Pure & Applied Mathematics (IPAM) via YouTube