Provable Security and Attack Models in Cryptography - Session 8
Offered By: TheIACR via YouTube
Course Description
Overview
Explore provable security and attack models in this comprehensive lecture from TheIACR. Delve into key concepts such as sum of events, mansu, key alternating ciphers, permutation-based PRFs, encrypted terminals, and encryption. Examine bad events, good transcript reliability, and detectability games. Investigate research directions, state resets, and state reset games. Learn about asymmetric ASAs and short message encryption. Gain valuable insights through audience questions and engage with the speaker's two main goals for the presentation.
Syllabus
Intro
Sum of eventmansu
Key alternating ciphers
Permutationbased PRF
Permutationbased encrypted terminal
Permutationbased encryption
Bad event
Good transcript reliability
Audience question
Two goals
Detectability game
Research directions
State resets
State reset game
Summary
Asymmetric ASAs
Short message encryption
Audience questions
Talk
Taught by
TheIACR
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Sicherheit im Internet
openHPI أساسيات التشفير
Rwaq (رواق) Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera