Completed
A Subverted Implementation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cliptography - Clipping the Power of Kleptographic Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Modern Crypto
- 3 The "Security Divide"
- 4 An Implicit Assumption
- 5 Implementations are Untrustworthy
- 6 Kleptography
- 7 RSA Key Generation
- 8 A Subverted Implementation
- 9 The Attack
- 10 The Threat of Klepto Attacks
- 11 Subliminal Channel Attack
- 12 Status-of-the-Art for Defending
- 13 Current Status: Wide Open
- 14 Long Term Goal
- 15 Cliptographic Model
- 16 The Model(s)
- 17 What Can the Watchdog Guarantee?
- 18 Mitigating Subliminal Channel
- 19 One-Way Permutation
- 20 Random Padding is Dangerous
- 21 Conventional Wisdom
- 22 FDH in the Clipto Setting
- 23 Revised FDH
- 24 Summary
- 25 Open Problems
- 26 Our Recent Progress: Signature with Offline Watchdog