Completed
Reminder: key-encapsulation mechanisms
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Everybody's a Target - Scalability in Public-Key Encryption
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Multi-instance security
- 3 Scaling behavior of cryptographic schemes
- 4 Background
- 5 Logjam attack
- 6 Reminder: key-encapsulation mechanisms
- 7 Security notions for KEM
- 8 Scaling factor
- 9 Overview on our results
- 10 Multi-instance CDH-type problems
- 11 Multi-instance generic-group lower bounds
- 12 Intuition behind proofs
- 13 Summary and Future Directions