Completed
Gathering Inequalities
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Fault Attacks on CCA-Secure Lattice KEMs
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What's that all about?
- 3 Status: Implementation Security of Lattice KEM
- 4 Kyber, Saber: High-Level Similarities
- 5 Our Attack
- 6 The LPR Encryption Scheme: Noisy ElGamal
- 7 Correctness and Decoding
- 8 Fujisaki-Okamoto: CPA PKE
- 9 Attacking an FO-KEM
- 10 Effective vs. Inflective Faults
- 11 (In)Effective Faults in the Decoder
- 12 Kyber's Decoding Routine
- 13 Faulting the Decoder
- 14 Extracting Information
- 15 Gathering Inequalities
- 16 Solving for the key
- 17 Solving Approach
- 18 Countermeasures?