Completed
Overview
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hunting Invisible Salamanders - Cryptographic Insecurity with Attacker-Controlled Keys
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 This Talk
- 3 Authenticated Encryption
- 4 New Settings, New Needs
- 5 Overview
- 6 Attacker-Controlled Keys
- 7 Example: Password-based AE
- 8 Example: Reporting Plaintexts
- 9 Committing Security for AE
- 10 Reporting Salamanders
- 11 Invisible Salamanders for CTR Mode
- 12 Galois/Counter Mode (GCM)
- 13 Colliding GCM's MACA
- 14 From Two Keys to Many A
- 15 Multi-Receiver Encryption
- 16 Abuse Reporting for Encrypted Messaging
- 17 Facebook's Message Franking Protocol
- 18 Evading Message Franking
- 19 Crafting the Ciphertext
- 20 Partitioning Oracles
- 21 Preventing Invisible Salamanders