Completed
Should Alice Trust Her Computer?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines
Automatically move to the next video in the Classroom when playback concludes
- 1 Message Transmission with Secure Communication on Corrupted Machines
- 2 Should Alice Trust Her Computer?
- 3 Bugs in Cryptographic Software
- 4 of Hardware and Software
- 5 Crypto in the Real World?
- 6 Algorithm Substitution Attacks
- 7 Reverse Firewalls!
- 8 Reverse Firewall Functionality
- 9 Reverse Firewall Security
- 10 Simple Example
- 11 What if the firewall is corrupt?
- 12 Primitives with Reverse Firewalls
- 13 Message-Transmission Protocols
- 14 Problems with Simple PKE Scheme
- 15 Perandomizable Hybrid Encryption?
- 16 Composition Theorem (Informal)
- 17 with a Secure Firewall
- 18 Open Questions