Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines

TheIACR via YouTube Direct link

Should Alice Trust Her Computer?

2 of 18

2 of 18

Should Alice Trust Her Computer?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Message Transmission with Secure Communication on Corrupted Machines
  2. 2 Should Alice Trust Her Computer?
  3. 3 Bugs in Cryptographic Software
  4. 4 of Hardware and Software
  5. 5 Crypto in the Real World?
  6. 6 Algorithm Substitution Attacks
  7. 7 Reverse Firewalls!
  8. 8 Reverse Firewall Functionality
  9. 9 Reverse Firewall Security
  10. 10 Simple Example
  11. 11 What if the firewall is corrupt?
  12. 12 Primitives with Reverse Firewalls
  13. 13 Message-Transmission Protocols
  14. 14 Problems with Simple PKE Scheme
  15. 15 Perandomizable Hybrid Encryption?
  16. 16 Composition Theorem (Informal)
  17. 17 with a Secure Firewall
  18. 18 Open Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.