Completed
How to attack hash functions?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
On Attacking Hash Functions in Cryptographic Schemes
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Hash functions...
- 3 Outline
- 4 Example application: Hash-and-sign
- 5 Quantum random oracle model
- 6 Domain extension
- 7 Example: the sponge construction
- 8 Hash functions in the NIST competition
- 9 How to attack hash functions?
- 10 Sigma protocols
- 11 Flat Shamir transformation
- 12 Fiat Shamir signature scheme
- 13 Fujisaki Okamoto transformation
- 14 Fiat-Shamir transformation in the GROM
- 15 Zero knowledge
- 16 The QROM is uninstantiable
- 17 Fujisaki-Okamoto transformation in the QROM
- 18 Summary