Partitioning Oracle Attacks

Partitioning Oracle Attacks

TheIACR via YouTube Direct link

An Overview of GHASH A Carter Wegman MAC which computes over Galois field GF213

10 of 17

10 of 17

An Overview of GHASH A Carter Wegman MAC which computes over Galois field GF213

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Partitioning Oracle Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Modern Symmetric Cryptography
  3. 3 Authenticated Encryption
  4. 4 (Non-) Committing AEAD
  5. 5 What we know about non-committing AEAD Definitional landscape
  6. 6 Brute-force Dictionary Attack
  7. 7 Partitioning Oracle Attacks: Setting Setting interface has secret pwchosen from D
  8. 8 Key multi-collision attacks Targeted multi-key collision resistance TMKCRI
  9. 9 Computing Key Multi-Collisions for AES-GCM then
  10. 10 An Overview of GHASH A Carter Wegman MAC which computes over Galois field GF213
  11. 11 Shadowsocks: threat model
  12. 12 Password Recovery for Shadowsocks
  13. 13 Shadowsocks Attack: experimental evaluation
  14. 14 OPAQUE: building partitioning oracles
  15. 15 OPAQUE: early implementations
  16. 16 OPAQUE An asymmetric Pasword Authenticated Key Exchange (PAKE)
  17. 17 Vulnerabilities from non-committing AEAD (so far)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.