Partitioning Oracle Attacks

Partitioning Oracle Attacks

TheIACR via YouTube Direct link

OPAQUE: early implementations

15 of 17

15 of 17

OPAQUE: early implementations

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Partitioning Oracle Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Modern Symmetric Cryptography
  3. 3 Authenticated Encryption
  4. 4 (Non-) Committing AEAD
  5. 5 What we know about non-committing AEAD Definitional landscape
  6. 6 Brute-force Dictionary Attack
  7. 7 Partitioning Oracle Attacks: Setting Setting interface has secret pwchosen from D
  8. 8 Key multi-collision attacks Targeted multi-key collision resistance TMKCRI
  9. 9 Computing Key Multi-Collisions for AES-GCM then
  10. 10 An Overview of GHASH A Carter Wegman MAC which computes over Galois field GF213
  11. 11 Shadowsocks: threat model
  12. 12 Password Recovery for Shadowsocks
  13. 13 Shadowsocks Attack: experimental evaluation
  14. 14 OPAQUE: building partitioning oracles
  15. 15 OPAQUE: early implementations
  16. 16 OPAQUE An asymmetric Pasword Authenticated Key Exchange (PAKE)
  17. 17 Vulnerabilities from non-committing AEAD (so far)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.