The Exact PRF Security of Truncation - Tight Bounds for Keyed Sponges and Truncated CBC

The Exact PRF Security of Truncation - Tight Bounds for Keyed Sponges and Truncated CBC

TheIACR via YouTube Direct link

Exploit Message Length

7 of 15

7 of 15

Exploit Message Length

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Exact PRF Security of Truncation - Tight Bounds for Keyed Sponges and Truncated CBC

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Pseudorandom functions
  3. 3 HMAC
  4. 4 Sponge Construction
  5. 5 Random permutation model
  6. 6 Distinguisher
  7. 7 Exploit Message Length
  8. 8 Truncated CBC
  9. 9 Intuition of Proof
  10. 10 Challenges of Proof
  11. 11 Approach
  12. 12 Key Problem
  13. 13 Standard Model
  14. 14 Keeper Pending
  15. 15 Open Problem

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.