Completed
Based crypto system
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Symmetric Cryptography
- 3 Example
- 4 Sharing keys
- 5 Asymmetric cryptography
- 6 Key exchange
- 7 Security goal
- 8 DiffieHellman key exchange
- 9 DiffieHellman problem
- 10 Public encryption
- 11 Elgamal encryption
- 12 Gamble encryption
- 13 Quantum computers
- 14 Googles quantum computer
- 15 IBM didnt like it
- 16 Quantum Supremacy
- 17 Quantum Computer Protocol
- 18 Hbased digital signatures
- 19 Based crypto system
- 20 Efficiency
- 21 Sidechannel attacks
- 22 Digital signature schemes
- 23 Onetime signature scheme
- 24 Verifying signature
- 25 Long signature
- 26 Binary tree
- 27 Verification keys
- 28 Complexity
- 29 Goal
- 30 Mercury
- 31 Vector Commitment
- 32 Vector commitments
- 33 polynomial commitments
- 34 emerging proofs
- 35 what are the problems
- 36 what to do
- 37 novel scheme
- 38 signature
- 39 schema
- 40 questions
- 41 algorithms
- 42 QA
- 43 Hash
- 44 Scientific paper
- 45 Thank you
- 46 Quantum cryptography
- 47 Quantum key exchange